<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-05-20T06:27:43</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:78948" version="1" class="patch">
	<metadata>
		<title>DirectFB-1.7.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977/" source="CVE"/>
		<reference ref_id="CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978/" source="CVE"/>
		<description>
These are all security issues fixed in the DirectFB-1.7.1-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78949" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-45.4.0esr-81.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913/" source="CVE"/>
		<reference ref_id="CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040/" source="CVE"/>
		<reference ref_id="CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652/" source="CVE"/>
		<reference ref_id="CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771/" source="CVE"/>
		<reference ref_id="CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772/" source="CVE"/>
		<reference ref_id="CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773/" source="CVE"/>
		<reference ref_id="CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774/" source="CVE"/>
		<reference ref_id="CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775/" source="CVE"/>
		<reference ref_id="CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776/" source="CVE"/>
		<reference ref_id="CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777/" source="CVE"/>
		<reference ref_id="CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044/" source="CVE"/>
		<reference ref_id="CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169/" source="CVE"/>
		<reference ref_id="CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302/" source="CVE"/>
		<reference ref_id="CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303/" source="CVE"/>
		<reference ref_id="CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304/" source="CVE"/>
		<reference ref_id="CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305/" source="CVE"/>
		<reference ref_id="CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306/" source="CVE"/>
		<reference ref_id="CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307/" source="CVE"/>
		<reference ref_id="CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308/" source="CVE"/>
		<reference ref_id="CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309/" source="CVE"/>
		<reference ref_id="CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310/" source="CVE"/>
		<reference ref_id="CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311/" source="CVE"/>
		<reference ref_id="CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312/" source="CVE"/>
		<reference ref_id="CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313/" source="CVE"/>
		<reference ref_id="CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563/" source="CVE"/>
		<reference ref_id="CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470/" source="CVE"/>
		<reference ref_id="CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654/" source="CVE"/>
		<reference ref_id="CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069/" source="CVE"/>
		<reference ref_id="CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070/" source="CVE"/>
		<reference ref_id="CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071/" source="CVE"/>
		<reference ref_id="CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072/" source="CVE"/>
		<reference ref_id="CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073/" source="CVE"/>
		<reference ref_id="CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074/" source="CVE"/>
		<reference ref_id="CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075/" source="CVE"/>
		<reference ref_id="CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077/" source="CVE"/>
		<reference ref_id="CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078/" source="CVE"/>
		<reference ref_id="CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079/" source="CVE"/>
		<reference ref_id="CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274/" source="CVE"/>
		<reference ref_id="CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370/" source="CVE"/>
		<reference ref_id="CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371/" source="CVE"/>
		<reference ref_id="CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372/" source="CVE"/>
		<reference ref_id="CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373/" source="CVE"/>
		<reference ref_id="CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374/" source="CVE"/>
		<reference ref_id="CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375/" source="CVE"/>
		<reference ref_id="CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376/" source="CVE"/>
		<reference ref_id="CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377/" source="CVE"/>
		<reference ref_id="CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380/" source="CVE"/>
		<reference ref_id="CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381/" source="CVE"/>
		<reference ref_id="CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383/" source="CVE"/>
		<reference ref_id="CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388/" source="CVE"/>
		<reference ref_id="CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979/" source="CVE"/>
		<reference ref_id="CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980/" source="CVE"/>
		<reference ref_id="CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982/" source="CVE"/>
		<reference ref_id="CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983/" source="CVE"/>
		<reference ref_id="CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984/" source="CVE"/>
		<reference ref_id="CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985/" source="CVE"/>
		<reference ref_id="CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164/" source="CVE"/>
		<reference ref_id="CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165/" source="CVE"/>
		<reference ref_id="CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166/" source="CVE"/>
		<reference ref_id="CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167/" source="CVE"/>
		<reference ref_id="CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168/" source="CVE"/>
		<reference ref_id="CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169/" source="CVE"/>
		<reference ref_id="CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170/" source="CVE"/>
		<reference ref_id="CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171/" source="CVE"/>
		<reference ref_id="CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172/" source="CVE"/>
		<reference ref_id="CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173/" source="CVE"/>
		<reference ref_id="CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174/" source="CVE"/>
		<reference ref_id="CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176/" source="CVE"/>
		<reference ref_id="CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177/" source="CVE"/>
		<reference ref_id="CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178/" source="CVE"/>
		<reference ref_id="CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181/" source="CVE"/>
		<reference ref_id="CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182/" source="CVE"/>
		<reference ref_id="CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654/" source="CVE"/>
		<reference ref_id="CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028/" source="CVE"/>
		<reference ref_id="CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121/" source="CVE"/>
		<reference ref_id="CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125/" source="CVE"/>
		<reference ref_id="CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196/" source="CVE"/>
		<reference ref_id="CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197/" source="CVE"/>
		<reference ref_id="CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198/" source="CVE"/>
		<reference ref_id="CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199/" source="CVE"/>
		<reference ref_id="CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200/" source="CVE"/>
		<reference ref_id="CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201/" source="CVE"/>
		<reference ref_id="CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202/" source="CVE"/>
		<reference ref_id="CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203/" source="CVE"/>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206/" source="CVE"/>
		<reference ref_id="CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207/" source="CVE"/>
		<reference ref_id="CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208/" source="CVE"/>
		<reference ref_id="CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209/" source="CVE"/>
		<reference ref_id="CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210/" source="CVE"/>
		<reference ref_id="CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211/" source="CVE"/>
		<reference ref_id="CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212/" source="CVE"/>
		<reference ref_id="CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213/" source="CVE"/>
		<reference ref_id="CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214/" source="CVE"/>
		<reference ref_id="CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215/" source="CVE"/>
		<reference ref_id="CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751/" source="CVE"/>
		<reference ref_id="CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752/" source="CVE"/>
		<reference ref_id="CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753/" source="CVE"/>
		<reference ref_id="CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754/" source="CVE"/>
		<reference ref_id="CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755/" source="CVE"/>
		<reference ref_id="CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760/" source="CVE"/>
		<reference ref_id="CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762/" source="CVE"/>
		<reference ref_id="CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764/" source="CVE"/>
		<reference ref_id="CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765/" source="CVE"/>
		<reference ref_id="CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766/" source="CVE"/>
		<reference ref_id="CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767/" source="CVE"/>
		<reference ref_id="CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768/" source="CVE"/>
		<reference ref_id="CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769/" source="CVE"/>
		<reference ref_id="CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166/" source="CVE"/>
		<reference ref_id="CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167/" source="CVE"/>
		<reference ref_id="CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168/" source="CVE"/>
		<reference ref_id="CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169/" source="CVE"/>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173/" source="CVE"/>
		<reference ref_id="CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174/" source="CVE"/>
		<reference ref_id="CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175/" source="CVE"/>
		<reference ref_id="CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176/" source="CVE"/>
		<reference ref_id="CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177/" source="CVE"/>
		<reference ref_id="CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178/" source="CVE"/>
		<reference ref_id="CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179/" source="CVE"/>
		<reference ref_id="CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180/" source="CVE"/>
		<reference ref_id="CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182/" source="CVE"/>
		<reference ref_id="CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183/" source="CVE"/>
		<reference ref_id="CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765/" source="CVE"/>
		<reference ref_id="CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068/" source="CVE"/>
		<reference ref_id="CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069/" source="CVE"/>
		<reference ref_id="CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070/" source="CVE"/>
		<reference ref_id="CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079/" source="CVE"/>
		<reference ref_id="CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080/" source="CVE"/>
		<reference ref_id="CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081/" source="CVE"/>
		<reference ref_id="CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084/" source="CVE"/>
		<reference ref_id="CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187/" source="CVE"/>
		<reference ref_id="CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202/" source="CVE"/>
		<reference ref_id="CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366/" source="CVE"/>
		<reference ref_id="CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367/" source="CVE"/>
		<reference ref_id="CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368/" source="CVE"/>
		<reference ref_id="CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369/" source="CVE"/>
		<reference ref_id="CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370/" source="CVE"/>
		<reference ref_id="CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371/" source="CVE"/>
		<reference ref_id="CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372/" source="CVE"/>
		<reference ref_id="CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373/" source="CVE"/>
		<reference ref_id="CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374/" source="CVE"/>
		<reference ref_id="CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375/" source="CVE"/>
		<reference ref_id="CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377/" source="CVE"/>
		<reference ref_id="CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985/" source="CVE"/>
		<reference ref_id="CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986/" source="CVE"/>
		<reference ref_id="CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988/" source="CVE"/>
		<reference ref_id="CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989/" source="CVE"/>
		<reference ref_id="CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990/" source="CVE"/>
		<reference ref_id="CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991/" source="CVE"/>
		<reference ref_id="CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992/" source="CVE"/>
		<reference ref_id="CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993/" source="CVE"/>
		<reference ref_id="CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995/" source="CVE"/>
		<reference ref_id="CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996/" source="CVE"/>
		<reference ref_id="CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997/" source="CVE"/>
		<reference ref_id="CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000/" source="CVE"/>
		<reference ref_id="CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001/" source="CVE"/>
		<reference ref_id="CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002/" source="CVE"/>
		<reference ref_id="CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003/" source="CVE"/>
		<reference ref_id="CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004/" source="CVE"/>
		<reference ref_id="CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062/" source="CVE"/>
		<reference ref_id="CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101/" source="CVE"/>
		<reference ref_id="CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232/" source="CVE"/>
		<reference ref_id="CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648/" source="CVE"/>
		<reference ref_id="CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650/" source="CVE"/>
		<reference ref_id="CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651/" source="CVE"/>
		<reference ref_id="CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652/" source="CVE"/>
		<reference ref_id="CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654/" source="CVE"/>
		<reference ref_id="CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655/" source="CVE"/>
		<reference ref_id="CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658/" source="CVE"/>
		<reference ref_id="CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659/" source="CVE"/>
		<reference ref_id="CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660/" source="CVE"/>
		<reference ref_id="CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661/" source="CVE"/>
		<reference ref_id="CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663/" source="CVE"/>
		<reference ref_id="CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441/" source="CVE"/>
		<reference ref_id="CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442/" source="CVE"/>
		<reference ref_id="CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445/" source="CVE"/>
		<reference ref_id="CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446/" source="CVE"/>
		<reference ref_id="CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447/" source="CVE"/>
		<reference ref_id="CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449/" source="CVE"/>
		<reference ref_id="CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451/" source="CVE"/>
		<reference ref_id="CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452/" source="CVE"/>
		<reference ref_id="CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455/" source="CVE"/>
		<reference ref_id="CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456/" source="CVE"/>
		<reference ref_id="CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457/" source="CVE"/>
		<reference ref_id="CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458/" source="CVE"/>
		<reference ref_id="CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459/" source="CVE"/>
		<reference ref_id="CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460/" source="CVE"/>
		<reference ref_id="CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461/" source="CVE"/>
		<reference ref_id="CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462/" source="CVE"/>
		<reference ref_id="CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463/" source="CVE"/>
		<reference ref_id="CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464/" source="CVE"/>
		<reference ref_id="CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467/" source="CVE"/>
		<reference ref_id="CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468/" source="CVE"/>
		<reference ref_id="CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469/" source="CVE"/>
		<reference ref_id="CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470/" source="CVE"/>
		<reference ref_id="CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471/" source="CVE"/>
		<reference ref_id="CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472/" source="CVE"/>
		<reference ref_id="CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473/" source="CVE"/>
		<reference ref_id="CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474/" source="CVE"/>
		<reference ref_id="CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475/" source="CVE"/>
		<reference ref_id="CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477/" source="CVE"/>
		<reference ref_id="CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478/" source="CVE"/>
		<reference ref_id="CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479/" source="CVE"/>
		<reference ref_id="CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759/" source="CVE"/>
		<reference ref_id="CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937/" source="CVE"/>
		<reference ref_id="CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938/" source="CVE"/>
		<reference ref_id="CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940/" source="CVE"/>
		<reference ref_id="CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941/" source="CVE"/>
		<reference ref_id="CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945/" source="CVE"/>
		<reference ref_id="CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946/" source="CVE"/>
		<reference ref_id="CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947/" source="CVE"/>
		<reference ref_id="CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948/" source="CVE"/>
		<reference ref_id="CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949/" source="CVE"/>
		<reference ref_id="CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950/" source="CVE"/>
		<reference ref_id="CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951/" source="CVE"/>
		<reference ref_id="CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952/" source="CVE"/>
		<reference ref_id="CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953/" source="CVE"/>
		<reference ref_id="CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954/" source="CVE"/>
		<reference ref_id="CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955/" source="CVE"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957/" source="CVE"/>
		<reference ref_id="CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958/" source="CVE"/>
		<reference ref_id="CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959/" source="CVE"/>
		<reference ref_id="CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960/" source="CVE"/>
		<reference ref_id="CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961/" source="CVE"/>
		<reference ref_id="CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962/" source="CVE"/>
		<reference ref_id="CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963/" source="CVE"/>
		<reference ref_id="CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965/" source="CVE"/>
		<reference ref_id="CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966/" source="CVE"/>
		<reference ref_id="CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<reference ref_id="CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772/" source="CVE"/>
		<reference ref_id="CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773/" source="CVE"/>
		<reference ref_id="CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774/" source="CVE"/>
		<reference ref_id="CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775/" source="CVE"/>
		<reference ref_id="CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776/" source="CVE"/>
		<reference ref_id="CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777/" source="CVE"/>
		<reference ref_id="CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778/" source="CVE"/>
		<reference ref_id="CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779/" source="CVE"/>
		<reference ref_id="CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780/" source="CVE"/>
		<reference ref_id="CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781/" source="CVE"/>
		<reference ref_id="CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782/" source="CVE"/>
		<reference ref_id="CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783/" source="CVE"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<reference ref_id="CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801/" source="CVE"/>
		<reference ref_id="CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669/" source="CVE"/>
		<reference ref_id="CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670/" source="CVE"/>
		<reference ref_id="CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671/" source="CVE"/>
		<reference ref_id="CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674/" source="CVE"/>
		<reference ref_id="CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676/" source="CVE"/>
		<reference ref_id="CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677/" source="CVE"/>
		<reference ref_id="CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678/" source="CVE"/>
		<reference ref_id="CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679/" source="CVE"/>
		<reference ref_id="CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680/" source="CVE"/>
		<reference ref_id="CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681/" source="CVE"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694/" source="CVE"/>
		<reference ref_id="CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695/" source="CVE"/>
		<reference ref_id="CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<reference ref_id="CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698/" source="CVE"/>
		<reference ref_id="CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699/" source="CVE"/>
		<reference ref_id="CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701/" source="CVE"/>
		<reference ref_id="CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702/" source="CVE"/>
		<reference ref_id="CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704/" source="CVE"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708/" source="CVE"/>
		<reference ref_id="CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709/" source="CVE"/>
		<reference ref_id="CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710/" source="CVE"/>
		<reference ref_id="CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711/" source="CVE"/>
		<reference ref_id="CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713/" source="CVE"/>
		<reference ref_id="CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714/" source="CVE"/>
		<reference ref_id="CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719/" source="CVE"/>
		<reference ref_id="CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720/" source="CVE"/>
		<reference ref_id="CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723/" source="CVE"/>
		<reference ref_id="CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738/" source="CVE"/>
		<reference ref_id="CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590/" source="CVE"/>
		<reference ref_id="CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591/" source="CVE"/>
		<reference ref_id="CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592/" source="CVE"/>
		<reference ref_id="CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593/" source="CVE"/>
		<reference ref_id="CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595/" source="CVE"/>
		<reference ref_id="CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596/" source="CVE"/>
		<reference ref_id="CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597/" source="CVE"/>
		<reference ref_id="CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598/" source="CVE"/>
		<reference ref_id="CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599/" source="CVE"/>
		<reference ref_id="CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600/" source="CVE"/>
		<reference ref_id="CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601/" source="CVE"/>
		<reference ref_id="CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603/" source="CVE"/>
		<reference ref_id="CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604/" source="CVE"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553/" source="CVE"/>
		<reference ref_id="CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563/" source="CVE"/>
		<reference ref_id="CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564/" source="CVE"/>
		<reference ref_id="CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-45.4.0esr-81.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78950" version="1" class="patch">
	<metadata>
		<title>aaa_base-13.2+git20140911.61c1681-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461/" source="CVE"/>
		<description>
These are all security issues fixed in the aaa_base-13.2+git20140911.61c1681-28.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140437" comment="aaa_base-13.2+git20140911.61c1681-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140438" comment="aaa_base-extras-13.2+git20140911.61c1681-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78951" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.42-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.42-14.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140439" comment="accountsservice-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140440" comment="accountsservice-lang-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140441" comment="libaccountsservice0-0.6.42-14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140442" comment="typelib-1_0-AccountsService-1_0-0.6.42-14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78952" version="1" class="patch">
	<metadata>
		<title>alsa-1.0.27.2-11.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.0.27.2-11.10 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140443" comment="alsa-1.0.27.2-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140444" comment="alsa-docs-1.0.27.2-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140445" comment="libasound2-1.0.27.2-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140446" comment="libasound2-32bit-1.0.27.2-11.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78953" version="1" class="patch">
	<metadata>
		<title>ant-1.9.4-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.9.4-1.31 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140447" comment="ant-1.9.4-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78954" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.9.2-1.149 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3540" ref_url="https://www.suse.com/security/cve/CVE-2014-3540/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.9.2-1.149 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3540/">CVE-2014-3540</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140448" comment="apache-commons-beanutils-1.9.2-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140449" comment="apache-commons-beanutils-javadoc-1.9.2-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78955" version="1" class="patch">
	<metadata>
		<title>apache-commons-daemon-1.0.15-4.181 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2729" ref_url="https://www.suse.com/security/cve/CVE-2011-2729/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-daemon-1.0.15-4.181 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2729/">CVE-2011-2729</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140450" comment="apache-commons-daemon-1.0.15-4.221 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140451" comment="apache-commons-daemon-javadoc-1.0.15-4.221 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78956" version="1" class="patch">
	<metadata>
		<title>apache-commons-httpclient-3.1-4.364 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-httpclient-3.1-4.364 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140452" comment="apache-commons-httpclient-3.1-4.498 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78957" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.23-14.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191/" source="CVE"/>
		<reference ref_id="CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195/" source="CVE"/>
		<reference ref_id="CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890/" source="CVE"/>
		<reference ref_id="CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891/" source="CVE"/>
		<reference ref_id="CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955/" source="CVE"/>
		<reference ref_id="CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699/" source="CVE"/>
		<reference ref_id="CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094/" source="CVE"/>
		<reference ref_id="CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095/" source="CVE"/>
		<reference ref_id="CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408/" source="CVE"/>
		<reference ref_id="CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425/" source="CVE"/>
		<reference ref_id="CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434/" source="CVE"/>
		<reference ref_id="CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<reference ref_id="CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068/" source="CVE"/>
		<reference ref_id="CVE-2011-1176" ref_url="https://www.suse.com/security/cve/CVE-2011-1176/" source="CVE"/>
		<reference ref_id="CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192/" source="CVE"/>
		<reference ref_id="CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368/" source="CVE"/>
		<reference ref_id="CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607/" source="CVE"/>
		<reference ref_id="CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317/" source="CVE"/>
		<reference ref_id="CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021/" source="CVE"/>
		<reference ref_id="CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031/" source="CVE"/>
		<reference ref_id="CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053/" source="CVE"/>
		<reference ref_id="CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687/" source="CVE"/>
		<reference ref_id="CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499/" source="CVE"/>
		<reference ref_id="CVE-2012-3502" ref_url="https://www.suse.com/security/cve/CVE-2012-3502/" source="CVE"/>
		<reference ref_id="CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896/" source="CVE"/>
		<reference ref_id="CVE-2013-2249" ref_url="https://www.suse.com/security/cve/CVE-2013-2249/" source="CVE"/>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438/" source="CVE"/>
		<reference ref_id="CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098/" source="CVE"/>
		<reference ref_id="CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<reference ref_id="CVE-2014-3523" ref_url="https://www.suse.com/security/cve/CVE-2014-3523/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-1546" ref_url="https://www.suse.com/security/cve/CVE-2016-1546/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.23-14.7 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1176/">CVE-2011-1176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3502/">CVE-2012-3502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2249/">CVE-2013-2249</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3523/">CVE-2014-3523</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1546/">CVE-2016-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78958" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.40-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.40-5.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140459" comment="apache2-mod_jk-1.2.40-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78959" version="1" class="patch">
	<metadata>
		<title>apache2-mod_nss-1.0.14-18.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-5244" ref_url="https://www.suse.com/security/cve/CVE-2015-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_nss-1.0.14-18.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5244/">CVE-2015-5244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131934" comment="apache2-mod_nss-1.0.14-18.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78960" version="1" class="patch">
	<metadata>
		<title>apache2-mod_perl-2.0.8-11.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_perl-2.0.8-11.43 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140460" comment="apache2-mod_perl-2.0.8-11.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78961" version="1" class="patch">
	<metadata>
		<title>at-3.1.14-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the at-3.1.14-7.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131796" comment="flex-2.5.37-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131938" comment="flex-32bit-2.5.37-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131939" comment="libbonobo-doc-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131114" comment="libkde4-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131115" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131116" comment="libkdecore4-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131117" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131118" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131119" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131120" comment="libnetpbm11-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131121" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131122" comment="netpbm-10.66.3-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78962" version="1" class="patch">
	<metadata>
		<title>augeas-1.2.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.2.0-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140461" comment="augeas-1.2.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140462" comment="augeas-lenses-1.2.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140463" comment="libaugeas0-1.2.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78963" version="1" class="patch">
	<metadata>
		<title>autofs-5.0.9-21.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.0.9-21.6 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140464" comment="autofs-5.0.9-21.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78964" version="1" class="patch">
	<metadata>
		<title>automake-1.13.4-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.13.4-6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140465" comment="automake-1.13.4-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78965" version="1" class="patch">
	<metadata>
		<title>avahi-0.6.32-30.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758/" source="CVE"/>
		<reference ref_id="CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244/" source="CVE"/>
		<reference ref_id="CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.6.32-30.36 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140469" comment="avahi-utils-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78966" version="1" class="patch">
	<metadata>
		<title>bash-4.3-78.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<reference ref_id="CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277/" source="CVE"/>
		<reference ref_id="CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278/" source="CVE"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.3-78.39 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78967" version="1" class="patch">
	<metadata>
		<title>bind-9.9.9P1-46.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696/" source="CVE"/>
		<reference ref_id="CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022/" source="CVE"/>
		<reference ref_id="CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613/" source="CVE"/>
		<reference ref_id="CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614/" source="CVE"/>
		<reference ref_id="CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615/" source="CVE"/>
		<reference ref_id="CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414/" source="CVE"/>
		<reference ref_id="CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907/" source="CVE"/>
		<reference ref_id="CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910/" source="CVE"/>
		<reference ref_id="CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464/" source="CVE"/>
		<reference ref_id="CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313/" source="CVE"/>
		<reference ref_id="CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667/" source="CVE"/>
		<reference ref_id="CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817/" source="CVE"/>
		<reference ref_id="CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868/" source="CVE"/>
		<reference ref_id="CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244/" source="CVE"/>
		<reference ref_id="CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166/" source="CVE"/>
		<reference ref_id="CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688/" source="CVE"/>
		<reference ref_id="CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854/" source="CVE"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.9.9P1-46.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78968" version="1" class="patch">
	<metadata>
		<title>binutils-2.26.1-9.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.26.1-9.12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78969" version="1" class="patch">
	<metadata>
		<title>busybox-1.21.1-3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645/" source="CVE"/>
		<description>
These are all security issues fixed in the busybox-1.21.1-3.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78970" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-29.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-29.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140484" comment="bzip2-doc-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78971" version="1" class="patch">
	<metadata>
		<title>chrony-2.3-3.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4502" ref_url="https://www.suse.com/security/cve/CVE-2012-4502/" source="CVE"/>
		<reference ref_id="CVE-2012-4503" ref_url="https://www.suse.com/security/cve/CVE-2012-4503/" source="CVE"/>
		<reference ref_id="CVE-2014-0021" ref_url="https://www.suse.com/security/cve/CVE-2014-0021/" source="CVE"/>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-2.3-3.110 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4502/">CVE-2012-4502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4503/">CVE-2012-4503</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0021/">CVE-2014-0021</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140487" comment="chrony-2.3-3.110 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78972" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.5-8.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.5-8.9 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78973" version="1" class="patch">
	<metadata>
		<title>clamav-0.99.2-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405/" source="CVE"/>
		<reference ref_id="CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721/" source="CVE"/>
		<reference ref_id="CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627/" source="CVE"/>
		<reference ref_id="CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457/" source="CVE"/>
		<reference ref_id="CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458/" source="CVE"/>
		<reference ref_id="CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.99.2-25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78974" version="1" class="patch">
	<metadata>
		<title>colord-gtk-lang-0.1.26-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-gtk-lang-0.1.26-6.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140492" comment="libcolord2-1.3.3-10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140493" comment="libcolord2-32bit-1.3.3-10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140494" comment="libcolorhug2-1.3.3-10.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78975" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-147.67 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-147.67 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78976" version="1" class="patch">
	<metadata>
		<title>coreutils-8.25-12.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.25-12.8 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78977" version="1" class="patch">
	<metadata>
		<title>cpio-2.11-29.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.11-29.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78978" version="1" class="patch">
	<metadata>
		<title>cpp48-4.8.5-30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044/" source="CVE"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp48-4.8.5-30.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140503" comment="gcc48-locale-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78979" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.0-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78980" version="1" class="patch">
	<metadata>
		<title>cron-4.2-58.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607/" source="CVE"/>
		<reference ref_id="CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-58.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78981" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78982" version="1" class="patch">
	<metadata>
		<title>cups-1.7.5-12.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163/" source="CVE"/>
		<reference ref_id="CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820/" source="CVE"/>
		<reference ref_id="CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553/" source="CVE"/>
		<reference ref_id="CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393/" source="CVE"/>
		<reference ref_id="CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540/" source="CVE"/>
		<reference ref_id="CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542/" source="CVE"/>
		<reference ref_id="CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748/" source="CVE"/>
		<reference ref_id="CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941/" source="CVE"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094/" source="CVE"/>
		<reference ref_id="CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-1.7.5-12.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78983" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.0.58-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473/" source="CVE"/>
		<reference ref_id="CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474/" source="CVE"/>
		<reference ref_id="CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475/" source="CVE"/>
		<reference ref_id="CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707/" source="CVE"/>
		<reference ref_id="CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336/" source="CVE"/>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.0.58-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78984" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.5-3.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.5-3.72 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140514" comment="cups-pk-helper-0.2.5-3.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140515" comment="cups-pk-helper-lang-0.2.5-3.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78985" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037/" source="CVE"/>
		<reference ref_id="CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249/" source="CVE"/>
		<reference ref_id="CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944/" source="CVE"/>
		<reference ref_id="CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174/" source="CVE"/>
		<reference ref_id="CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545/" source="CVE"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-28.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78986" version="1" class="patch">
	<metadata>
		<title>curl-7.37.0-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.37.0-31.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78987" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-181.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-181.54 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140517" comment="cvs-doc-1.12.12-181.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78988" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.26-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.26-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140525" comment="cyrus-sasl-otp-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140526" comment="cyrus-sasl-otp-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140530" comment="cyrus-sasl-sqlauxprop-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140531" comment="cyrus-sasl-sqlauxprop-32bit-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78989" version="1" class="patch">
	<metadata>
		<title>davfs2-1.5.2-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362/" source="CVE"/>
		<description>
These are all security issues fixed in the davfs2-1.5.2-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140534" comment="davfs2-1.5.2-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78990" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.8.16-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<reference ref_id="CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168/" source="CVE"/>
		<reference ref_id="CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477/" source="CVE"/>
		<reference ref_id="CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532/" source="CVE"/>
		<reference ref_id="CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533/" source="CVE"/>
		<reference ref_id="CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635/" source="CVE"/>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.8.16-19.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78991" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.100.2-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.100.2-3.58 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78992" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.3-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892/" source="CVE"/>
		<reference ref_id="CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156/" source="CVE"/>
		<reference ref_id="CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611/" source="CVE"/>
		<reference ref_id="CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616/" source="CVE"/>
		<reference ref_id="CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413/" source="CVE"/>
		<reference ref_id="CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997/" source="CVE"/>
		<reference ref_id="CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748/" source="CVE"/>
		<reference ref_id="CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749/" source="CVE"/>
		<reference ref_id="CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539/" source="CVE"/>
		<reference ref_id="CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868/" source="CVE"/>
		<reference ref_id="CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570/" source="CVE"/>
		<reference ref_id="CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571/" source="CVE"/>
		<reference ref_id="CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954/" source="CVE"/>
		<reference ref_id="CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955/" source="CVE"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.3-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78993" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.71-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.71-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140541" comment="dnsmasq-2.71-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78994" version="1" class="patch">
	<metadata>
		<title>dosfstools-3.0.26-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872/" source="CVE"/>
		<reference ref_id="CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804/" source="CVE"/>
		<description>
These are all security issues fixed in the dosfstools-3.0.26-6.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78995" version="1" class="patch">
	<metadata>
		<title>dovecot22-2.2.13-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3430" ref_url="https://www.suse.com/security/cve/CVE-2014-3430/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot22-2.2.13-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3430/">CVE-2014-3430</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140542" comment="dovecot22-2.2.13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140543" comment="dovecot22-backend-mysql-2.2.13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140544" comment="dovecot22-backend-pgsql-2.2.13-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140545" comment="dovecot22-backend-sqlite-2.2.13-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78996" version="1" class="patch">
	<metadata>
		<title>dracut-044-87.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-044-87.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140546" comment="dracut-044-87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140547" comment="dracut-fips-044-87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78997" version="1" class="patch">
	<metadata>
		<title>dstat-0.7.2-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3894" ref_url="https://www.suse.com/security/cve/CVE-2009-3894/" source="CVE"/>
		<description>
These are all security issues fixed in the dstat-0.7.2-1.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3894/">CVE-2009-3894</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140548" comment="dstat-0.7.2-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78998" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.42.11-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.42.11-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78999" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-103-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-103-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79000" version="1" class="patch">
	<metadata>
		<title>elfutils-0.158-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172/" source="CVE"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.158-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106097" comment="libasm1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79001" version="1" class="patch">
	<metadata>
		<title>emacs-24.3-16.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-24.3-16.32 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140550" comment="emacs-el-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140552" comment="emacs-nox-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79002" version="1" class="patch">
	<metadata>
		<title>eog-3.20.4-7.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.20.4-7.7 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79003" version="1" class="patch">
	<metadata>
		<title>evince-3.20.1-5.66 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640/" source="CVE"/>
		<reference ref_id="CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641/" source="CVE"/>
		<reference ref_id="CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642/" source="CVE"/>
		<reference ref_id="CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.20.1-5.66 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79004" version="1" class="patch">
	<metadata>
		<title>expat-2.1.0-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147/" source="CVE"/>
		<reference ref_id="CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.1.0-17.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79005" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-12.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79006" version="1" class="patch">
	<metadata>
		<title>file-5.19-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.19-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79007" version="1" class="patch">
	<metadata>
		<title>fontconfig-2.11.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>
These are all security issues fixed in the fontconfig-2.11.1-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79008" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.0.3-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3547" ref_url="https://www.suse.com/security/cve/CVE-2012-3547/" source="CVE"/>
		<reference ref_id="CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.0.3-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3547/">CVE-2012-3547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140576" comment="freeradius-server-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140577" comment="freeradius-server-doc-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140578" comment="freeradius-server-krb5-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140579" comment="freeradius-server-ldap-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140580" comment="freeradius-server-libs-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140581" comment="freeradius-server-mysql-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140582" comment="freeradius-server-perl-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140583" comment="freeradius-server-postgresql-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140584" comment="freeradius-server-python-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140585" comment="freeradius-server-sqlite-3.0.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140586" comment="freeradius-server-utils-3.0.3-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79009" version="1" class="patch">
	<metadata>
		<title>ft2demos-2.6.3-7.8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the ft2demos-2.6.3-7.8.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79010" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.3-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79011" version="1" class="patch">
	<metadata>
		<title>gd-2.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.1.0-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79012" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-lang-2.34.0-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-lang-2.34.0-16.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79013" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.40.15-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146/" source="CVE"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.40.15-4.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79014" version="1" class="patch">
	<metadata>
		<title>gdm-3.10.0.1-52.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.10.0.1-52.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140601" comment="gdm-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140602" comment="gdm-lang-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140603" comment="gdmflexiserver-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140604" comment="libgdm1-3.10.0.1-52.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140605" comment="typelib-1_0-Gdm-1_0-3.10.0.1-52.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79015" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.15-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.15-6.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125321" comment="ghostscript-9.15-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125322" comment="ghostscript-x11-9.15-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79016" version="1" class="patch">
	<metadata>
		<title>giflib-progs-5.0.5-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-progs-5.0.5-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009126715" comment="giflib-progs-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79017" version="1" class="patch">
	<metadata>
		<title>git-core-1.8.5.6-18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2186" ref_url="https://www.suse.com/security/cve/CVE-2011-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<description>
These are all security issues fixed in the git-core-1.8.5.6-18.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2186/">CVE-2011-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124820" comment="git-core-1.8.5.6-18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79018" version="1" class="patch">
	<metadata>
		<title>glib2-lang-2.48.2-10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316/" source="CVE"/>
		<reference ref_id="CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-lang-2.48.2-10.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79019" version="1" class="patch">
	<metadata>
		<title>glibc-2.22-49.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.22-49.16 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79020" version="1" class="patch">
	<metadata>
		<title>gnome-keyring-3.20.0-27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-keyring-3.20.0-27.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140630" comment="gnome-keyring-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140631" comment="gnome-keyring-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140632" comment="gnome-keyring-lang-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140633" comment="gnome-keyring-pam-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140634" comment="gnome-keyring-pam-32bit-3.20.0-27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140635" comment="libgck-modules-gnome-keyring-3.20.0-27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79021" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.20.1-40.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.20.1-40.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140638" comment="gnome-settings-daemon-3.20.1-40.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140639" comment="gnome-settings-daemon-lang-3.20.1-40.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79022" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.20.4-70.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.20.4-70.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140640" comment="gnome-shell-3.20.4-70.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140641" comment="gnome-shell-browser-plugin-3.20.4-70.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140642" comment="gnome-shell-lang-3.20.4-70.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79023" version="1" class="patch">
	<metadata>
		<title>gnutls-3.2.15-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989/" source="CVE"/>
		<reference ref_id="CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128/" source="CVE"/>
		<reference ref_id="CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390/" source="CVE"/>
		<reference ref_id="CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569/" source="CVE"/>
		<reference ref_id="CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573/" source="CVE"/>
		<reference ref_id="CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092/" source="CVE"/>
		<reference ref_id="CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.2.15-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79024" version="1" class="patch">
	<metadata>
		<title>gpg2-2.0.24-3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547/" source="CVE"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.0.24-3.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79025" version="1" class="patch">
	<metadata>
		<title>gpgme-1.5.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>
These are all security issues fixed in the gpgme-1.5.1-1.11 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79026" version="1" class="patch">
	<metadata>
		<title>groff-1.22.2-5.287 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.2-5.287 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140646" comment="groff-full-1.22.2-5.429 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140647" comment="gxditview-1.22.2-5.429 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79027" version="1" class="patch">
	<metadata>
		<title>grub2-2.02~beta2-104.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.02~beta2-104.16 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140648" comment="grub2-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140649" comment="grub2-arm64-efi-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140650" comment="grub2-i386-pc-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140651" comment="grub2-powerpc-ieee1275-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140652" comment="grub2-s390x-emu-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140653" comment="grub2-snapper-plugin-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140654" comment="grub2-systemd-sleep-plugin-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140655" comment="grub2-x86_64-efi-2.02~beta2-104.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140656" comment="grub2-x86_64-xen-2.02~beta2-104.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79028" version="1" class="patch">
	<metadata>
		<title>gtk2-data-2.24.31-7.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-data-2.24.31-7.11 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79029" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.32.4-14.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124/" source="CVE"/>
		<reference ref_id="CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.32.4-14.18 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140663" comment="guestfs-data-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140664" comment="guestfs-tools-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140665" comment="guestfsd-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140666" comment="libguestfs0-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140667" comment="perl-Sys-Guestfs-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140668" comment="python-libguestfs-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140669" comment="virt-p2v-1.32.4-14.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140670" comment="virt-v2v-1.32.4-14.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79030" version="1" class="patch">
	<metadata>
		<title>gv-3.7.4-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the gv-3.7.4-1.36 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140671" comment="gv-3.7.4-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79031" version="1" class="patch">
	<metadata>
		<title>gvim-7.4.326-2.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-7.4.326-2.14 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140673" comment="gvim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140674" comment="vim-7.4.326-2.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140675" comment="vim-data-7.4.326-2.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79032" version="1" class="patch">
	<metadata>
		<title>gzip-1.6-7.209 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624/" source="CVE"/>
		<reference ref_id="CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.6-7.209 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79033" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0-6.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0-6.38 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79034" version="1" class="patch">
	<metadata>
		<title>hplip-3.14.6-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801/" source="CVE"/>
		<reference ref_id="CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267/" source="CVE"/>
		<reference ref_id="CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697/" source="CVE"/>
		<reference ref_id="CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<reference ref_id="CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.14.6-3.14 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79035" version="1" class="patch">
	<metadata>
		<title>hyper-v-7-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669/" source="CVE"/>
		<reference ref_id="CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532/" source="CVE"/>
		<description>
These are all security issues fixed in the hyper-v-7-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79036" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.4.14-4.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.4.14-4.11 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140684" comment="ibus-pinyin-1.5.0-7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79037" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.8.0-15.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.8.0-15.16 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140685" comment="ipsec-tools-0.8.0-15.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79038" version="1" class="patch">
	<metadata>
		<title>iputils-s20121221-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20121221-2.17 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79039" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-fileupload-1.1.1-120.113 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-commons-fileupload-1.1.1-120.113 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140687" comment="jakarta-commons-fileupload-1.1.1-120.238 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140688" comment="jakarta-commons-fileupload-javadoc-1.1.1-120.238 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79040" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk-1.7.0.111-33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563/" source="CVE"/>
		<reference ref_id="CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571/" source="CVE"/>
		<reference ref_id="CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035/" source="CVE"/>
		<reference ref_id="CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497/" source="CVE"/>
		<reference ref_id="CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501/" source="CVE"/>
		<reference ref_id="CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502/" source="CVE"/>
		<reference ref_id="CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503/" source="CVE"/>
		<reference ref_id="CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505/" source="CVE"/>
		<reference ref_id="CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506/" source="CVE"/>
		<reference ref_id="CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547/" source="CVE"/>
		<reference ref_id="CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682/" source="CVE"/>
		<reference ref_id="CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711/" source="CVE"/>
		<reference ref_id="CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713/" source="CVE"/>
		<reference ref_id="CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716/" source="CVE"/>
		<reference ref_id="CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717/" source="CVE"/>
		<reference ref_id="CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718/" source="CVE"/>
		<reference ref_id="CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719/" source="CVE"/>
		<reference ref_id="CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723/" source="CVE"/>
		<reference ref_id="CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724/" source="CVE"/>
		<reference ref_id="CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725/" source="CVE"/>
		<reference ref_id="CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726/" source="CVE"/>
		<reference ref_id="CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136/" source="CVE"/>
		<reference ref_id="CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174/" source="CVE"/>
		<reference ref_id="CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216/" source="CVE"/>
		<reference ref_id="CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416/" source="CVE"/>
		<reference ref_id="CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681/" source="CVE"/>
		<reference ref_id="CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068/" source="CVE"/>
		<reference ref_id="CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069/" source="CVE"/>
		<reference ref_id="CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070/" source="CVE"/>
		<reference ref_id="CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071/" source="CVE"/>
		<reference ref_id="CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072/" source="CVE"/>
		<reference ref_id="CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073/" source="CVE"/>
		<reference ref_id="CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074/" source="CVE"/>
		<reference ref_id="CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075/" source="CVE"/>
		<reference ref_id="CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076/" source="CVE"/>
		<reference ref_id="CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077/" source="CVE"/>
		<reference ref_id="CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079/" source="CVE"/>
		<reference ref_id="CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081/" source="CVE"/>
		<reference ref_id="CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084/" source="CVE"/>
		<reference ref_id="CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085/" source="CVE"/>
		<reference ref_id="CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086/" source="CVE"/>
		<reference ref_id="CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087/" source="CVE"/>
		<reference ref_id="CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088/" source="CVE"/>
		<reference ref_id="CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401/" source="CVE"/>
		<reference ref_id="CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422/" source="CVE"/>
		<reference ref_id="CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424/" source="CVE"/>
		<reference ref_id="CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425/" source="CVE"/>
		<reference ref_id="CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426/" source="CVE"/>
		<reference ref_id="CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427/" source="CVE"/>
		<reference ref_id="CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428/" source="CVE"/>
		<reference ref_id="CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429/" source="CVE"/>
		<reference ref_id="CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431/" source="CVE"/>
		<reference ref_id="CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432/" source="CVE"/>
		<reference ref_id="CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433/" source="CVE"/>
		<reference ref_id="CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434/" source="CVE"/>
		<reference ref_id="CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435/" source="CVE"/>
		<reference ref_id="CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440/" source="CVE"/>
		<reference ref_id="CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441/" source="CVE"/>
		<reference ref_id="CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442/" source="CVE"/>
		<reference ref_id="CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443/" source="CVE"/>
		<reference ref_id="CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444/" source="CVE"/>
		<reference ref_id="CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450/" source="CVE"/>
		<reference ref_id="CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809/" source="CVE"/>
		<reference ref_id="CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475/" source="CVE"/>
		<reference ref_id="CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476/" source="CVE"/>
		<reference ref_id="CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478/" source="CVE"/>
		<reference ref_id="CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480/" source="CVE"/>
		<reference ref_id="CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484/" source="CVE"/>
		<reference ref_id="CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486/" source="CVE"/>
		<reference ref_id="CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488/" source="CVE"/>
		<reference ref_id="CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493/" source="CVE"/>
		<reference ref_id="CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500/" source="CVE"/>
		<reference ref_id="CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518/" source="CVE"/>
		<reference ref_id="CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537/" source="CVE"/>
		<reference ref_id="CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557/" source="CVE"/>
		<reference ref_id="CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569/" source="CVE"/>
		<reference ref_id="CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571/" source="CVE"/>
		<reference ref_id="CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383/" source="CVE"/>
		<reference ref_id="CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384/" source="CVE"/>
		<reference ref_id="CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407/" source="CVE"/>
		<reference ref_id="CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412/" source="CVE"/>
		<reference ref_id="CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415/" source="CVE"/>
		<reference ref_id="CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417/" source="CVE"/>
		<reference ref_id="CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419/" source="CVE"/>
		<reference ref_id="CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420/" source="CVE"/>
		<reference ref_id="CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421/" source="CVE"/>
		<reference ref_id="CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422/" source="CVE"/>
		<reference ref_id="CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423/" source="CVE"/>
		<reference ref_id="CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424/" source="CVE"/>
		<reference ref_id="CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426/" source="CVE"/>
		<reference ref_id="CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429/" source="CVE"/>
		<reference ref_id="CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430/" source="CVE"/>
		<reference ref_id="CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431/" source="CVE"/>
		<reference ref_id="CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436/" source="CVE"/>
		<reference ref_id="CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443/" source="CVE"/>
		<reference ref_id="CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444/" source="CVE"/>
		<reference ref_id="CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445/" source="CVE"/>
		<reference ref_id="CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446/" source="CVE"/>
		<reference ref_id="CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447/" source="CVE"/>
		<reference ref_id="CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448/" source="CVE"/>
		<reference ref_id="CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449/" source="CVE"/>
		<reference ref_id="CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450/" source="CVE"/>
		<reference ref_id="CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451/" source="CVE"/>
		<reference ref_id="CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452/" source="CVE"/>
		<reference ref_id="CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453/" source="CVE"/>
		<reference ref_id="CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454/" source="CVE"/>
		<reference ref_id="CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455/" source="CVE"/>
		<reference ref_id="CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456/" source="CVE"/>
		<reference ref_id="CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457/" source="CVE"/>
		<reference ref_id="CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458/" source="CVE"/>
		<reference ref_id="CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459/" source="CVE"/>
		<reference ref_id="CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460/" source="CVE"/>
		<reference ref_id="CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461/" source="CVE"/>
		<reference ref_id="CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463/" source="CVE"/>
		<reference ref_id="CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465/" source="CVE"/>
		<reference ref_id="CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469/" source="CVE"/>
		<reference ref_id="CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470/" source="CVE"/>
		<reference ref_id="CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471/" source="CVE"/>
		<reference ref_id="CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472/" source="CVE"/>
		<reference ref_id="CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473/" source="CVE"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805/" source="CVE"/>
		<reference ref_id="CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<reference ref_id="CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878/" source="CVE"/>
		<reference ref_id="CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884/" source="CVE"/>
		<reference ref_id="CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893/" source="CVE"/>
		<reference ref_id="CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896/" source="CVE"/>
		<reference ref_id="CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907/" source="CVE"/>
		<reference ref_id="CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910/" source="CVE"/>
		<reference ref_id="CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368/" source="CVE"/>
		<reference ref_id="CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373/" source="CVE"/>
		<reference ref_id="CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376/" source="CVE"/>
		<reference ref_id="CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408/" source="CVE"/>
		<reference ref_id="CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411/" source="CVE"/>
		<reference ref_id="CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416/" source="CVE"/>
		<reference ref_id="CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422/" source="CVE"/>
		<reference ref_id="CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423/" source="CVE"/>
		<reference ref_id="CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428/" source="CVE"/>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<reference ref_id="CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483/" source="CVE"/>
		<reference ref_id="CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209/" source="CVE"/>
		<reference ref_id="CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216/" source="CVE"/>
		<reference ref_id="CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218/" source="CVE"/>
		<reference ref_id="CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219/" source="CVE"/>
		<reference ref_id="CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221/" source="CVE"/>
		<reference ref_id="CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223/" source="CVE"/>
		<reference ref_id="CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252/" source="CVE"/>
		<reference ref_id="CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262/" source="CVE"/>
		<reference ref_id="CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263/" source="CVE"/>
		<reference ref_id="CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264/" source="CVE"/>
		<reference ref_id="CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266/" source="CVE"/>
		<reference ref_id="CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_0-openjdk-1.7.0.111-33.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79041" version="1" class="patch">
	<metadata>
		<title>java-1_7_1-ibm-1.7.1_sr3.50-28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138/" source="CVE"/>
		<reference ref_id="CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_7_1-ibm-1.7.1_sr3.50-28.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79042" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-ibm-1.8.0_sr3.0-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0486" ref_url="https://www.suse.com/security/cve/CVE-2015-0486/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-ibm-1.8.0_sr3.0-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0486/">CVE-2015-0486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79043" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.101-14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.101-14.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79044" version="1" class="patch">
	<metadata>
		<title>kbd-1.15.5-8.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460/" source="CVE"/>
		<description>
These are all security issues fixed in the kbd-1.15.5-8.7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140693" comment="kbd-1.15.5-8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79045" version="1" class="patch">
	<metadata>
		<title>kdump-0.8.15-28.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.8.15-28.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140694" comment="kdump-0.8.15-28.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79046" version="1" class="patch">
	<metadata>
		<title>kernel-default-4.4.21-69.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939/" source="CVE"/>
		<reference ref_id="CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026/" source="CVE"/>
		<reference ref_id="CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027/" source="CVE"/>
		<reference ref_id="CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131/" source="CVE"/>
		<reference ref_id="CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138/" source="CVE"/>
		<reference ref_id="CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536/" source="CVE"/>
		<reference ref_id="CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538/" source="CVE"/>
		<reference ref_id="CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146/" source="CVE"/>
		<reference ref_id="CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436/" source="CVE"/>
		<reference ref_id="CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641/" source="CVE"/>
		<reference ref_id="CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066/" source="CVE"/>
		<reference ref_id="CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942/" source="CVE"/>
		<reference ref_id="CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954/" source="CVE"/>
		<reference ref_id="CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955/" source="CVE"/>
		<reference ref_id="CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081/" source="CVE"/>
		<reference ref_id="CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296/" source="CVE"/>
		<reference ref_id="CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297/" source="CVE"/>
		<reference ref_id="CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298/" source="CVE"/>
		<reference ref_id="CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301/" source="CVE"/>
		<reference ref_id="CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310/" source="CVE"/>
		<reference ref_id="CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712/" source="CVE"/>
		<reference ref_id="CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020/" source="CVE"/>
		<reference ref_id="CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577/" source="CVE"/>
		<reference ref_id="CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203/" source="CVE"/>
		<reference ref_id="CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056/" source="CVE"/>
		<reference ref_id="CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160/" source="CVE"/>
		<reference ref_id="CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231/" source="CVE"/>
		<reference ref_id="CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913/" source="CVE"/>
		<reference ref_id="CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850/" source="CVE"/>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038/" source="CVE"/>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<reference ref_id="CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691/" source="CVE"/>
		<reference ref_id="CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833/" source="CVE"/>
		<reference ref_id="CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884/" source="CVE"/>
		<reference ref_id="CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885/" source="CVE"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0617" ref_url="https://www.suse.com/security/cve/CVE-2016-0617/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<reference ref_id="CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237/" source="CVE"/>
		<reference ref_id="CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184/" source="CVE"/>
		<reference ref_id="CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185/" source="CVE"/>
		<reference ref_id="CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186/" source="CVE"/>
		<reference ref_id="CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188/" source="CVE"/>
		<reference ref_id="CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135/" source="CVE"/>
		<reference ref_id="CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136/" source="CVE"/>
		<reference ref_id="CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137/" source="CVE"/>
		<reference ref_id="CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689/" source="CVE"/>
		<reference ref_id="CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713/" source="CVE"/>
		<reference ref_id="CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<reference ref_id="CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482/" source="CVE"/>
		<reference ref_id="CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486/" source="CVE"/>
		<reference ref_id="CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557/" source="CVE"/>
		<reference ref_id="CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794/" source="CVE"/>
		<reference ref_id="CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805/" source="CVE"/>
		<reference ref_id="CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<reference ref_id="CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998/" source="CVE"/>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<reference ref_id="CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412/" source="CVE"/>
		<reference ref_id="CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696/" source="CVE"/>
		<reference ref_id="CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-4.4.21-69.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0617/">CVE-2016-0617</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79047" version="1" class="patch">
	<metadata>
		<title>krb5-1.12.5-39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443/" source="CVE"/>
		<reference ref_id="CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844/" source="CVE"/>
		<reference ref_id="CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845/" source="CVE"/>
		<reference ref_id="CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846/" source="CVE"/>
		<reference ref_id="CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847/" source="CVE"/>
		<reference ref_id="CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295/" source="CVE"/>
		<reference ref_id="CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212/" source="CVE"/>
		<reference ref_id="CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283/" source="CVE"/>
		<reference ref_id="CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628/" source="CVE"/>
		<reference ref_id="CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320/" source="CVE"/>
		<reference ref_id="CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321/" source="CVE"/>
		<reference ref_id="CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322/" source="CVE"/>
		<reference ref_id="CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323/" source="CVE"/>
		<reference ref_id="CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324/" source="CVE"/>
		<reference ref_id="CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020/" source="CVE"/>
		<reference ref_id="CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021/" source="CVE"/>
		<reference ref_id="CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022/" source="CVE"/>
		<reference ref_id="CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281/" source="CVE"/>
		<reference ref_id="CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282/" source="CVE"/>
		<reference ref_id="CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284/" source="CVE"/>
		<reference ref_id="CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285/" source="CVE"/>
		<reference ref_id="CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527/" source="CVE"/>
		<reference ref_id="CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528/" source="CVE"/>
		<reference ref_id="CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529/" source="CVE"/>
		<reference ref_id="CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530/" source="CVE"/>
		<reference ref_id="CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012/" source="CVE"/>
		<reference ref_id="CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013/" source="CVE"/>
		<reference ref_id="CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016/" source="CVE"/>
		<reference ref_id="CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415/" source="CVE"/>
		<reference ref_id="CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417/" source="CVE"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.12.5-39.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79048" version="1" class="patch">
	<metadata>
		<title>krb5-appl-clients-1.0.3-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526/" source="CVE"/>
		<reference ref_id="CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-appl-clients-1.0.3-1.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140712" comment="krb5-appl-servers-1.0.3-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79049" version="1" class="patch">
	<metadata>
		<title>libFLAC++6-1.3.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
These are all security issues fixed in the libFLAC++6-1.3.0-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79050" version="1" class="patch">
	<metadata>
		<title>libHX28-3.18-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX28-3.18-1.18 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79051" version="1" class="patch">
	<metadata>
		<title>libIlmImf-Imf_2_1-21-2.1.0-4.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720/" source="CVE"/>
		<reference ref_id="CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-Imf_2_1-21-2.1.0-4.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79052" version="1" class="patch">
	<metadata>
		<title>libMagickCore-6_Q16-1-6.8.8.1-33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247/" source="CVE"/>
		<reference ref_id="CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248/" source="CVE"/>
		<reference ref_id="CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185/" source="CVE"/>
		<reference ref_id="CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186/" source="CVE"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<reference ref_id="CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805/" source="CVE"/>
		<reference ref_id="CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806/" source="CVE"/>
		<reference ref_id="CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807/" source="CVE"/>
		<reference ref_id="CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808/" source="CVE"/>
		<reference ref_id="CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809/" source="CVE"/>
		<reference ref_id="CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810/" source="CVE"/>
		<reference ref_id="CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811/" source="CVE"/>
		<reference ref_id="CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812/" source="CVE"/>
		<reference ref_id="CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813/" source="CVE"/>
		<reference ref_id="CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814/" source="CVE"/>
		<reference ref_id="CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815/" source="CVE"/>
		<reference ref_id="CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816/" source="CVE"/>
		<reference ref_id="CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817/" source="CVE"/>
		<reference ref_id="CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818/" source="CVE"/>
		<reference ref_id="CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819/" source="CVE"/>
		<reference ref_id="CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820/" source="CVE"/>
		<reference ref_id="CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821/" source="CVE"/>
		<reference ref_id="CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822/" source="CVE"/>
		<reference ref_id="CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823/" source="CVE"/>
		<reference ref_id="CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824/" source="CVE"/>
		<reference ref_id="CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825/" source="CVE"/>
		<reference ref_id="CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826/" source="CVE"/>
		<reference ref_id="CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828/" source="CVE"/>
		<reference ref_id="CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829/" source="CVE"/>
		<reference ref_id="CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830/" source="CVE"/>
		<reference ref_id="CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831/" source="CVE"/>
		<reference ref_id="CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832/" source="CVE"/>
		<reference ref_id="CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833/" source="CVE"/>
		<reference ref_id="CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834/" source="CVE"/>
		<reference ref_id="CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835/" source="CVE"/>
		<reference ref_id="CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836/" source="CVE"/>
		<reference ref_id="CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837/" source="CVE"/>
		<reference ref_id="CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838/" source="CVE"/>
		<reference ref_id="CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839/" source="CVE"/>
		<reference ref_id="CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840/" source="CVE"/>
		<reference ref_id="CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841/" source="CVE"/>
		<reference ref_id="CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842/" source="CVE"/>
		<reference ref_id="CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843/" source="CVE"/>
		<reference ref_id="CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844/" source="CVE"/>
		<reference ref_id="CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845/" source="CVE"/>
		<reference ref_id="CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846/" source="CVE"/>
		<reference ref_id="CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847/" source="CVE"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849/" source="CVE"/>
		<reference ref_id="CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850/" source="CVE"/>
		<reference ref_id="CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851/" source="CVE"/>
		<reference ref_id="CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852/" source="CVE"/>
		<reference ref_id="CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853/" source="CVE"/>
		<reference ref_id="CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854/" source="CVE"/>
		<reference ref_id="CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894/" source="CVE"/>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900/" source="CVE"/>
		<reference ref_id="CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901/" source="CVE"/>
		<reference ref_id="CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902/" source="CVE"/>
		<reference ref_id="CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903/" source="CVE"/>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562/" source="CVE"/>
		<reference ref_id="CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563/" source="CVE"/>
		<reference ref_id="CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564/" source="CVE"/>
		<reference ref_id="CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687/" source="CVE"/>
		<reference ref_id="CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688/" source="CVE"/>
		<reference ref_id="CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689/" source="CVE"/>
		<reference ref_id="CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690/" source="CVE"/>
		<reference ref_id="CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691/" source="CVE"/>
		<reference ref_id="CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841/" source="CVE"/>
		<reference ref_id="CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842/" source="CVE"/>
		<reference ref_id="CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491/" source="CVE"/>
		<reference ref_id="CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520/" source="CVE"/>
		<description>
These are all security issues fixed in the libMagickCore-6_Q16-1-6.8.8.1-33.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79053" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent5-5.6.1-11.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent5-5.6.1-11.7 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79054" version="1" class="patch">
	<metadata>
		<title>libQt5WebKit5-5.6.1-9.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5WebKit5-5.6.1-9.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140736" comment="libQt5WebKit5-5.6.1-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140737" comment="libQt5WebKit5-imports-5.6.1-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140738" comment="libQt5WebKitWidgets5-5.6.1-9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79055" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.2-4.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.2-4.10 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79056" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.0.7-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.0.7-3.53 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79057" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.14-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.14-3.59 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79058" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.2-3.60 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.2-3.60 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79059" version="1" class="patch">
	<metadata>
		<title>libXfixes3-32bit-5.0.1-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-32bit-5.0.1-3.53 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140750" comment="libXfixes3-5.0.1-3.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140751" comment="libXfixes3-32bit-5.0.1-3.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79060" version="1" class="patch">
	<metadata>
		<title>libXfont1-1.5.1-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont1-1.5.1-10.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79061" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.4-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.4-9.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79062" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-3.54 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-3.54 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79063" version="1" class="patch">
	<metadata>
		<title>libXp6-1.0.2-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-1.0.2-3.57 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79064" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.0-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.0-6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79065" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.8-3.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.8-3.55 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140761" comment="libXrender1-0.9.8-3.56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140762" comment="libXrender1-32bit-0.9.8-3.56 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79066" version="1" class="patch">
	<metadata>
		<title>libXt6-1.1.4-3.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-1.1.4-3.57 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79067" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.2-3.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.2-3.59 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140765" comment="libXtst6-1.2.2-3.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140766" comment="libXtst6-32bit-1.2.2-3.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79068" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.10-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.10-3.56 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79069" version="1" class="patch">
	<metadata>
		<title>libXvMC1-1.0.8-3.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC1-1.0.8-3.56 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79070" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.6.0-12.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011/" source="CVE"/>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.6.0-12.6 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79071" version="1" class="patch">
	<metadata>
		<title>libXxf86dga1-1.1.4-3.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga1-1.1.4-3.58 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79072" version="1" class="patch">
	<metadata>
		<title>libXxf86vm1-1.1.3-3.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm1-1.1.3-3.53 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79073" version="1" class="patch">
	<metadata>
		<title>libapr-util1-1.5.3-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023/" source="CVE"/>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560/" source="CVE"/>
		<reference ref_id="CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720/" source="CVE"/>
		<reference ref_id="CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-1.5.3-1.46 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79074" version="1" class="patch">
	<metadata>
		<title>libapr1-1.5.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412/" source="CVE"/>
		<reference ref_id="CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419/" source="CVE"/>
		<reference ref_id="CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr1-1.5.1-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140778" comment="libapr1-1.5.1-2.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79075" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.1.2-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.1.2-22.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79076" version="1" class="patch">
	<metadata>
		<title>libasan2-32bit-5.3.1+r233831-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<description>
These are all security issues fixed in the libasan2-32bit-5.3.1+r233831-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125716" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125717" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125723" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125724" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125734" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125735" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125736" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125737" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79077" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.28-40.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157/" source="CVE"/>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.28-40.28 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79078" version="1" class="patch">
	<metadata>
		<title>libcgroup-tools-0.41.rc1-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006/" source="CVE"/>
		<reference ref_id="CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup-tools-0.41.rc1-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140792" comment="libcgroup-tools-0.41.rc1-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79079" version="1" class="patch">
	<metadata>
		<title>libdcerpc-atsvc0-4.2.4-26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-atsvc0-4.2.4-26.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79080" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.4.2-29.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886/" source="CVE"/>
		<reference ref_id="CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888/" source="CVE"/>
		<reference ref_id="CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813/" source="CVE"/>
		<reference ref_id="CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906/" source="CVE"/>
		<reference ref_id="CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948/" source="CVE"/>
		<reference ref_id="CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547/" source="CVE"/>
		<reference ref_id="CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728/" source="CVE"/>
		<reference ref_id="CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787/" source="CVE"/>
		<reference ref_id="CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926/" source="CVE"/>
		<reference ref_id="CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635/" source="CVE"/>
		<reference ref_id="CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642/" source="CVE"/>
		<reference ref_id="CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063/" source="CVE"/>
		<reference ref_id="CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069/" source="CVE"/>
		<reference ref_id="CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719/" source="CVE"/>
		<reference ref_id="CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522/" source="CVE"/>
		<reference ref_id="CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694/" source="CVE"/>
		<reference ref_id="CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817/" source="CVE"/>
		<reference ref_id="CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870/" source="CVE"/>
		<reference ref_id="CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182/" source="CVE"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172/" source="CVE"/>
		<reference ref_id="CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213/" source="CVE"/>
		<reference ref_id="CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214/" source="CVE"/>
		<reference ref_id="CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454/" source="CVE"/>
		<reference ref_id="CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863/" source="CVE"/>
		<reference ref_id="CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<reference ref_id="CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476/" source="CVE"/>
		<reference ref_id="CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496/" source="CVE"/>
		<reference ref_id="CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442/" source="CVE"/>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.4.2-29.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79081" version="1" class="patch">
	<metadata>
		<title>libdmx1-1.1.3-3.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx1-1.1.3-3.51 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79082" version="1" class="patch">
	<metadata>
		<title>libecpg6-9.4.9-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600/" source="CVE"/>
		<reference ref_id="CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034/" source="CVE"/>
		<reference ref_id="CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136/" source="CVE"/>
		<reference ref_id="CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169/" source="CVE"/>
		<reference ref_id="CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170/" source="CVE"/>
		<reference ref_id="CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866/" source="CVE"/>
		<reference ref_id="CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867/" source="CVE"/>
		<reference ref_id="CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868/" source="CVE"/>
		<reference ref_id="CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143/" source="CVE"/>
		<reference ref_id="CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655/" source="CVE"/>
		<reference ref_id="CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488/" source="CVE"/>
		<reference ref_id="CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489/" source="CVE"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<reference ref_id="CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067/" source="CVE"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-9.4.9-14.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79083" version="1" class="patch">
	<metadata>
		<title>libevent-2_0-5-2.0.21-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_0-5-2.0.21-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79084" version="1" class="patch">
	<metadata>
		<title>libexif12-0.6.21-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif12-0.6.21-6.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79085" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.21.1-46.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620/" source="CVE"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<reference ref_id="CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.21.1-46.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79086" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.6.3-7.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946/" source="CVE"/>
		<reference ref_id="CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497/" source="CVE"/>
		<reference ref_id="CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805/" source="CVE"/>
		<reference ref_id="CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053/" source="CVE"/>
		<reference ref_id="CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054/" source="CVE"/>
		<reference ref_id="CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311/" source="CVE"/>
		<reference ref_id="CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814/" source="CVE"/>
		<reference ref_id="CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855/" source="CVE"/>
		<reference ref_id="CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226/" source="CVE"/>
		<reference ref_id="CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256/" source="CVE"/>
		<reference ref_id="CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439/" source="CVE"/>
		<reference ref_id="CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126/" source="CVE"/>
		<reference ref_id="CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127/" source="CVE"/>
		<reference ref_id="CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128/" source="CVE"/>
		<reference ref_id="CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129/" source="CVE"/>
		<reference ref_id="CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130/" source="CVE"/>
		<reference ref_id="CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131/" source="CVE"/>
		<reference ref_id="CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132/" source="CVE"/>
		<reference ref_id="CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133/" source="CVE"/>
		<reference ref_id="CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134/" source="CVE"/>
		<reference ref_id="CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135/" source="CVE"/>
		<reference ref_id="CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136/" source="CVE"/>
		<reference ref_id="CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137/" source="CVE"/>
		<reference ref_id="CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138/" source="CVE"/>
		<reference ref_id="CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139/" source="CVE"/>
		<reference ref_id="CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140/" source="CVE"/>
		<reference ref_id="CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141/" source="CVE"/>
		<reference ref_id="CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142/" source="CVE"/>
		<reference ref_id="CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143/" source="CVE"/>
		<reference ref_id="CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144/" source="CVE"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<reference ref_id="CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670/" source="CVE"/>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.6.3-7.8.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79087" version="1" class="patch">
	<metadata>
		<title>libgc1-7.2d-3.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the libgc1-7.2d-3.75 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140590" comment="libgc1-7.2d-3.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79088" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.6.1-16.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.6.1-16.33.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131935" comment="libgcrypt20-hmac-1.6.1-16.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131936" comment="libgcrypt20-hmac-32bit-1.6.1-16.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79089" version="1" class="patch">
	<metadata>
		<title>libgnomesu-2.0.0-353.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946/" source="CVE"/>
		<description>
These are all security issues fixed in the libgnomesu-2.0.0-353.6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79090" version="1" class="patch">
	<metadata>
		<title>libgoa-1_0-0-3.20.4-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240/" source="CVE"/>
		<reference ref_id="CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799/" source="CVE"/>
		<description>
These are all security issues fixed in the libgoa-1_0-0-3.20.4-7.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140636" comment="libgoa-1_0-0-3.20.4-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140637" comment="libgoa-backend-1_0-1-3.20.4-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79091" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.1-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79092" version="1" class="patch">
	<metadata>
		<title>libgssglue1-0.4-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709/" source="CVE"/>
		<description>
These are all security issues fixed in the libgssglue1-0.4-3.76 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79093" version="1" class="patch">
	<metadata>
		<title>libgypsy0-0.9-6.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the libgypsy0-0.9-6.22 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79094" version="1" class="patch">
	<metadata>
		<title>libhivex0-1.3.10-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9273" ref_url="https://www.suse.com/security/cve/CVE-2014-9273/" source="CVE"/>
		<description>
These are all security issues fixed in the libhivex0-1.3.10-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9273/">CVE-2014-9273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106170" comment="libhivex0-1.3.10-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106171" comment="perl-Win-Hivex-1.3.10-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79095" version="1" class="patch">
	<metadata>
		<title>libhogweed2-2.7.1-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed2-2.7.1-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79096" version="1" class="patch">
	<metadata>
		<title>libicu-doc-52.1-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-doc-52.1-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107570" comment="libicu-doc-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79097" version="1" class="patch">
	<metadata>
		<title>libidn-tools-1.28-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn-tools-1.28-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79098" version="1" class="patch">
	<metadata>
		<title>libimobiledevice6-1.2.0-7.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142/" source="CVE"/>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libimobiledevice6-1.2.0-7.31 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79099" version="1" class="patch">
	<metadata>
		<title>libipa_hbac0-1.13.4-18.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341/" source="CVE"/>
		<reference ref_id="CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758/" source="CVE"/>
		<reference ref_id="CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219/" source="CVE"/>
		<reference ref_id="CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220/" source="CVE"/>
		<reference ref_id="CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac0-1.13.4-18.10 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79100" version="1" class="patch">
	<metadata>
		<title>libjansson4-2.7-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson4-2.7-1.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140861" comment="libjansson4-2.7-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79101" version="1" class="patch">
	<metadata>
		<title>libjasper1-1.900.1-170.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper1-1.900.1-170.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79102" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-3_0-0-2.4.11-23.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112/" source="CVE"/>
		<reference ref_id="CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133/" source="CVE"/>
		<reference ref_id="CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344/" source="CVE"/>
		<reference ref_id="CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384/" source="CVE"/>
		<reference ref_id="CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385/" source="CVE"/>
		<reference ref_id="CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386/" source="CVE"/>
		<reference ref_id="CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387/" source="CVE"/>
		<reference ref_id="CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388/" source="CVE"/>
		<reference ref_id="CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389/" source="CVE"/>
		<reference ref_id="CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390/" source="CVE"/>
		<reference ref_id="CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748/" source="CVE"/>
		<reference ref_id="CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071/" source="CVE"/>
		<reference ref_id="CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076/" source="CVE"/>
		<reference ref_id="CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081/" source="CVE"/>
		<reference ref_id="CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083/" source="CVE"/>
		<reference ref_id="CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120/" source="CVE"/>
		<reference ref_id="CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122/" source="CVE"/>
		<reference ref_id="CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127/" source="CVE"/>
		<reference ref_id="CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153/" source="CVE"/>
		<reference ref_id="CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155/" source="CVE"/>
		<reference ref_id="CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330/" source="CVE"/>
		<reference ref_id="CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658/" source="CVE"/>
		<reference ref_id="CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659/" source="CVE"/>
		<reference ref_id="CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727/" source="CVE"/>
		<reference ref_id="CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731/" source="CVE"/>
		<reference ref_id="CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741/" source="CVE"/>
		<reference ref_id="CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743/" source="CVE"/>
		<reference ref_id="CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745/" source="CVE"/>
		<reference ref_id="CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747/" source="CVE"/>
		<reference ref_id="CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748/" source="CVE"/>
		<reference ref_id="CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749/" source="CVE"/>
		<reference ref_id="CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752/" source="CVE"/>
		<reference ref_id="CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788/" source="CVE"/>
		<reference ref_id="CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794/" source="CVE"/>
		<reference ref_id="CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801/" source="CVE"/>
		<reference ref_id="CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809/" source="CVE"/>
		<reference ref_id="CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822/" source="CVE"/>
		<reference ref_id="CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-3_0-0-2.4.11-23.20 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79103" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.12.5-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.12.5-1.12 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79104" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.0-12.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.0-12.13 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140689" comment="libjbig2-2.0-12.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79105" version="1" class="patch">
	<metadata>
		<title>libjpeg-turbo-1.3.1-30.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg-turbo-1.3.1-30.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79106" version="1" class="patch">
	<metadata>
		<title>libjson-c2-0.11-2.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c2-0.11-2.15 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79107" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.0-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.0-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79108" version="1" class="patch">
	<metadata>
		<title>liblcms1-1.19-17.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>
These are all security issues fixed in the liblcms1-1.19-17.28 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79109" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.41-18.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.41-18.25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140872" comment="openldap2-2.4.41-18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140873" comment="openldap2-back-meta-2.4.41-18.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79110" version="1" class="patch">
	<metadata>
		<title>libldb1-1.1.26-10.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb1-1.1.26-10.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140715" comment="libldb1-1.1.26-10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140716" comment="libldb1-32bit-1.1.26-10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79111" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.2-14.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.2-14.30 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140875" comment="libltdl7-2.4.2-14.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140876" comment="libltdl7-32bit-2.4.2-14.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140877" comment="libtool-2.4.2-14.60 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140878" comment="libtool-32bit-2.4.2-14.60 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79112" version="1" class="patch">
	<metadata>
		<title>liblua5_2-32bit-5.2.2-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_2-32bit-5.2.2-4.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140879" comment="liblua5_2-5.2.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140880" comment="liblua5_2-32bit-5.2.2-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140881" comment="lua-5.2.2-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79113" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.08-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.08-1.13 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140882" comment="liblzo2-2-2.08-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79114" version="1" class="patch">
	<metadata>
		<title>libmms0-0.6.2-15.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms0-0.6.2-15.8 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79115" version="1" class="patch">
	<metadata>
		<title>libmodplug1-0.8.8.4-13.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761/" source="CVE"/>
		<reference ref_id="CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233/" source="CVE"/>
		<reference ref_id="CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug1-0.8.8.4-13.63 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79116" version="1" class="patch">
	<metadata>
		<title>libmpfr4-3.1.2-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr4-3.1.2-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105815" comment="libmpfr4-32bit-3.1.2-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79117" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.4-14.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.4-14.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79118" version="1" class="patch">
	<metadata>
		<title>libmusicbrainz4-2.1.5-27.79 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197/" source="CVE"/>
		<description>
These are all security issues fixed in the libmusicbrainz4-2.1.5-27.79 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79119" version="1" class="patch">
	<metadata>
		<title>libmysqlclient18-10.0.27-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970/" source="CVE"/>
		<reference ref_id="CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247/" source="CVE"/>
		<reference ref_id="CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019/" source="CVE"/>
		<reference ref_id="CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028/" source="CVE"/>
		<reference ref_id="CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474/" source="CVE"/>
		<reference ref_id="CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489/" source="CVE"/>
		<reference ref_id="CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491/" source="CVE"/>
		<reference ref_id="CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494/" source="CVE"/>
		<reference ref_id="CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495/" source="CVE"/>
		<reference ref_id="CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496/" source="CVE"/>
		<reference ref_id="CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<reference ref_id="CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564/" source="CVE"/>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<description>
These are all security issues fixed in the libmysqlclient18-10.0.27-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79120" version="1" class="patch">
	<metadata>
		<title>libneon27-0.30.0-3.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473/" source="CVE"/>
		<reference ref_id="CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474/" source="CVE"/>
		<description>
These are all security issues fixed in the libneon27-0.30.0-3.64 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140888" comment="libneon27-32bit-0.30.0-3.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79121" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.7.1-1.84 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.7.1-1.84 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140889" comment="libnghttp2-14-1.7.1-1.84 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79122" version="1" class="patch">
	<metadata>
		<title>libnm-glib-vpn1-1.0.12-8.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
These are all security issues fixed in the libnm-glib-vpn1-1.0.12-8.6 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140431" comment="libnm-glib-vpn1-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140432" comment="libnm-glib4-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140433" comment="libnm-util2-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140434" comment="libnm0-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140435" comment="typelib-1_0-NMClient-1_0-1.0.12-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140436" comment="typelib-1_0-NetworkManager-1_0-1.0.12-8.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79123" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.0.2j-55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250/" source="CVE"/>
		<reference ref_id="CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077/" source="CVE"/>
		<reference ref_id="CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590/" source="CVE"/>
		<reference ref_id="CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591/" source="CVE"/>
		<reference ref_id="CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789/" source="CVE"/>
		<reference ref_id="CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377/" source="CVE"/>
		<reference ref_id="CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378/" source="CVE"/>
		<reference ref_id="CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379/" source="CVE"/>
		<reference ref_id="CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386/" source="CVE"/>
		<reference ref_id="CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387/" source="CVE"/>
		<reference ref_id="CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740/" source="CVE"/>
		<reference ref_id="CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742/" source="CVE"/>
		<reference ref_id="CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633/" source="CVE"/>
		<reference ref_id="CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939/" source="CVE"/>
		<reference ref_id="CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864/" source="CVE"/>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014/" source="CVE"/>
		<reference ref_id="CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207/" source="CVE"/>
		<reference ref_id="CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210/" source="CVE"/>
		<reference ref_id="CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108/" source="CVE"/>
		<reference ref_id="CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576/" source="CVE"/>
		<reference ref_id="CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577/" source="CVE"/>
		<reference ref_id="CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619/" source="CVE"/>
		<reference ref_id="CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027/" source="CVE"/>
		<reference ref_id="CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050/" source="CVE"/>
		<reference ref_id="CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884/" source="CVE"/>
		<reference ref_id="CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165/" source="CVE"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<reference ref_id="CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<reference ref_id="CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353/" source="CVE"/>
		<reference ref_id="CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449/" source="CVE"/>
		<reference ref_id="CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450/" source="CVE"/>
		<reference ref_id="CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076/" source="CVE"/>
		<reference ref_id="CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<reference ref_id="CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505/" source="CVE"/>
		<reference ref_id="CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506/" source="CVE"/>
		<reference ref_id="CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507/" source="CVE"/>
		<reference ref_id="CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508/" source="CVE"/>
		<reference ref_id="CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509/" source="CVE"/>
		<reference ref_id="CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510/" source="CVE"/>
		<reference ref_id="CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511/" source="CVE"/>
		<reference ref_id="CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.0.2j-55.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79124" version="1" class="patch">
	<metadata>
		<title>libotr5-4.0.0-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr5-4.0.0-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79125" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.40.1-9.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020/" source="CVE"/>
		<reference ref_id="CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.40.1-9.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79126" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.10-3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407/" source="CVE"/>
		<reference ref_id="CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.10-3.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79127" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.50-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.50-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79128" version="1" class="patch">
	<metadata>
		<title>libpng15-15-1.5.22-4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng15-15-1.5.22-4.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79129" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.8-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690/" source="CVE"/>
		<reference ref_id="CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691/" source="CVE"/>
		<reference ref_id="CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692/" source="CVE"/>
		<reference ref_id="CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328/" source="CVE"/>
		<reference ref_id="CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954/" source="CVE"/>
		<reference ref_id="CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.8-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79130" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.113-5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750/" source="CVE"/>
		<reference ref_id="CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.113-5.6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79131" version="1" class="patch">
	<metadata>
		<title>libpoppler-glib8-0.43.0-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-glib8-0.43.0-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79132" version="1" class="patch">
	<metadata>
		<title>libpoppler44-0.24.4-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler44-0.24.4-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79133" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.13-16.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.13-16.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79134" version="1" class="patch">
	<metadata>
		<title>libpulse-mainloop-glib0-32bit-5.0-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>
These are all security issues fixed in the libpulse-mainloop-glib0-32bit-5.0-2.7 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140915" comment="libpulse-mainloop-glib0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140916" comment="libpulse-mainloop-glib0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140917" comment="libpulse0-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140918" comment="libpulse0-32bit-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140919" comment="pulseaudio-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140920" comment="pulseaudio-esound-compat-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140921" comment="pulseaudio-gdm-hooks-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140922" comment="pulseaudio-lang-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140923" comment="pulseaudio-module-x11-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140924" comment="pulseaudio-module-zeroconf-5.0-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140925" comment="pulseaudio-utils-5.0-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79135" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.9-24.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.9-24.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79136" version="1" class="patch">
	<metadata>
		<title>libpython3_4m1_0-3.4.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944/" source="CVE"/>
		<reference ref_id="CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845/" source="CVE"/>
		<reference ref_id="CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150/" source="CVE"/>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_4m1_0-3.4.1-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79137" version="1" class="patch">
	<metadata>
		<title>libqt4-32bit-4.8.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945/" source="CVE"/>
		<reference ref_id="CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193/" source="CVE"/>
		<reference ref_id="CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093/" source="CVE"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<reference ref_id="CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190/" source="CVE"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<description>
These are all security issues fixed in the libqt4-32bit-4.8.6-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79138" version="1" class="patch">
	<metadata>
		<title>libraptor2-0-2.0.10-3.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor2-0-2.0.10-3.63 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79139" version="1" class="patch">
	<metadata>
		<title>libruby2_1-2_1-2.1.2-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_1-2_1-2.1.2-12.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140929" comment="libruby2_1-2_1-2.1.2-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140930" comment="ruby2.1-2.1.2-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140931" comment="ruby2.1-stdlib-2.1.2-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79140" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-18.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-18.55 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79141" version="1" class="patch">
	<metadata>
		<title>libsndfile1-1.0.25-25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile1-1.0.25-25.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79142" version="1" class="patch">
	<metadata>
		<title>libsnmp30-32bit-5.7.3-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141/" source="CVE"/>
		<reference ref_id="CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284/" source="CVE"/>
		<reference ref_id="CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285/" source="CVE"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-32bit-5.7.3-4.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79143" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.54.1-4.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.54.1-4.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140939" comment="libsoup-2_4-1-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140940" comment="libsoup-2_4-1-32bit-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140941" comment="libsoup-lang-2.54.1-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140942" comment="typelib-1_0-Soup-2_4-2.54.1-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79144" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.31-7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.31-7.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140943" comment="libspice-client-glib-2_0-8-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140944" comment="libspice-client-glib-helper-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140945" comment="libspice-client-gtk-2_0-4-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140946" comment="libspice-client-gtk-3_0-4-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140947" comment="libspice-controller0-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140948" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140949" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79145" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.12.7-6.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.12.7-6.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79146" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.8.10.2-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.8.10.2-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130774" comment="libsqlite3-0-3.8.10.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130775" comment="libsqlite3-0-32bit-3.8.10.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130776" comment="sqlite3-3.8.10.2-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79147" version="1" class="patch">
	<metadata>
		<title>libsrtp1-1.5.2-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp1-1.5.2-2.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140951" comment="libsrtp1-1.5.2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79148" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.4.3-19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.4.3-19.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79149" version="1" class="patch">
	<metadata>
		<title>libsystemd0-228-117.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174/" source="CVE"/>
		<reference ref_id="CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288/" source="CVE"/>
		<reference ref_id="CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-228-117.12 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79150" version="1" class="patch">
	<metadata>
		<title>libtag1-1.9.1-1.218 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.9.1-1.218 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79151" version="1" class="patch">
	<metadata>
		<title>libtasn1-3.7-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-3.7-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79152" version="1" class="patch">
	<metadata>
		<title>libtcnative-1-0-1.1.32-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the libtcnative-1-0-1.1.32-9.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131759" comment="libtcnative-1-0-1.1.32-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79153" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.25-4.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.25-4.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79154" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.6-26.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.6-26.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79155" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.1.3-1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.1.3-1.13 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79156" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.7.1-4.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.7.1-4.55 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140972" comment="libupsclient1-2.7.1-4.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140973" comment="nut-2.7.1-4.84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140974" comment="nut-drivers-net-2.7.1-4.84 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79157" version="1" class="patch">
	<metadata>
		<title>libusbmuxd4-1.0.10-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libusbmuxd4-1.0.10-2.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79158" version="1" class="patch">
	<metadata>
		<title>libvdpau1-1.1.1-6.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau1-1.1.1-6.73 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79159" version="1" class="patch">
	<metadata>
		<title>libvirt-2.0.0-26.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242/" source="CVE"/>
		<reference ref_id="CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146/" source="CVE"/>
		<reference ref_id="CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511/" source="CVE"/>
		<reference ref_id="CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600/" source="CVE"/>
		<reference ref_id="CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445/" source="CVE"/>
		<reference ref_id="CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170/" source="CVE"/>
		<reference ref_id="CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962/" source="CVE"/>
		<reference ref_id="CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218/" source="CVE"/>
		<reference ref_id="CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230/" source="CVE"/>
		<reference ref_id="CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153/" source="CVE"/>
		<reference ref_id="CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154/" source="CVE"/>
		<reference ref_id="CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239/" source="CVE"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<reference ref_id="CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297/" source="CVE"/>
		<reference ref_id="CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311/" source="CVE"/>
		<reference ref_id="CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399/" source="CVE"/>
		<reference ref_id="CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400/" source="CVE"/>
		<reference ref_id="CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401/" source="CVE"/>
		<reference ref_id="CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436/" source="CVE"/>
		<reference ref_id="CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457/" source="CVE"/>
		<reference ref_id="CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447/" source="CVE"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-2.0.0-26.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79160" version="1" class="patch">
	<metadata>
		<title>libvncclient0-0.9.9-16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<description>
These are all security issues fixed in the libvncclient0-0.9.9-16.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79161" version="1" class="patch">
	<metadata>
		<title>libvorbis-doc-1.3.3-8.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-doc-1.3.3-8.23 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009140997" comment="libvorbis-doc-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140998" comment="libvorbis0-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141000" comment="libvorbisenc2-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141002" comment="libvorbisfile3-1.3.3-8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79162" version="1" class="patch">
	<metadata>
		<title>libvte9-0.28.2-19.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738/" source="CVE"/>
		<description>
These are all security issues fixed in the libvte9-0.28.2-19.7 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141005" comment="python-vte-0.28.2-19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141006" comment="vte2-lang-0.28.2-19.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79163" version="1" class="patch">
	<metadata>
		<title>libxcb-dri2-0-1.10-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-dri2-0-1.10-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141007" comment="libxcb-dri2-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141008" comment="libxcb-dri2-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141009" comment="libxcb-dri3-0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141010" comment="libxcb-dri3-0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141011" comment="libxcb-glx0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141012" comment="libxcb-glx0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141013" comment="libxcb-present0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141014" comment="libxcb-present0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141015" comment="libxcb-randr0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141016" comment="libxcb-render0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141017" comment="libxcb-render0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141018" comment="libxcb-shape0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141019" comment="libxcb-shm0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141020" comment="libxcb-shm0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141021" comment="libxcb-sync1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141022" comment="libxcb-sync1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141023" comment="libxcb-xf86dri0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141024" comment="libxcb-xfixes0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141025" comment="libxcb-xfixes0-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141026" comment="libxcb-xinerama0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141027" comment="libxcb-xkb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141028" comment="libxcb-xkb1-32bit-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141029" comment="libxcb-xv0-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141030" comment="libxcb1-1.10-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141031" comment="libxcb1-32bit-1.10-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79164" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.1-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885/" source="CVE"/>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.1-12.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79165" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.4-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494/" source="CVE"/>
		<reference ref_id="CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338/" source="CVE"/>
		<reference ref_id="CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969/" source="CVE"/>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.4-27.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79166" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.6-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.6-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79167" version="1" class="patch">
	<metadata>
		<title>libzip2-0.11.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip2-0.11.1-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79168" version="1" class="patch">
	<metadata>
		<title>logrotate-3.8.7-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.8.7-3.14 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79169" version="1" class="patch">
	<metadata>
		<title>logwatch-7.4.3-15.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018/" source="CVE"/>
		<description>
These are all security issues fixed in the logwatch-7.4.3-15.65 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141039" comment="logwatch-7.4.3-15.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79170" version="1" class="patch">
	<metadata>
		<title>mailman-2.1.17-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707/" source="CVE"/>
		<description>
These are all security issues fixed in the mailman-2.1.17-1.18 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141040" comment="mailman-2.1.17-1.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79171" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-28.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79172" version="1" class="patch">
	<metadata>
		<title>mipv6d-2.0.2.umip.0.4-19.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522/" source="CVE"/>
		<reference ref_id="CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523/" source="CVE"/>
		<description>
These are all security issues fixed in the mipv6d-2.0.2.umip.0.4-19.63 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79173" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.12-15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.12-15.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009129286" comment="mozilla-nspr-4.12-15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009129287" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79174" version="1" class="patch">
	<metadata>
		<title>mutt-1.6.0-54.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.6.0-54.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79175" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139/" source="CVE"/>
		<reference ref_id="CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p8-14.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79176" version="1" class="patch">
	<metadata>
		<title>opensc-0.13.0-1.107 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368/" source="CVE"/>
		<reference ref_id="CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.13.0-1.107 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79177" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131123" comment="openslp-2.0.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131124" comment="openslp-32bit-2.0.0-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131940" comment="openslp-server-2.0.0-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79178" version="1" class="patch">
	<metadata>
		<title>openssh-7.2p2-55.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-7.2p2-55.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79179" version="1" class="patch">
	<metadata>
		<title>openvpn-2.3.8-16.6.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.3.8-16.6.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141048" comment="openvpn-2.3.8-16.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141049" comment="openvpn-auth-pam-plugin-2.3.8-16.6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79180" version="1" class="patch">
	<metadata>
		<title>openvswitch-2.5.1-24.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-3449" ref_url="https://www.suse.com/security/cve/CVE-2012-3449/" source="CVE"/>
		<description>
These are all security issues fixed in the openvswitch-2.5.1-24.15 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3449/">CVE-2012-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141050" comment="openvswitch-2.5.1-24.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141051" comment="openvswitch-dpdk-2.5.1-24.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141052" comment="openvswitch-dpdk-switch-2.5.1-24.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141053" comment="openvswitch-switch-2.5.1-24.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79181" version="1" class="patch">
	<metadata>
		<title>opie-2.4-724.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-2.4-724.56 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141054" comment="opie-2.4-724.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141055" comment="opie-32bit-2.4-724.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79182" version="1" class="patch">
	<metadata>
		<title>p7zip-9.20.1-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-9.20.1-6.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79183" version="1" class="patch">
	<metadata>
		<title>pam-1.1.8-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430/" source="CVE"/>
		<reference ref_id="CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431/" source="CVE"/>
		<reference ref_id="CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853/" source="CVE"/>
		<reference ref_id="CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148/" source="CVE"/>
		<reference ref_id="CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149/" source="CVE"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.1.8-14.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79184" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-23.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-23.12 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141059" comment="pam-modules-12.1-23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79185" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.4-4.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.4-4.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79186" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.0-1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.0-1.39 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79187" version="1" class="patch">
	<metadata>
		<title>patch-2.7.5-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395/" source="CVE"/>
		<reference ref_id="CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.5-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79188" version="1" class="patch">
	<metadata>
		<title>pcsc-ccid-1.4.14-1.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530/" source="CVE"/>
		<description>
These are all security issues fixed in the pcsc-ccid-1.4.14-1.42 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141065" comment="pcsc-ccid-1.4.14-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79189" version="1" class="patch">
	<metadata>
		<title>perl-32bit-5.18.2-11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761/" source="CVE"/>
		<reference ref_id="CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410/" source="CVE"/>
		<reference ref_id="CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411/" source="CVE"/>
		<reference ref_id="CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777/" source="CVE"/>
		<reference ref_id="CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853/" source="CVE"/>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381/" source="CVE"/>
		<reference ref_id="CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-32bit-5.18.2-11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79190" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.82-3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.82-3.12 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79191" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.71-1.145 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.71-1.145 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79192" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.04-5.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.04-5.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79193" version="1" class="patch">
	<metadata>
		<title>perl-Tk-804.031-3.76 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Tk-804.031-3.76 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79194" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0019-5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0019-5.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79195" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.38-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.38-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79196" version="1" class="patch">
	<metadata>
		<title>pigz-2.3-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191/" source="CVE"/>
		<description>
These are all security issues fixed in the pigz-2.3-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79197" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.3.2-17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.3.2-17.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141070" comment="powerpc-utils-1.3.2-17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79198" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.7.1-5.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.7.1-5.6 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141071" comment="ppc64-diag-2.7.1-5.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79199" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-1.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141072" comment="ppp-2.4.7-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79200" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-267.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-267.12 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141073" comment="procmail-3.22-267.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79201" version="1" class="patch">
	<metadata>
		<title>python-2.7.9-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>
These are all security issues fixed in the python-2.7.9-24.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130998" comment="python-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131909" comment="python-32bit-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131000" comment="python-curses-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131911" comment="python-demo-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131914" comment="python-gdbm-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131915" comment="python-idle-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131002" comment="python-tk-2.7.9-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141074" comment="python3-3.4.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141075" comment="python3-curses-3.4.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79202" version="1" class="patch">
	<metadata>
		<title>python-cupshelpers-1.5.7-7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python-cupshelpers-1.5.7-7.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79203" version="1" class="patch">
	<metadata>
		<title>python-imaging-1.1.7-21.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932/" source="CVE"/>
		<description>
These are all security issues fixed in the python-imaging-1.1.7-21.15 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141082" comment="python-imaging-1.1.7-21.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79204" version="1" class="patch">
	<metadata>
		<title>python-libxml2-2.9.4-27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225/" source="CVE"/>
		<reference ref_id="CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226/" source="CVE"/>
		<reference ref_id="CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409/" source="CVE"/>
		<reference ref_id="CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<description>
These are all security issues fixed in the python-libxml2-2.9.4-27.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79205" version="1" class="patch">
	<metadata>
		<title>python-pyOpenSSL-16.0.0-2.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pyOpenSSL-16.0.0-2.3.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141084" comment="python-pyOpenSSL-16.0.0-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79206" version="1" class="patch">
	<metadata>
		<title>python-pywbem-0.7.0-4.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python-pywbem-0.7.0-4.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79207" version="1" class="patch">
	<metadata>
		<title>python-requests-2.8.1-6.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829/" source="CVE"/>
		<reference ref_id="CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python-requests-2.8.1-6.11.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79208" version="1" class="patch">
	<metadata>
		<title>qemu-2.6.1-27.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928/" source="CVE"/>
		<reference ref_id="CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945/" source="CVE"/>
		<reference ref_id="CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382/" source="CVE"/>
		<reference ref_id="CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142/" source="CVE"/>
		<reference ref_id="CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143/" source="CVE"/>
		<reference ref_id="CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144/" source="CVE"/>
		<reference ref_id="CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145/" source="CVE"/>
		<reference ref_id="CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146/" source="CVE"/>
		<reference ref_id="CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147/" source="CVE"/>
		<reference ref_id="CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-2.6.1-27.15 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79209" version="1" class="patch">
	<metadata>
		<title>quagga-0.99.22.1-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<description>
These are all security issues fixed in the quagga-0.99.22.1-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128392" comment="quagga-0.99.22.1-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79210" version="1" class="patch">
	<metadata>
		<title>radvd-1.9.7-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-1.9.7-2.12 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79211" version="1" class="patch">
	<metadata>
		<title>res-signingkeys-3.0.18-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>
These are all security issues fixed in the res-signingkeys-3.0.18-26.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141104" comment="res-signingkeys-3.0.18-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141105" comment="smt-3.0.18-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141106" comment="smt-support-3.0.18-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79212" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-21.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-21.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141107" comment="rpcbind-0.2.3-21.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79213" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.11.2-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.11.2-15.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79214" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.0-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097/" source="CVE"/>
		<reference ref_id="CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855/" source="CVE"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.0-12.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79215" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.4.0-14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200/" source="CVE"/>
		<reference ref_id="CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758/" source="CVE"/>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<reference ref_id="CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.4.0-14.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79216" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11_git201205151338-8.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11_git201205151338-8.14 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79217" version="1" class="patch">
	<metadata>
		<title>ruby-2.1-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492/" source="CVE"/>
		<reference ref_id="CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541/" source="CVE"/>
		<reference ref_id="CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004/" source="CVE"/>
		<reference ref_id="CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005/" source="CVE"/>
		<reference ref_id="CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815/" source="CVE"/>
		<description>
These are all security issues fixed in the ruby-2.1-1.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79218" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.8-8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.8-8.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141124" comment="sblim-sfcb-1.4.8-8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79219" version="1" class="patch">
	<metadata>
		<title>shim-0.9-20.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-0.9-20.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79220" version="1" class="patch">
	<metadata>
		<title>socat-1.7.2.4-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.2.4-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79221" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-6.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79222" version="1" class="patch">
	<metadata>
		<title>squid-3.5.21-23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643/" source="CVE"/>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-3.5.21-23.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79223" version="1" class="patch">
	<metadata>
		<title>squidGuard-1.4-23.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700/" source="CVE"/>
		<reference ref_id="CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826/" source="CVE"/>
		<description>
These are all security issues fixed in the squidGuard-1.4-23.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141128" comment="squidGuard-1.4-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141129" comment="squidGuard-doc-1.4-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79224" version="1" class="patch">
	<metadata>
		<title>strongswan-5.1.3-22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790/" source="CVE"/>
		<reference ref_id="CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388/" source="CVE"/>
		<reference ref_id="CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944/" source="CVE"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<reference ref_id="CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076/" source="CVE"/>
		<reference ref_id="CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338/" source="CVE"/>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.1.3-22.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79225" version="1" class="patch">
	<metadata>
		<title>stunnel-5.00-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762/" source="CVE"/>
		<reference ref_id="CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016/" source="CVE"/>
		<reference ref_id="CVE-2015-3644" ref_url="https://www.suse.com/security/cve/CVE-2015-3644/" source="CVE"/>
		<description>
These are all security issues fixed in the stunnel-5.00-3.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3644/">CVE-2015-3644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110494" comment="stunnel-5.00-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79226" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.10p3-6.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163/" source="CVE"/>
		<reference ref_id="CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646/" source="CVE"/>
		<reference ref_id="CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010/" source="CVE"/>
		<reference ref_id="CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337/" source="CVE"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.10p3-6.16 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79227" version="1" class="patch">
	<metadata>
		<title>supportutils-3.0-85.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.0-85.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141131" comment="supportutils-3.0-85.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79228" version="1" class="patch">
	<metadata>
		<title>sysconfig-0.84.0-13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182/" source="CVE"/>
		<description>
These are all security issues fixed in the sysconfig-0.84.0-13.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79229" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-778.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-778.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79230" version="1" class="patch">
	<metadata>
		<title>systemtap-3.0-7.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911/" source="CVE"/>
		<reference ref_id="CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273/" source="CVE"/>
		<reference ref_id="CVE-2010-0411" ref_url="https://www.suse.com/security/cve/CVE-2010-0411/" source="CVE"/>
		<reference ref_id="CVE-2010-0412" ref_url="https://www.suse.com/security/cve/CVE-2010-0412/" source="CVE"/>
		<description>
These are all security issues fixed in the systemtap-3.0-7.15 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0411/">CVE-2010-0411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0412/">CVE-2010-0412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141135" comment="systemtap-3.0-7.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141136" comment="systemtap-runtime-3.0-7.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141137" comment="systemtap-server-3.0-7.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79231" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-96.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-96.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141138" comment="sysvinit-tools-2.88+-96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79232" version="1" class="patch">
	<metadata>
		<title>tar-1.27.1-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.27.1-8.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009136443" comment="tar-1.27.1-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009136445" comment="tar-lang-1.27.1-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79233" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.5.1-10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.5.1-10.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141140" comment="tcpdump-4.5.1-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79234" version="1" class="patch">
	<metadata>
		<title>tftp-5.2-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199/" source="CVE"/>
		<description>
These are all security issues fixed in the tftp-5.2-10.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79235" version="1" class="patch">
	<metadata>
		<title>tomcat-8.0.36-11.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-8.0.36-11.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79236" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.4-6.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.4-6.5 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141151" comment="unixODBC-2.3.4-6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141152" comment="unixODBC-32bit-2.3.4-6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79237" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-32.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-32.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79238" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.18.4-14.216 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.18.4-14.216 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79239" version="1" class="patch">
	<metadata>
		<title>vino-3.20.2-5.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904/" source="CVE"/>
		<reference ref_id="CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905/" source="CVE"/>
		<reference ref_id="CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.20.2-5.8 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79240" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686/" source="CVE"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-26.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79241" version="1" class="patch">
	<metadata>
		<title>vsftpd-3.0.2-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-3.0.2-31.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141156" comment="vsftpd-3.0.2-31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79242" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3-157.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3-157.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141157" comment="w3m-0.5.3-157.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79243" version="1" class="patch">
	<metadata>
		<title>wget-1.14-10.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.14-10.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79244" version="1" class="patch">
	<metadata>
		<title>wireshark-1.12.13-31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210/" source="CVE"/>
		<reference ref_id="CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267/" source="CVE"/>
		<reference ref_id="CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268/" source="CVE"/>
		<reference ref_id="CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269/" source="CVE"/>
		<reference ref_id="CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241/" source="CVE"/>
		<reference ref_id="CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242/" source="CVE"/>
		<reference ref_id="CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243/" source="CVE"/>
		<reference ref_id="CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455/" source="CVE"/>
		<reference ref_id="CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993/" source="CVE"/>
		<reference ref_id="CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445/" source="CVE"/>
		<reference ref_id="CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300/" source="CVE"/>
		<reference ref_id="CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301/" source="CVE"/>
		<reference ref_id="CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538/" source="CVE"/>
		<reference ref_id="CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024/" source="CVE"/>
		<reference ref_id="CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538/" source="CVE"/>
		<reference ref_id="CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713/" source="CVE"/>
		<reference ref_id="CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138/" source="CVE"/>
		<reference ref_id="CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139/" source="CVE"/>
		<reference ref_id="CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140/" source="CVE"/>
		<reference ref_id="CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143/" source="CVE"/>
		<reference ref_id="CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590/" source="CVE"/>
		<reference ref_id="CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591/" source="CVE"/>
		<reference ref_id="CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592/" source="CVE"/>
		<reference ref_id="CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957/" source="CVE"/>
		<reference ref_id="CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958/" source="CVE"/>
		<reference ref_id="CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959/" source="CVE"/>
		<reference ref_id="CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174/" source="CVE"/>
		<reference ref_id="CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175/" source="CVE"/>
		<reference ref_id="CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597/" source="CVE"/>
		<reference ref_id="CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698/" source="CVE"/>
		<reference ref_id="CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266/" source="CVE"/>
		<reference ref_id="CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360/" source="CVE"/>
		<reference ref_id="CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483/" source="CVE"/>
		<reference ref_id="CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392/" source="CVE"/>
		<reference ref_id="CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393/" source="CVE"/>
		<reference ref_id="CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394/" source="CVE"/>
		<reference ref_id="CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548/" source="CVE"/>
		<reference ref_id="CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048/" source="CVE"/>
		<reference ref_id="CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049/" source="CVE"/>
		<reference ref_id="CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285/" source="CVE"/>
		<reference ref_id="CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286/" source="CVE"/>
		<reference ref_id="CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287/" source="CVE"/>
		<reference ref_id="CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288/" source="CVE"/>
		<reference ref_id="CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289/" source="CVE"/>
		<reference ref_id="CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290/" source="CVE"/>
		<reference ref_id="CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291/" source="CVE"/>
		<reference ref_id="CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292/" source="CVE"/>
		<reference ref_id="CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293/" source="CVE"/>
		<reference ref_id="CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294/" source="CVE"/>
		<reference ref_id="CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295/" source="CVE"/>
		<reference ref_id="CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296/" source="CVE"/>
		<reference ref_id="CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297/" source="CVE"/>
		<reference ref_id="CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298/" source="CVE"/>
		<reference ref_id="CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237/" source="CVE"/>
		<reference ref_id="CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238/" source="CVE"/>
		<reference ref_id="CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239/" source="CVE"/>
		<reference ref_id="CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240/" source="CVE"/>
		<reference ref_id="CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592/" source="CVE"/>
		<reference ref_id="CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593/" source="CVE"/>
		<reference ref_id="CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594/" source="CVE"/>
		<reference ref_id="CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595/" source="CVE"/>
		<reference ref_id="CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596/" source="CVE"/>
		<reference ref_id="CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597/" source="CVE"/>
		<reference ref_id="CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598/" source="CVE"/>
		<reference ref_id="CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599/" source="CVE"/>
		<reference ref_id="CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600/" source="CVE"/>
		<reference ref_id="CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601/" source="CVE"/>
		<reference ref_id="CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602/" source="CVE"/>
		<reference ref_id="CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572/" source="CVE"/>
		<reference ref_id="CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573/" source="CVE"/>
		<reference ref_id="CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574/" source="CVE"/>
		<reference ref_id="CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575/" source="CVE"/>
		<reference ref_id="CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576/" source="CVE"/>
		<reference ref_id="CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577/" source="CVE"/>
		<reference ref_id="CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578/" source="CVE"/>
		<reference ref_id="CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579/" source="CVE"/>
		<reference ref_id="CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580/" source="CVE"/>
		<reference ref_id="CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581/" source="CVE"/>
		<reference ref_id="CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582/" source="CVE"/>
		<reference ref_id="CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583/" source="CVE"/>
		<reference ref_id="CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584/" source="CVE"/>
		<reference ref_id="CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585/" source="CVE"/>
		<reference ref_id="CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586/" source="CVE"/>
		<reference ref_id="CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587/" source="CVE"/>
		<reference ref_id="CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588/" source="CVE"/>
		<reference ref_id="CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589/" source="CVE"/>
		<reference ref_id="CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590/" source="CVE"/>
		<reference ref_id="CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475/" source="CVE"/>
		<reference ref_id="CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476/" source="CVE"/>
		<reference ref_id="CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477/" source="CVE"/>
		<reference ref_id="CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478/" source="CVE"/>
		<reference ref_id="CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479/" source="CVE"/>
		<reference ref_id="CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480/" source="CVE"/>
		<reference ref_id="CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481/" source="CVE"/>
		<reference ref_id="CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482/" source="CVE"/>
		<reference ref_id="CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483/" source="CVE"/>
		<reference ref_id="CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484/" source="CVE"/>
		<reference ref_id="CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485/" source="CVE"/>
		<reference ref_id="CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486/" source="CVE"/>
		<reference ref_id="CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487/" source="CVE"/>
		<reference ref_id="CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488/" source="CVE"/>
		<reference ref_id="CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555/" source="CVE"/>
		<reference ref_id="CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556/" source="CVE"/>
		<reference ref_id="CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557/" source="CVE"/>
		<reference ref_id="CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558/" source="CVE"/>
		<reference ref_id="CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559/" source="CVE"/>
		<reference ref_id="CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560/" source="CVE"/>
		<reference ref_id="CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561/" source="CVE"/>
		<reference ref_id="CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562/" source="CVE"/>
		<reference ref_id="CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083/" source="CVE"/>
		<reference ref_id="CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920/" source="CVE"/>
		<reference ref_id="CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921/" source="CVE"/>
		<reference ref_id="CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922/" source="CVE"/>
		<reference ref_id="CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923/" source="CVE"/>
		<reference ref_id="CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924/" source="CVE"/>
		<reference ref_id="CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925/" source="CVE"/>
		<reference ref_id="CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926/" source="CVE"/>
		<reference ref_id="CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927/" source="CVE"/>
		<reference ref_id="CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928/" source="CVE"/>
		<reference ref_id="CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929/" source="CVE"/>
		<reference ref_id="CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930/" source="CVE"/>
		<reference ref_id="CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931/" source="CVE"/>
		<reference ref_id="CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932/" source="CVE"/>
		<reference ref_id="CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933/" source="CVE"/>
		<reference ref_id="CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934/" source="CVE"/>
		<reference ref_id="CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935/" source="CVE"/>
		<reference ref_id="CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936/" source="CVE"/>
		<reference ref_id="CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717/" source="CVE"/>
		<reference ref_id="CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718/" source="CVE"/>
		<reference ref_id="CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719/" source="CVE"/>
		<reference ref_id="CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720/" source="CVE"/>
		<reference ref_id="CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721/" source="CVE"/>
		<reference ref_id="CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722/" source="CVE"/>
		<reference ref_id="CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336/" source="CVE"/>
		<reference ref_id="CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337/" source="CVE"/>
		<reference ref_id="CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338/" source="CVE"/>
		<reference ref_id="CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339/" source="CVE"/>
		<reference ref_id="CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340/" source="CVE"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<reference ref_id="CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281/" source="CVE"/>
		<reference ref_id="CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282/" source="CVE"/>
		<reference ref_id="CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283/" source="CVE"/>
		<reference ref_id="CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299/" source="CVE"/>
		<reference ref_id="CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907/" source="CVE"/>
		<reference ref_id="CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020/" source="CVE"/>
		<reference ref_id="CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161/" source="CVE"/>
		<reference ref_id="CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162/" source="CVE"/>
		<reference ref_id="CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163/" source="CVE"/>
		<reference ref_id="CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164/" source="CVE"/>
		<reference ref_id="CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359/" source="CVE"/>
		<reference ref_id="CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506/" source="CVE"/>
		<reference ref_id="CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-1.12.13-31.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79245" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.2-14.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.2-14.2 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79246" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.0-264.133 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.0-264.133 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141158" comment="xalan-j2-2.7.0-264.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79247" version="1" class="patch">
	<metadata>
		<title>xdg-utils-20140630-5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-20140630-5.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79248" version="1" class="patch">
	<metadata>
		<title>xen-4.7.0_12-23.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898/" source="CVE"/>
		<reference ref_id="CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029/" source="CVE"/>
		<reference ref_id="CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217/" source="CVE"/>
		<reference ref_id="CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625/" source="CVE"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<reference ref_id="CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<reference ref_id="CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510/" source="CVE"/>
		<reference ref_id="CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511/" source="CVE"/>
		<reference ref_id="CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513/" source="CVE"/>
		<reference ref_id="CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514/" source="CVE"/>
		<reference ref_id="CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515/" source="CVE"/>
		<reference ref_id="CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525/" source="CVE"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151/" source="CVE"/>
		<reference ref_id="CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146/" source="CVE"/>
		<reference ref_id="CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149/" source="CVE"/>
		<reference ref_id="CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.7.0_12-23.4 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79249" version="1" class="patch">
	<metadata>
		<title>xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910/" source="CVE"/>
		<description>
These are all security issues fixed in the xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141165" comment="xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79250" version="1" class="patch">
	<metadata>
		<title>xfsprogs-4.3.0-8.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<description>
These are all security issues fixed in the xfsprogs-4.3.0-8.8 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141166" comment="xfsprogs-4.3.0-8.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79251" version="1" class="patch">
	<metadata>
		<title>xinetd-2.3.15-7.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>
These are all security issues fixed in the xinetd-2.3.15-7.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79252" version="1" class="patch">
	<metadata>
		<title>xlockmore-5.43-5.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143/" source="CVE"/>
		<description>
These are all security issues fixed in the xlockmore-5.43-5.30 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79253" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-14.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-14.17 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141169" comment="xorg-x11-7.6_1-14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141170" comment="xorg-x11-essentials-7.6_1-14.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79254" version="1" class="patch">
	<metadata>
		<title>xorg-x11-libs-7.6-45.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-libs-7.6-45.14 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141172" comment="xorg-x11-libs-7.6-45.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79255" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-7.6_1.18.3-57.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240/" source="CVE"/>
		<reference ref_id="CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940/" source="CVE"/>
		<reference ref_id="CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396/" source="CVE"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-7.6_1.18.3-57.34 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79256" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.22-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.22-7.1 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79257" version="1" class="patch">
	<metadata>
		<title>yast2-3.1.206-36.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-3.1.206-36.3 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141175" comment="yast2-3.1.206-37.1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79258" version="1" class="patch">
	<metadata>
		<title>yast2-core-3.1.23-6.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<reference ref_id="CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-core-3.1.23-6.38 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141176" comment="yast2-core-3.1.23-6.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79259" version="1" class="patch">
	<metadata>
		<title>yast2-users-3.1.57-16.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-3.1.57-16.7 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009141177" comment="yast2-users-3.1.57-16.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79260" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1020.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1020.56 package on the GA media of SUSE Linux Enterprise Server 12 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79261" version="1" class="patch">
	<metadata>
		<title>Security update for python-tablib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1044329" ref_url="https://bugzilla.suse.com/1044329" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2810" ref_url="https://www.suse.com/security/cve/CVE-2017-2810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003121.html" source="SUSE-SU"/>
		<description>
This update for python-tablib fixes the following issues:

- CVE-2017-2810: Use yaml.safe_load and yaml.safe_dump to avoid executing code when importing data (bsc#1044329)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-08"/>
	<updated date="2017-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044329">SUSE bug 1044329</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2810/">CVE-2017-2810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525122" comment="python-tablib-0.9.11-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79262" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs4, nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1041282" ref_url="https://bugzilla.suse.com/1041282" source="BUGZILLA"/>
		<reference ref_id="1041283" ref_url="https://bugzilla.suse.com/1041283" source="BUGZILLA"/>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="1048299" ref_url="https://bugzilla.suse.com/1048299" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003136.html" source="SUSE-SU"/>
		<description>
This update for nodejs4 and nodejs6 fixes the following issues:

Security issues fixed:

- CVE-2017-1000381: The c-ares function ares_parse_naptr_reply() could be triggered to read memory
  outside of the given input buffer if the passed in DNS response packet was crafted in a
  particular way. (bsc#1044946)
- CVE-2017-11499: Disable V8 snapshots. The hashseed embedded in the snapshot is currently the same
  for all runs of the binary. This opens node up to collision attacks which could result in a Denial
  of Service. We have temporarily disabled snapshots until a more robust solution is found.
  (bsc#1048299)

Non-security fixes:

- GCC 7 compilation fixes for v8 backported and add missing ICU59 headers (bsc#1041282)
- New upstream LTS release 6.11.1
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V6.md#6.11.1
- New upstream LTS release 6.11.0
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V6.md#6.11.0
- New upstream LTS release 6.10.3
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V6.md#6.10.3
- New upstream LTS release 6.10.2
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V6.md#6.10.2
- New upstream LTS release 6.10.1
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V6.md#6.10.1
- New upstream LTS release 6.10.0
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V6.md#6.10.0

- New upstream LTS release 4.8.4
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V4.md#4.8.4
- New upstream LTS release 4.8.3
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V4.md#4.8.3
- New upstream LTS release 4.8.2
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V4.md#4.8.2
- New upstream LTS release 4.8.1
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V4.md#4.8.1
- New upstream LTS release 4.8.0
  * https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V4.md#4.8.0
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-15"/>
	<updated date="2017-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041282">SUSE bug 1041282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041283">SUSE bug 1041283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009526518" comment="nodejs-common-1.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594271" comment="nodejs6-6.11.1-11.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79263" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycrypto (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1017420" ref_url="https://bugzilla.suse.com/1017420" source="BUGZILLA"/>
		<reference ref_id="1047666" ref_url="https://bugzilla.suse.com/1047666" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00011.html" source="SUSE-SU"/>
		<description>
This update for python-pycrypto fixes the following issues:

- CVE-2013-7459: Fixed a potential heap buffer overflow in ALGnew (bsc#1017420).

python-paramiko was adjusted to work together with this python-pycrypto change. (bsc#1047666)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047666">SUSE bug 1047666</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594272" comment="python-pycrypto-2.6.1-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79264" version="1" class="patch">
	<metadata>
		<title>Security update for python-XStatic-jquery-ui (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="996004" ref_url="https://bugzilla.suse.com/996004" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7103" ref_url="https://www.suse.com/security/cve/CVE-2016-7103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003185.html" source="SUSE-SU"/>
		<description>
This update for python-XStatic-jquery-ui fixes the following issues:

-  CVE-2016-7103: possible cross-site scripting in dialog closeText could lead to arbitrary code injection (bsc#996004)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/996004">SUSE bug 996004</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7103/">CVE-2016-7103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594273" comment="python-XStatic-jquery-ui-1.11.0.1-2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79265" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79266" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-glance (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1023507" ref_url="https://bugzilla.suse.com/1023507" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003273.html" source="SUSE-SU"/>
		<description>
This update for openstack-glance fixes the following issues:

- Restrict image_location metadata 
  When `show_multiple_locations` is enabled in Glance, any user can
  rewrite the metadata information for locations, causing a security
  breach. (bsc#1023507)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023507">SUSE bug 1023507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594275" comment="openstack-glance-13.0.1~a0~dev6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594276" comment="openstack-glance-api-13.0.1~a0~dev6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594277" comment="openstack-glance-doc-13.0.1~a0~dev6-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594278" comment="openstack-glance-glare-13.0.1~a0~dev6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594279" comment="openstack-glance-registry-13.0.1~a0~dev6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594280" comment="python-glance-13.0.1~a0~dev6-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79267" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-aodh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1052604" ref_url="https://bugzilla.suse.com/1052604" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12440" ref_url="https://www.suse.com/security/cve/CVE-2017-12440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003272.html" source="SUSE-SU"/>
		<description>
This update for openstack-aodh fixes the following security issues:

- CVE-2017-12440: Aodh did not verify that trust IDs belong to the user when creating alarm action with the scheme
  trust+http, which allowed remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain
  a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http,
  and providing a trust id where Aodh is the trustee (bsc#1052604).
- gnocchi: Fix alarms for unprivileged user.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052604">SUSE bug 1052604</bugzilla>
	<cve impact="moderate" cvss3="8.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12440/">CVE-2017-12440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594281" comment="openstack-aodh-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594282" comment="openstack-aodh-api-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594283" comment="openstack-aodh-doc-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594284" comment="openstack-aodh-evaluator-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594285" comment="openstack-aodh-expirer-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594286" comment="openstack-aodh-listener-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594287" comment="openstack-aodh-notifier-3.0.4~a0~dev1-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594288" comment="python-aodh-3.0.4~a0~dev1-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79268" version="1" class="patch">
	<metadata>
		<title>Security update for the Ruby on Rails stack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1055962" ref_url="https://bugzilla.suse.com/1055962" source="BUGZILLA"/>
		<reference ref_id="968849" ref_url="https://bugzilla.suse.com/968849" source="BUGZILLA"/>
		<reference ref_id="993302" ref_url="https://bugzilla.suse.com/993302" source="BUGZILLA"/>
		<reference ref_id="993313" ref_url="https://bugzilla.suse.com/993313" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2098" ref_url="https://www.suse.com/security/cve/CVE-2016-2098/" source="CVE"/>
		<reference ref_id="CVE-2016-6316" ref_url="https://www.suse.com/security/cve/CVE-2016-6316/" source="CVE"/>
		<reference ref_id="CVE-2016-6317" ref_url="https://www.suse.com/security/cve/CVE-2016-6317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003293.html" source="SUSE-SU"/>
		<description>
This update brings version 4.2.9 of the Ruby on Rails stack to provide the latest fixes and
improvements from upstream.

The following security issues have been fixed by upstream:

rubygem-actionpack-4_2

- CVE-2016-2098: Action Pack in Ruby on Rails allowed remote attackers to execute arbitrary Ruby code by leveraging
  an application's unrestricted use of the render method (bsc#968849).

rubygem-activerecord-4_2

- CVE-2016-6317: Action Record did not properly consider differences in parameter handling between the Active Record
  component and the JSON implementation, which allowed remote attackers to bypass intended database-query restrictions
  and perform NULL checks or trigger missing WHERE clauses via a crafted request (bsc#993313).

rubygem-actionview-4_2

- CVE-2016-6316: Cross-site scripting (XSS) vulnerability in Action View might have allowed remote attackers to inject
  arbitrary web script or HTML via text declared as 'HTML safe' and used as attribute values in tag handlers
  (bsc#993302).

Additionally, the following packages have been updated to version 4.2.9:

- rubygem-rails-4_2
- rubygem-railties-4_2
- rubygem-activesupport-4_2
- rubygem-activerecord-4_2
- rubygem-activejob-4_2
- rubygem-actionview-4_2
- rubygem-actionpack-4_2
- rubygem-actionmailer-4_2		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-12"/>
	<updated date="2017-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055962">SUSE bug 1055962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968849">SUSE bug 968849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993302">SUSE bug 993302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993313">SUSE bug 993313</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2098/">CVE-2016-2098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6316/">CVE-2016-6316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6317/">CVE-2016-6317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594289" comment="ruby2.1-rubygem-actionmailer-4_2-4.2.9-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594290" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594291" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594292" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594293" comment="ruby2.1-rubygem-activemodel-4_2-4.2.9-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594294" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594295" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594296" comment="ruby2.1-rubygem-rails-4_2-4.2.9-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594297" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594298" comment="ruby2.1-rubygem-railties-4_2-4.2.9-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79269" version="1" class="patch">
	<metadata>
		<title>Security update for ansible and monasca-installer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1019021" ref_url="https://bugzilla.suse.com/1019021" source="BUGZILLA"/>
		<reference ref_id="1038785" ref_url="https://bugzilla.suse.com/1038785" source="BUGZILLA"/>
		<reference ref_id="1056094" ref_url="https://bugzilla.suse.com/1056094" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466/" source="CVE"/>
		<reference ref_id="CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003400.html" source="SUSE-SU"/>
		<description>
This update for ansible provides version 2.2.3.0 and fixes the following security issues:

- CVE-2017-7481: Data for lookup plugins used as variables was not being marked as 'unsafe' and could lead to
  unintentional disclosure of information. (bsc#1038785)
- CVE-2016-9587: Prevent compromised host to execute commands on the controller (bsc#1019021).
- CVE-2017-7466: Prevent arbitrary code execution on control nodes.

For more information about the upstream bugs fixed, please see /usr/share/doc/packages/ansible/CHANGELOG.md

Additionally, monasca-installer received several compatibility fixes for ansible.		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-17"/>
	<updated date="2017-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056094">SUSE bug 1056094</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594299" comment="ansible-2.2.3.0-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594300" comment="monasca-installer-20170912_10.45-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79270" version="1" class="patch">
	<metadata>
		<title>Security update for storm, storm-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1048688" ref_url="https://bugzilla.suse.com/1048688" source="BUGZILLA"/>
		<reference ref_id="1059463" ref_url="https://bugzilla.suse.com/1059463" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9799" ref_url="https://www.suse.com/security/cve/CVE-2017-9799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00023.html" source="SUSE-SU"/>
		<description>

This update for storm, storm-kit fixes the following issues:

- Update storm to version 1.0.5 (bsc#1059463, CVE-2017-9799) 
- Update storm-kit to version 1.0.5 (bsc#1059463, CVE-2017-9799)
- Initial package (bsc#1048688, fate#323204)		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-13"/>
	<updated date="2017-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048688">SUSE bug 1048688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059463">SUSE bug 1059463</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9799/">CVE-2017-9799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594301" comment="storm-1.0.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594302" comment="storm-nimbus-1.0.5-5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594303" comment="storm-supervisor-1.0.5-5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79271" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-nova (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1066198" ref_url="https://bugzilla.suse.com/1066198" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16239" ref_url="https://www.suse.com/security/cve/CVE-2017-16239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003412.html" source="SUSE-SU"/>
		<description>
This update for openstack-nova brings the latest version provided by the OpenStack upstream project including the
following security fix:

- CVE-2017-16239: Filter Scheduler bypass through rebuild action (bsc#1066198).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1066198">SUSE bug 1066198</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16239/">CVE-2017-16239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594304" comment="openstack-nova-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594305" comment="openstack-nova-api-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594306" comment="openstack-nova-cells-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594307" comment="openstack-nova-cert-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594308" comment="openstack-nova-compute-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594309" comment="openstack-nova-conductor-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594310" comment="openstack-nova-console-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594311" comment="openstack-nova-consoleauth-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594312" comment="openstack-nova-doc-14.0.10~dev13-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594313" comment="openstack-nova-novncproxy-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594314" comment="openstack-nova-placement-api-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594315" comment="openstack-nova-scheduler-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594316" comment="openstack-nova-serialproxy-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594317" comment="openstack-nova-vncproxy-14.0.10~dev13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594318" comment="python-nova-14.0.10~dev13-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79272" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyJWT (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1054106" ref_url="https://bugzilla.suse.com/1054106" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003540.html" source="SUSE-SU"/>
		<description>
This update for python-PyJWT fixes the following issues:

- CVE-2017-12880: fix symmetric/asymmetric confusion when handling PKCS1 public keys (bsc#1054106)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-19"/>
	<updated date="2017-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525149" comment="python-PyJWT-1.4.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79273" version="1" class="patch">
	<metadata>
		<title>Security update for python-oslo.middleware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1022043" ref_url="https://bugzilla.suse.com/1022043" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2592" ref_url="https://www.suse.com/security/cve/CVE-2017-2592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002817.html" source="SUSE-SU"/>
		<description>

This update for python-oslo.middleware fixes the following issues:

Security issue fixed:
- CVE-2017-2592: Using the CatchError class may include sensitive values in the error message
  accompanying a Traceback, resulting in their disclosure (bsc#1022043).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-19"/>
	<updated date="2017-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022043">SUSE bug 1022043</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2592/">CVE-2017-2592</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594319" comment="python-oslo.middleware-3.19.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79274" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-magnum (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="998182" ref_url="https://bugzilla.suse.com/998182" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7404" ref_url="https://www.suse.com/security/cve/CVE-2016-7404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002853.html" source="SUSE-SU"/>
		<description>

This update for openstack-magnum fixes the following issues:

Security issues fixed:
- CVE-2016-7404: Magnum created instances have full API access to creating user's OpenStack account (bsc#998182).

Bugfixes:
- Fixed exception for InvalidParameterValue.
- Updated patches have been tested against magnum-3.1.2.dev20
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/998182">SUSE bug 998182</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7404/">CVE-2016-7404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594320" comment="openstack-magnum-3.1.2~a0~dev20-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594321" comment="openstack-magnum-api-3.1.2~a0~dev20-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594322" comment="openstack-magnum-conductor-3.1.2~a0~dev20-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594323" comment="openstack-magnum-doc-3.1.2~a0~dev20-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594324" comment="python-magnum-3.1.2~a0~dev20-9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79275" version="1" class="patch">
	<metadata>
		<title>Security update for several openstack-components (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1024328" ref_url="https://bugzilla.suse.com/1024328" source="BUGZILLA"/>
		<reference ref_id="1030406" ref_url="https://bugzilla.suse.com/1030406" source="BUGZILLA"/>
		<reference ref_id="1032322" ref_url="https://bugzilla.suse.com/1032322" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7214" ref_url="https://www.suse.com/security/cve/CVE-2017-7214/" source="CVE"/>
		<reference ref_id="CVE-2017-7400" ref_url="https://www.suse.com/security/cve/CVE-2017-7400/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00074.html" source="SUSE-SU"/>
		<description>

This update for openstack-ceilometer, -cinder, -dashboard, -glance, -heat, -keystone, -manila, -magnum and 
-novaopenstack-keystone provides the latest code from OpenStack Newton.

- nova: Add release note that legacy notification exception contexts appearing in ERROR level logs may include sensitive
  information such as account passwords and authorization tokens. (bsc#1030406, CVE-2017-7214)
- nova: Remove PrivTmp from openstack-nova-compute service. (bsc#1024328)
- dashboard: Remove dangerous safestring declaration. (bsc#1032322, CVE-2017-7400)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024328">SUSE bug 1024328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030406">SUSE bug 1030406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032322">SUSE bug 1032322</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7214/">CVE-2017-7214</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7400/">CVE-2017-7400</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594325" comment="openstack-ceilometer-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594326" comment="openstack-ceilometer-agent-central-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594327" comment="openstack-ceilometer-agent-compute-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594328" comment="openstack-ceilometer-agent-ipmi-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594329" comment="openstack-ceilometer-agent-notification-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594330" comment="openstack-ceilometer-api-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594331" comment="openstack-ceilometer-collector-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594332" comment="openstack-ceilometer-doc-7.0.4~a0~dev7-3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594333" comment="openstack-ceilometer-polling-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594334" comment="openstack-cinder-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594335" comment="openstack-cinder-api-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594336" comment="openstack-cinder-backup-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594337" comment="openstack-cinder-doc-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594338" comment="openstack-cinder-scheduler-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594339" comment="openstack-cinder-volume-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594340" comment="openstack-dashboard-10.0.4~a0~dev2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594341" comment="openstack-glance-13.0.1~a0~dev6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594342" comment="openstack-glance-api-13.0.1~a0~dev6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594343" comment="openstack-glance-doc-13.0.1~a0~dev6-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594344" comment="openstack-glance-glare-13.0.1~a0~dev6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594345" comment="openstack-glance-registry-13.0.1~a0~dev6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594346" comment="openstack-heat-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594347" comment="openstack-heat-api-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594348" comment="openstack-heat-api-cfn-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594349" comment="openstack-heat-api-cloudwatch-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594350" comment="openstack-heat-doc-7.0.4~a0~dev4-4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594351" comment="openstack-heat-engine-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594352" comment="openstack-heat-plugin-heat_docker-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594353" comment="openstack-heat-test-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594354" comment="openstack-keystone-10.0.2~a0~dev2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594355" comment="openstack-keystone-doc-10.0.2~a0~dev2-6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594356" comment="openstack-magnum-3.1.2~a0~dev22-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594357" comment="openstack-magnum-api-3.1.2~a0~dev22-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594358" comment="openstack-magnum-conductor-3.1.2~a0~dev22-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594359" comment="openstack-magnum-doc-3.1.2~a0~dev22-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594360" comment="openstack-manila-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594361" comment="openstack-manila-api-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594362" comment="openstack-manila-data-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594363" comment="openstack-manila-doc-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594364" comment="openstack-manila-scheduler-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594365" comment="openstack-manila-share-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594366" comment="openstack-nova-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594367" comment="openstack-nova-api-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594368" comment="openstack-nova-cells-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594369" comment="openstack-nova-cert-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594370" comment="openstack-nova-compute-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594371" comment="openstack-nova-conductor-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594372" comment="openstack-nova-console-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594373" comment="openstack-nova-consoleauth-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594374" comment="openstack-nova-doc-14.0.6~a0~dev16-3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594375" comment="openstack-nova-novncproxy-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594376" comment="openstack-nova-placement-api-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594377" comment="openstack-nova-scheduler-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594378" comment="openstack-nova-serialproxy-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594379" comment="openstack-nova-vncproxy-14.0.6~a0~dev16-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594380" comment="python-ceilometer-7.0.4~a0~dev7-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594381" comment="python-cinder-9.1.5~a0~dev1-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594382" comment="python-glance-13.0.1~a0~dev6-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594383" comment="python-heat-7.0.4~a0~dev4-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594384" comment="python-horizon-10.0.4~a0~dev2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594385" comment="python-keystone-10.0.2~a0~dev2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594386" comment="python-magnum-3.1.2~a0~dev22-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594387" comment="python-manila-3.0.1~a0~dev27-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594388" comment="python-nova-14.0.6~a0~dev16-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79276" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094150" ref_url="https://bugzilla.suse.com/1094150" source="BUGZILLA"/>
		<reference ref_id="1094154" ref_url="https://bugzilla.suse.com/1094154" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:

- Fix crash in resolver on memory allocation failure (bsc#1086690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594389" comment="glibc-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594390" comment="glibc-devel-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594391" comment="glibc-locale-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594392" comment="glibc-profile-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594393" comment="nscd-2.22-62.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79277" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<description>
This update for git fixes several issues.

These security issues were fixed:

- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)
- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594394" comment="git-core-2.12.3-27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79278" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

This security issue was fixed:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79279" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through (bsc#1092885)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594395" comment="libvirt-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594396" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594397" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594398" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594399" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594400" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594401" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594402" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594403" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594404" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594405" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594406" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594407" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594408" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594409" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594410" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594411" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594412" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594413" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79280" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1091836" ref_url="https://bugzilla.suse.com/1091836" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004185.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Update to version 20180425 (bsc#1091836)

Fix provided for:

- GLK          B0       6-7a-1/01 0000001e-&gt;00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx

- Name microcodes which are not allowed to load late
  with a *.early suffix
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091836">SUSE bug 1091836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519666" comment="ucode-intel-20180425-13.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79281" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1087066" ref_url="https://bugzilla.suse.com/1087066" source="BUGZILLA"/>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:

These security issues were fixed:

- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For other changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087066">SUSE bug 1087066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79282" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u181 fixes the following issues:

+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79283" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following security issue:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594422" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79284" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

This feature was added:

- Added support for qemu monitor command 

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

- bsc#1086039 - Dom0 does not represent DomU cpu flags
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79285" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to version 8.0.5.15 [bsc#1093311, bsc#1085449]

Security fixes:

- CVE-2018-2826 CVE-2018-2825 CVE-2018-2814 CVE-2018-2794
  CVE-2018-2783 CVE-2018-2799 CVE-2018-2798 CVE-2018-2797
  CVE-2018-2796 CVE-2018-2795 CVE-2018-2800 CVE-2018-2790
  CVE-2018-1417

- Removed translations in the java-1_8_0-ibm-devel-32bit package
  as they conflict with those in java-1_8_0-ibm-devel.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79286" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]:

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79287" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594428" comment="ntp-4.2.8p11-64.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594429" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79288" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594430" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594431" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594432" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79289" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083650" ref_url="https://bugzilla.suse.com/1083650" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1086400" ref_url="https://bugzilla.suse.com/1086400" source="BUGZILLA"/>
		<reference ref_id="1087007" ref_url="https://bugzilla.suse.com/1087007" source="BUGZILLA"/>
		<reference ref_id="1087012" ref_url="https://bugzilla.suse.com/1087012" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087095" ref_url="https://bugzilla.suse.com/1087095" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090534" ref_url="https://bugzilla.suse.com/1090534" source="BUGZILLA"/>
		<reference ref_id="1090955" ref_url="https://bugzilla.suse.com/1090955" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092552" ref_url="https://bugzilla.suse.com/1092552" source="BUGZILLA"/>
		<reference ref_id="1092813" ref_url="https://bugzilla.suse.com/1092813" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094033" ref_url="https://bugzilla.suse.com/1094033" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1095042" ref_url="https://bugzilla.suse.com/1095042" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241/" source="CVE"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092/" source="CVE"/>
		<reference ref_id="CVE-2018-1093" ref_url="https://www.suse.com/security/cve/CVE-2018-1093/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
  not handle unsigned integer overflow properly. As a result, a large value of
  the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
  ioctl (bsc#1096728).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
  nid, which allowed local users to cause a denial of service (race condition) or
  possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
  option that triggers a NULL value for a flush_cmd_control data structure
  (bnc#1086400)
- CVE-2017-13305: Prevent information disclosure vulnerability in
  encrypted-keys (bsc#1094353).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
  cause a denial of service (out-of-bounds read and system crash) via a crafted
  ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers
  (bsc#1087095).
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
  crc32c checksum driver, which allowed attackers to cause a denial of service
  (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
  ext4 image (bsc#1087007).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
  with a zero i_links_count, which allowed attackers to cause a denial of service
  (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
  image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
  allowed a local user to cause a denial of service by a number of certain
  crafted system calls (bsc#1092904).
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
  that contains a jump but lacks a user-defined chain, which allowed local users
  to cause a denial of service (NULL pointer dereference) by leveraging the
  CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
  handling SCTP packets length that could have been exploited to cause a kernel
  crash (bnc#1083900).
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
  __rds_rdma_map() function that allowed local attackers to cause a system panic
  and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
  (bsc#1082962).
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
  could have caused a crash and possibly memory corruption (bsc#1089895).

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fix the patch content (bsc#1085185)
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087012">SUSE bug 1087012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087095">SUSE bug 1087095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090534">SUSE bug 1090534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090955">SUSE bug 1090955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092552">SUSE bug 1092552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092813">SUSE bug 1092813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094033">SUSE bug 1094033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095042">SUSE bug 1095042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1093/">CVE-2018-1093</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79290" version="1" class="patch">
	<metadata>
		<title>Recommended update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012075" ref_url="https://bugzilla.suse.com/1012075" source="BUGZILLA"/>
		<reference ref_id="1019948" ref_url="https://bugzilla.suse.com/1019948" source="BUGZILLA"/>
		<reference ref_id="1039034" ref_url="https://bugzilla.suse.com/1039034" source="BUGZILLA"/>
		<reference ref_id="1041891" ref_url="https://bugzilla.suse.com/1041891" source="BUGZILLA"/>
		<reference ref_id="1042632" ref_url="https://bugzilla.suse.com/1042632" source="BUGZILLA"/>
		<reference ref_id="1043328" ref_url="https://bugzilla.suse.com/1043328" source="BUGZILLA"/>
		<reference ref_id="1047218" ref_url="https://bugzilla.suse.com/1047218" source="BUGZILLA"/>
		<reference ref_id="1055165" ref_url="https://bugzilla.suse.com/1055165" source="BUGZILLA"/>
		<reference ref_id="1055268" ref_url="https://bugzilla.suse.com/1055268" source="BUGZILLA"/>
		<reference ref_id="1058374" ref_url="https://bugzilla.suse.com/1058374" source="BUGZILLA"/>
		<reference ref_id="1058729" ref_url="https://bugzilla.suse.com/1058729" source="BUGZILLA"/>
		<reference ref_id="1060110" ref_url="https://bugzilla.suse.com/1060110" source="BUGZILLA"/>
		<reference ref_id="1062583" ref_url="https://bugzilla.suse.com/1062583" source="BUGZILLA"/>
		<reference ref_id="1067443" ref_url="https://bugzilla.suse.com/1067443" source="BUGZILLA"/>
		<reference ref_id="1068906" ref_url="https://bugzilla.suse.com/1068906" source="BUGZILLA"/>
		<reference ref_id="1069401" ref_url="https://bugzilla.suse.com/1069401" source="BUGZILLA"/>
		<reference ref_id="1080891" ref_url="https://bugzilla.suse.com/1080891" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083087" ref_url="https://bugzilla.suse.com/1083087" source="BUGZILLA"/>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1092544" ref_url="https://bugzilla.suse.com/1092544" source="BUGZILLA"/>
		<reference ref_id="1093130" ref_url="https://bugzilla.suse.com/1093130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10286" ref_url="https://www.suse.com/security/cve/CVE-2017-10286/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.2.15 brings the following fixes and improvements.

Security issues:

- CVE-2018-2767: The embedded server library now supports SSL when connecting to remote servers (bsc#1088681).
- Collected CVEs fixes:
  * 10.2.15: CVE-2018-2786, CVE-2018-2759, CVE-2018-2777, CVE-2018-2810,
             CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
             CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761, 
             CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
  * 10.2.13: CVE-2018-2562, CVE-2018-2622, CVE-2018-2640, CVE-2018-2665,
             CVE-2018-2668, CVE-2018-2612
  * 10.2.10: CVE-2017-10378, CVE-2017-10268, CVE-2017-15365
  * 10.2.8:  CVE-2017-3636, CVE-2017-3641, CVE-2017-3653,
             CVE-2017-10320, CVE-2017-10365, CVE-2017-10379,
             CVE-2017-10384, CVE-2017-10286, CVE-2017-3257
  * 10.2.6:  CVE-2017-3308, CVE-2017-3309, CVE-2017-3453,
             CVE-2017-3456, CVE-2017-3464
  * 10.2.5:  CVE-2017-3313, CVE-2017-3302

Bugfixes:

- bsc#1092544: Update suse_skipped_tests.list and add tests that are failing with GCC 8.
- bsc#1012075: MariaDB Test Suite issue with test sys_vars.secure_file_priv.test. 
- bsc#1019948: mariadb even tumbleweed version is super old.
- bsc#1039034: no ODBC support in MariaDB Server. 
- bsc#1041891: Make mariadb tests pass and exclude failures. 
- bsc#1042632: Mariadb fails to build with openssl-1.1. 
- bsc#1043328: Update mariadb in TW to 10.2 and drop comat with mysql. 
- bsc#1047218: trackerbug: packages do not build reproducibly from including build time. 
- bsc#1055165: mariadb build with cassandra enabled. 
- bsc#1055268: MariaDB configurations are not overwritable. 
- bsc#1058374: Use bind-address directive and SSL section settings in default my.cnf. 
- bsc#1058729: MariaDB - mysql-test - connect.drop-open-error is failing (regression).
- bsc#1060110: The mariadb install script depends on hostname but does not require it. 
- bsc#1062583: Stop using boost-devel. 
- bsc#1067443: incomplete revert of the mariadb service rename. 
- bsc#1068906: MariaDB: ALTER TABLE can't rename columns with CHECK constraints. 
- bsc#1069401: Database failed apply with mariadb 10.2 : RuntimeError: Galera cluster did not start after 600 seconds. 
- bsc#1080891: server:database/mariadb: up-streaming patches. 
- bsc#1083087: Galera bootstrap failes work after MariaDB 10.2.13 upgrade. 
- bsc#1082318: mariadb-connector-c.changes and xtrabackup need to use %doc instead of %license.

Release notes and changelog:

- https://mariadb.com/kb/en/library/mariadb-10215-release-notes
- https://mariadb.com/kb/en/library/mariadb-10215-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012075">SUSE bug 1012075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019948">SUSE bug 1019948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039034">SUSE bug 1039034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041891">SUSE bug 1041891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042632">SUSE bug 1042632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043328">SUSE bug 1043328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047218">SUSE bug 1047218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055165">SUSE bug 1055165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055268">SUSE bug 1055268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058374">SUSE bug 1058374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058729">SUSE bug 1058729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060110">SUSE bug 1060110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062583">SUSE bug 1062583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067443">SUSE bug 1067443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068906">SUSE bug 1068906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069401">SUSE bug 1069401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080891">SUSE bug 1080891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083087">SUSE bug 1083087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092544">SUSE bug 1092544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093130">SUSE bug 1093130</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10286/">CVE-2017-10286</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79291" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-05"/>
	<updated date="2018-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594446" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594447" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550426" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594448" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550428" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594449" comment="openssl-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79292" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1091764" ref_url="https://bugzilla.suse.com/1091764" source="BUGZILLA"/>
		<reference ref_id="1097375" ref_url="https://bugzilla.suse.com/1097375" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004249.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.14.3 fixes the following issues:

The following security vulnerability was addressed:

- Fixed a denial of service (DoS) vulnerability in Buffer.fill(), which could
  hang when being called (CVE-2018-7167, bsc#1097375).

The following other changes were made:

- Use absolute paths in executable shebang lines
- Fixed building with ICU61.1 (bsc#1091764)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-05"/>
	<updated date="2018-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091764">SUSE bug 1091764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594450" comment="nodejs6-6.14.3-11.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79293" version="1" class="patch">
	<metadata>
		<title>Recommended update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1096141" ref_url="https://bugzilla.suse.com/1096141" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<description>


The Intel CPU microcode bundle was updated to the 20180703 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx

- Add a new style supplements for the recent kernels. (bsc#1096141)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096141">SUSE bug 1096141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519785" comment="ucode-intel-20180703-13.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79294" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1068565" ref_url="https://bugzilla.suse.com/1068565" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

These security issue were fixed: 

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)

This non-security issue was fixed: 

- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068565">SUSE bug 1068565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594451" comment="perl-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594452" comment="perl-base-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79295" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004291.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594453" comment="shadow-4.2.1-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79296" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1087289" ref_url="https://bugzilla.suse.com/1087289" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1097523" ref_url="https://bugzilla.suse.com/1097523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12891: Fix preemption checks bypass in x86 PV MM handling (XSA-264) (bsc#1097521).
- CVE-2018-12892: Fix libxl failure to honour readonly flag on HVM emulated SCSI disks (XSA-266) (bsc#1097523).
- CVE-2018-12893: Fix #DB exception safety check that could be triggered by a guest (XSA-265) (bsc#1097522).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-3665: Fix lazy FP Save/Restore (XSA-267) (bsc#1095242).

Bug fixes:

- bsc#1027519: Update to Xen 4.7.6 bug fix only release.
- bsc#1087289: Xen BUG at sched_credit.c:1663.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087289">SUSE bug 1087289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79297" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-sprockets-2_12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1098369" ref_url="https://bugzilla.suse.com/1098369" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004376.html" source="SUSE-SU"/>
		<description>
This update for rubygem-sprockets-2_12 fixes the following issues:

Security issue fixed:

- CVE-2018-3760: Fix path traversal in sprockets/server.rb:forbidden_request?() that can allow remote attackers to
  read arbitrary files (bsc#1098369).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-06"/>
	<updated date="2018-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1098369">SUSE bug 1098369</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594454" comment="ruby2.1-rubygem-sprockets-2_12-2.12.5-1.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79298" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1054849" ref_url="https://bugzilla.suse.com/1054849" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004409.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

The following other bugs were fixed:

- Fix libnss_wins.so.2 link libreplace with rpath (bsc#1054849)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054849">SUSE bug 1054849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594455" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550458" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594456" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550460" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594457" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550462" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594458" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550464" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594459" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550466" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594460" comment="libndr0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550468" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594461" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550470" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594462" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550472" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594463" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550474" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594464" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550476" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594465" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550478" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594466" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550480" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594467" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550482" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594468" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550484" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594469" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550486" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594470" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550488" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594471" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550490" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594472" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550492" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594473" comment="samba-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594474" comment="samba-client-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550495" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594475" comment="samba-libs-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550497" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594476" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550499" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79299" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79300" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594480" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79301" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79302" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-1050: Fixed denial of service vulnerability when SPOOLSS is run externally (bsc#1081741). 
- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594481" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79303" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1083635" ref_url="https://bugzilla.suse.com/1083635" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1094248" ref_url="https://bugzilla.suse.com/1094248" source="BUGZILLA"/>
		<reference ref_id="1096130" ref_url="https://bugzilla.suse.com/1096130" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097140" ref_url="https://bugzilla.suse.com/1097140" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098435" ref_url="https://bugzilla.suse.com/1098435" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1100491" ref_url="https://bugzilla.suse.com/1100491" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).

The following non-security bugs were fixed:

- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc-&gt;writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083635">SUSE bug 1083635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094248">SUSE bug 1094248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096130">SUSE bug 1096130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097140">SUSE bug 1097140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098435">SUSE bug 1098435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79304" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79305" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004500.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594486" comment="openssh-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594487" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594488" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594489" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79306" version="1" class="patch">
	<metadata>
		<title>Security update for grafana, kafka, logstash and monasca-installer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1086909" ref_url="https://bugzilla.suse.com/1086909" source="BUGZILLA"/>
		<reference ref_id="1090192" ref_url="https://bugzilla.suse.com/1090192" source="BUGZILLA"/>
		<reference ref_id="1090343" ref_url="https://bugzilla.suse.com/1090343" source="BUGZILLA"/>
		<reference ref_id="1090849" ref_url="https://bugzilla.suse.com/1090849" source="BUGZILLA"/>
		<reference ref_id="1094448" ref_url="https://bugzilla.suse.com/1094448" source="BUGZILLA"/>
		<reference ref_id="1095603" ref_url="https://bugzilla.suse.com/1095603" source="BUGZILLA"/>
		<reference ref_id="1096985" ref_url="https://bugzilla.suse.com/1096985" source="BUGZILLA"/>
		<reference ref_id="1102920" ref_url="https://bugzilla.suse.com/1102920" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12099" ref_url="https://www.suse.com/security/cve/CVE-2018-12099/" source="CVE"/>
		<reference ref_id="CVE-2018-1288" ref_url="https://www.suse.com/security/cve/CVE-2018-1288/" source="CVE"/>
		<reference ref_id="CVE-2018-3817" ref_url="https://www.suse.com/security/cve/CVE-2018-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004502.html" source="SUSE-SU"/>
		<description>
This update for grafana, kafka, logstash and monasca-installer fixes the following issues:

The following security issues have been fixed:

grafana:

- CVE-2018-12099: Fix Cross-Site-Scripting (XSS) vulnerabilities in dashboard links. (bsc#1096985)

kafka:

- CVE-2018-1288: Authenticated Kafka users may perform action reserved for the Broker via a manually created fetch
  request interfering with data replication, resulting in data loss. (bsc#1102920)

logstash:

- CVE-2018-3817: Fix potential leak of sensitive data when logging warnings about deprecated options. (bsc#1090849)

Additionally, the following non-security issues have been fixed:

monasca-installer:

- Add complete set of elasticsearch performance tunables.
- Update to version Build_20180427_14.04 (bsc#1090192, bsc#1090343)
- Fix bad elasticsearch-curator configuration. (bsc#1090192)
- Enable bootstrap.memory_lock for Elasticsearch. (bsc#1090343)

logstash:

- Declare Gemfile as config to prevent loss of installed plugins when updating.
- Stop installing prebuilt jruby for non-x86.

kafka: 

- Update to version 0.10.2.2 (bsc#1102920, CVE-2018-1288)
- Add noreplace directive for /etc/kafka/server.properties.
- Reduce package ownership of tmpfiles.d to bare minium. (SLE12 SP2) 
- Set log rotation options. (bsc#1094448)
- Disable jmxremote debugging. (bsc#1095603)
- Increase open file limits. (bsc#1086909)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-28"/>
	<updated date="2018-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086909">SUSE bug 1086909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090192">SUSE bug 1090192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090343">SUSE bug 1090343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090849">SUSE bug 1090849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094448">SUSE bug 1094448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095603">SUSE bug 1095603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096985">SUSE bug 1096985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102920">SUSE bug 1102920</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12099/">CVE-2018-12099</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1288/">CVE-2018-1288</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3817/">CVE-2018-3817</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594490" comment="grafana-4.5.1-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594491" comment="kafka-0.10.2.2-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594492" comment="logstash-2.4.1-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594493" comment="monasca-installer-20180608_12.47-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79307" version="1" class="patch">
	<metadata>
		<title>Security update for couchdb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1068386" ref_url="https://bugzilla.suse.com/1068386" source="BUGZILLA"/>
		<reference ref_id="1100973" ref_url="https://bugzilla.suse.com/1100973" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12636" ref_url="https://www.suse.com/security/cve/CVE-2017-12636/" source="CVE"/>
		<reference ref_id="CVE-2018-8007" ref_url="https://www.suse.com/security/cve/CVE-2018-8007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004523.html" source="SUSE-SU"/>
		<description>
This update for couchdb to 1.7.2 fixes the following security issues:

- CVE-2018-8007: Apache CouchDB administrative users can configure the database
  server via HTTP(S). Due to insufficient validation of administrator-supplied
  configuration settings via the HTTP API, it was possible for a CouchDB
  administrator user to escalate their privileges to that of the operating
  system's user that CouchDB runs under, by bypassing the blacklist of
  configuration settings that are not allowed to be modified via the HTTP API
  (bsc#1100973).
- CVE-2017-12636: CouchDB administrative users can configure the database
  server via HTTP(S). Some of the configuration options include paths for
  operating system-level binaries that are subsequently launched by CouchDB. This
  allowed an admin user in Apache CouchDB to execute arbitrary shell commands as
  the CouchDB user (bsc#1068386).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068386">SUSE bug 1068386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100973">SUSE bug 1100973</bugzilla>
	<cve impact="important" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12636/">CVE-2017-12636</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8007/">CVE-2018-8007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594494" comment="couchdb-1.7.2-2.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79308" version="1" class="patch">
	<metadata>
		<title>Security update for OpenStack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1084724" ref_url="https://bugzilla.suse.com/1084724" source="BUGZILLA"/>
		<reference ref_id="1095482" ref_url="https://bugzilla.suse.com/1095482" source="BUGZILLA"/>
		<reference ref_id="1099902" ref_url="https://bugzilla.suse.com/1099902" source="BUGZILLA"/>
		<reference ref_id="1100751" ref_url="https://bugzilla.suse.com/1100751" source="BUGZILLA"/>
		<reference ref_id="1102151" ref_url="https://bugzilla.suse.com/1102151" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14432" ref_url="https://www.suse.com/security/cve/CVE-2018-14432/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004522.html" source="SUSE-SU"/>
		<description>
This update for OpenStack fixes the following issues:

The following security issue with openstack-keystone has been fixed:

- CVE-2018-14432: Reduce duplication in federated authentication APIs. (bsc#1102151)

Additionally, the following non-security issues have been fixed:

openstack-dashboard:

- Fetch and show Cinder availability zones list during volume creation and volume creation from image. (bsc#1100751)

openstack-heat:

- Add Trunk resource support.

openstack-horizon-plugin-designate-ui:

- Install all designate panels that are available.

openstack-nova:

- Stop _undefine_domain erroring if domain not found. (bsc#1099902)
- Fix Nova to allow using cinder v3 endpoint. (bsc#1095482)

python-os-vif:

- Check if interface belongs to a Linux Bridge before removing. (bsc#1084724)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-31"/>
	<updated date="2018-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084724">SUSE bug 1084724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095482">SUSE bug 1095482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099902">SUSE bug 1099902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100751">SUSE bug 1100751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102151">SUSE bug 1102151</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14432/">CVE-2018-14432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594495" comment="openstack-dashboard-10.0.6~dev4-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594496" comment="openstack-heat-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594497" comment="openstack-heat-api-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594498" comment="openstack-heat-api-cfn-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594499" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594500" comment="openstack-heat-doc-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594501" comment="openstack-heat-engine-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594502" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594503" comment="openstack-heat-test-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594504" comment="openstack-horizon-plugin-designate-ui-3.0.2~dev1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594505" comment="openstack-keystone-10.0.3~dev9-7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594506" comment="openstack-keystone-doc-10.0.3~dev9-7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594507" comment="openstack-nova-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594508" comment="openstack-nova-api-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594509" comment="openstack-nova-cells-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594510" comment="openstack-nova-cert-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594511" comment="openstack-nova-compute-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594512" comment="openstack-nova-conductor-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594513" comment="openstack-nova-console-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594514" comment="openstack-nova-consoleauth-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594515" comment="openstack-nova-doc-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594516" comment="openstack-nova-novncproxy-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594517" comment="openstack-nova-placement-api-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594518" comment="openstack-nova-scheduler-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594519" comment="openstack-nova-serialproxy-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594520" comment="openstack-nova-vncproxy-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594521" comment="python-heat-7.0.7~dev10-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594522" comment="python-horizon-10.0.6~dev4-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594523" comment="python-horizon-plugin-designate-ui-3.0.2~dev1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594524" comment="python-keystone-10.0.3~dev9-7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594525" comment="python-nova-14.0.11~dev13-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594526" comment="python-os-vif-1.2.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79309" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar, crowbar-core, crowbar-ha, crowbar-openstack, crowbar-ui (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1005886" ref_url="https://bugzilla.suse.com/1005886" source="BUGZILLA"/>
		<reference ref_id="1073703" ref_url="https://bugzilla.suse.com/1073703" source="BUGZILLA"/>
		<reference ref_id="1081518" ref_url="https://bugzilla.suse.com/1081518" source="BUGZILLA"/>
		<reference ref_id="1083093" ref_url="https://bugzilla.suse.com/1083093" source="BUGZILLA"/>
		<reference ref_id="1093898" ref_url="https://bugzilla.suse.com/1093898" source="BUGZILLA"/>
		<reference ref_id="1096759" ref_url="https://bugzilla.suse.com/1096759" source="BUGZILLA"/>
		<reference ref_id="1098369" ref_url="https://bugzilla.suse.com/1098369" source="BUGZILLA"/>
		<reference ref_id="1103383" ref_url="https://bugzilla.suse.com/1103383" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611/" source="CVE"/>
		<reference ref_id="CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004530.html" source="SUSE-SU"/>
		<description>
This update for crowbar, crowbar-ha, crowbar-init, crowbar-openstack, crowbar-ui fixes the following issues:

This security issues was fixed:

- CVE-2018-3760: Upgrade rubygem-sprockets to prevent an information leak.
  Specially crafted requests could have been be used to access files that exists
  on the filesystem that is outside an application's root directory, when the
  Sprockets server is used in production (bsc#1098369).
- CVE-2016-861: Add rate limiting for glance api (bsc#1005886)

These non-security issues were fixed for crowbar:

- upgrade: Lock crowbar-ui before admin upgrade
- upgrade: Make sure schemas are properly migrated after the upgrade

These non-security issues were fixed for crowbar-core:

- upgrade: Add the upgrade menu entry
- upgrade: Fix upgrade link
- apache: copytruncate apache logs bsc#1083093
- Fix exception handling in get_log_lines
- upgrade: Raise the default timeouts for most time consuming actions
- upgrade: Do not allow manila-share on compute nodes
- control_lib: fix host allocation check
- upgrade: Check input is a valid node for nodes
- upgrade: Provide better information after the failure
- upgrade: Report missing scripts
- upgrade: Improve error messages with lists
- upgrade: Do not allow cinder-volume on compute nodes
- upgrade: Fix file layout for rails' autoloading (bsc#1096759)
- upgrade: Added API calls for postponing/resuming compute nodes upgrade
- upgrade: Unlock crowbar-ui after completed upgrade
- upgrade: Do not check if ceph roles are present on compute nodes
- upgrade: Fix labels for SOC8 repositories
- upgrade: Finish only controllers step

These non-security issues were fixed for crowbar-ha:

- haproxy: increased SSL stick table to 100k
- DRBD: Fix DRBD resources setup  on reinstall node
- pacemaker: allow multiple meta parameters (bsc#1093898)

These non-security issues were fixed for crowbar-openstack:

- nova: reload nova-placement-api (bsc#1103383)
- Synchronize SSL in the cluster (bsc#1081518)
- neutron: add force_metadata attribute
- copytruncate apache logs instead of creating
- rabbitmq: set client timout to default value
- Revert 'database: Split database-server role into backend specific roles'
- Revert 'database: Allow parallel deployments of postgresql and mysql'
- Revert 'database: Allow parallel HA deployment of PostgreSQL and MariaDB'
- Revert 'database: Fix 'Attributes' UI after role renaming'
- Revert 'monasca: Fix check for mysql after it got moved to a separate role'
- Revert 'Restore caching of db_settings'
- Revert 'database: Migration fixes for separate DB roles'
- database: Migration fixes for separate DB roles
- Restore caching of db_settings
- monasca: Fix check for mysql after it got moved to a separate role
- database: Fix 'Attributes' UI after role renaming
- database: Allow parallel HA deployment of PostgreSQL and MariaDB
- database: Allow parallel deployments of postgresql and mysql
- database: Split database-server role into backend specific roles
- Do not automatically put manila-share roles to compute nodes
- rabbitmq: check for rabbit readiness
- rabbitmq: Make sure rabbit is running on cluster
- monasca: various monasca-installer improvements
- manila: Correct field name for cluster name
- mariadb: Add prefix to configs
- mariadb: Remove redundant config values
- aodh: Add config for alarm_history_ttl (bsc#1073703)

These non-security issues were fixed for crowbar-ui:

- upgrade: Dummy backend for status testing
- upgrade: Refactor postpone nodes upgrade
- upgrade: Allow interruption of status wait loop
- upgrade: Added ability to postpone upgrade nodes
- upgrade: Add ability to postpone upgrade nodes
- upgrade: Add ability to postpone upgrade nodes
- upgrade: Add ability to postpone upgrade nodes
- Add ability to postpone upgrade
- upgrade: Remove openstack precheck
- upgrade: Fixed error key for ha_configured
- upgrade: Remove CEPH related code
- Remove the non-essential database-configuration controller
- remove ui typo test
- Remove database configuration option
- upgrade: Update SUSE-OpenStack-Cloud-8 label
- upgrade: Update admin and nodes repo names
- enable and document docker development environment
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-04"/>
	<updated date="2018-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005886">SUSE bug 1005886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073703">SUSE bug 1073703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081518">SUSE bug 1081518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083093">SUSE bug 1083093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093898">SUSE bug 1093898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096759">SUSE bug 1096759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098369">SUSE bug 1098369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103383">SUSE bug 1103383</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594527" comment="crowbar-4.0+git.1528801103.f5708341-7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594528" comment="crowbar-core-4.0+git.1534246408.3ab19c567-9.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594529" comment="crowbar-core-branding-upstream-4.0+git.1534246408.3ab19c567-9.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594530" comment="crowbar-devel-4.0+git.1528801103.f5708341-7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594531" comment="crowbar-ha-4.0+git.1533750802.5768e73-4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594532" comment="crowbar-openstack-4.0+git.1534254269.ce598a9fe-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594533" comment="crowbar-ui-1.1.0+git.1533844061.4ac8e723-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79310" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1091427" ref_url="https://bugzilla.suse.com/1091427" source="BUGZILLA"/>
		<reference ref_id="1094325" ref_url="https://bugzilla.suse.com/1094325" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1100112" ref_url="https://bugzilla.suse.com/1100112" source="BUGZILLA"/>
		<reference ref_id="959329" ref_url="https://bugzilla.suse.com/959329" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

This new feature was added:

- bsc#1094325, bsc#1094725: libxl: Enable virsh blockresize for XEN guests

This security issue was fixed:

- CVE-2017-5715: Additional fixes for the Spectre patches (bsc#1079869)

These non-security issues were fixed:

- bsc#1100112: schema: allow any strings in smbios entry qemu: escape smbios entry strings 
- bsc#1091427: libxl: fix segfault in libxlReconnectDomain 
- bsc#959329: libxl: don't set hasManagedSave when performing save 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091427">SUSE bug 1091427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094325">SUSE bug 1094325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100112">SUSE bug 1100112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959329">SUSE bug 959329</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594534" comment="libvirt-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594535" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594536" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594537" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594538" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594539" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594540" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594541" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594542" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594543" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594544" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594545" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594546" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594547" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594548" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594549" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594550" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594551" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594552" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79311" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1082828" ref_url="https://bugzilla.suse.com/1082828" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004536.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issue fixed:

- CVE-2017-15130: Fixed a potential denial of service via TLS SNI config
  lookups, which would slow the process down and could have led to exhaustive
  memory allocation and/or process restarts (bsc#1082828)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594553" comment="dovecot22-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594554" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594555" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594556" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79312" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-07"/>
	<updated date="2018-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79313" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1079334" ref_url="https://bugzilla.suse.com/1079334" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper provides the following fixes:

Update libzypp to version 16.17.20

Security issues fixed:

- PackageProvider: Validate delta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45

Security issue fixed:
- Improve signature check callback messages
  (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- do not recommend cron (bsc#1079334)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079334">SUSE bug 1079334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594560" comment="libzypp-16.17.20-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594561" comment="zypper-1.13.45-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79314" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594562" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545782" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594563" comment="openslp-server-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79315" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097748" ref_url="https://bugzilla.suse.com/1097748" source="BUGZILLA"/>
		<reference ref_id="1105019" ref_url="https://bugzilla.suse.com/1105019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.14.4 fixes the following issues:

Security issues fixed:

CVE-2018-12115: Fixed an out-of-bounds (OOB) write in Buffer.write() for UCS-2 encoding (bsc#1105019)
CVE-2018-0732: Upgrade to OpenSSL 1.0.2p, fixing a client DoS due to large DH parameter (bsc#1097158)

Other issues fixed:

- Recommend same major version npm package (bsc#1097748)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097748">SUSE bug 1097748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594564" comment="nodejs6-6.14.4-11.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79316" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1104826" ref_url="https://bugzilla.suse.com/1104826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594565" comment="apache2-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594566" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594567" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594568" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594569" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79317" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
- 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
- HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
- HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594570" comment="gnutls-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594571" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594572" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79318" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:

- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1104668)
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1104668)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1104668)
- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE. Successful attacks require human
  interaction from a person other than the attacker. Successful attacks of this
  vulnerability can result in takeover of Java SE. (bsc#1104668)
- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that
  allowed remote attackers to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a malformed DSA private key
  (bsc#1104668)
- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)
- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)
- CVE-2018-12539: Users other than the process owner might have been able to
  use Java Attach API to connect to an IBM JVM on the same machine and use Attach
  API operations, which includes the ability to execute untrusted native code
  (bsc#1104668)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79319" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="1072322" ref_url="https://bugzilla.suse.com/1072322" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

Security issues fixed:

- CVE-2017-15896: Vulnerable to CVE-2017-3737 due to embedded OpenSSL (bsc#1072322).
- CVE-2017-14919: Embedded zlib issue could cause a DoS via specific windowBits value.
- CVE-2017-3738: Embedded OpenSSL is vulnerable to rsaz_1024_mul_avx2 overflow bug on x86_64.
- CVE-2017-3736: Embedded OpenSSL is vulnerable to bn_sqrx8x_internal carry bug on x86_64 (bsc#1066242).
- CVE-2017-3735: Embedded OpenSSL is vulnerable to malformed X.509 IPAdressFamily that could cause OOB read (bsc#1056058).

Bug fixes:

- Update to LTS release 6.12.2 (bsc#1072322):
  * https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
  * https://nodejs.org/en/blog/release/v6.12.2/
  * https://nodejs.org/en/blog/release/v6.12.1/
  * https://nodejs.org/en/blog/release/v6.12.0/
  * https://nodejs.org/en/blog/release/v6.11.5/
  * https://nodejs.org/en/blog/release/v6.11.4/
  * https://nodejs.org/en/blog/release/v6.11.3/
  * https://nodejs.org/en/blog/release/v6.11.2/
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594575" comment="nodejs6-6.12.2-11.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79320" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79321" version="1" class="patch">
	<metadata>
		<title>Security update for smt, yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1006984" ref_url="https://bugzilla.suse.com/1006984" source="BUGZILLA"/>
		<reference ref_id="1006989" ref_url="https://bugzilla.suse.com/1006989" source="BUGZILLA"/>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="1097824" ref_url="https://bugzilla.suse.com/1097824" source="BUGZILLA"/>
		<reference ref_id="1103809" ref_url="https://bugzilla.suse.com/1103809" source="BUGZILLA"/>
		<reference ref_id="1103810" ref_url="https://bugzilla.suse.com/1103810" source="BUGZILLA"/>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470/" source="CVE"/>
		<reference ref_id="CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471/" source="CVE"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004613.html" source="SUSE-SU"/>
		<description>
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006984">SUSE bug 1006984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006989">SUSE bug 1006989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097824">SUSE bug 1097824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594582" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594583" comment="smt-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594584" comment="smt-support-3.0.37-52.23.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79322" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004615.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues in yast2-smt:

- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Added missing translation marks (bsc#1037811)
- Remove cron job rescheduling (bsc#1097560)

This update is a requirement for the security update for SMT. Because of that it is
tagged as security to ensure that all users, even those that only install security updates,
install it.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530266" comment="yast2-smt-3.0.14-17.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79323" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594585" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594586" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550545" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594587" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550547" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594588" comment="openssl-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79324" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594589" comment="qemu-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594590" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594591" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594592" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594593" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594594" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79325" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79326" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594597" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545819" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594598" comment="openslp-server-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79327" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594599" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594600" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594601" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594602" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79328" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79329" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004655.html" source="SUSE-SU"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594609" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594610" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545829" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530291" comment="postgresql-init-10-17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594611" comment="postgresql10-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594612" comment="postgresql10-contrib-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530293" comment="postgresql10-docs-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594613" comment="postgresql10-server-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79330" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1088810" ref_url="https://bugzilla.suse.com/1088810" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1094466" ref_url="https://bugzilla.suse.com/1094466" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="1108239" ref_url="https://bugzilla.suse.com/1108239" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14678" ref_url="https://www.suse.com/security/cve/CVE-2018-14678/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw (bnc#1106016).
- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allowed local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bnc#1092903).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).
- CVE-2018-13093: There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation (bnc#1100001).
- CVE-2018-13094: An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-13095: A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork (bnc#1099999).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-14678: The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S did not properly maintain RBX, which allowed local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges (bnc#1102715).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bnc#1107689).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following security bugs were fixed:
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).

The following non-security bugs were fixed:

- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- kABI: protect struct x86_emulate_ops (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kvm: MMU: always terminate page walks at level 1 (bsc#1062604).
- kvm: MMU: simplify last_pte_bitmap (bsc#1062604).
- kvm: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- kvm: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- kvm: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108239).
- net: ena: fix device destruction to gracefully free resources (bsc#1108239).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108239).
- net: ena: fix incorrect usage of memory barriers (bsc#1108239).
- net: ena: fix missing calls to READ_ONCE (bsc#1108239).
- net: ena: fix missing lock during device destruction (bsc#1108239).
- net: ena: fix potential double ena_destroy_device() (bsc#1108239).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108239).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1108239).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382 bsc#1100152).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- provide special timeout module parameters for EC2 (bsc#1065364).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86: Drop kernel trampoline stack. It is involved in breaking kdump/kexec infrastucture. (bsc#1099597)
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key &amp; ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088810">SUSE bug 1088810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094466">SUSE bug 1094466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108239">SUSE bug 1108239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14678/">CVE-2018-14678</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79331" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79332" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) could have locked up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)

Non security issues fixed:

- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79333" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594619" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594620" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79334" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="1104202" ref_url="https://bugzilla.suse.com/1104202" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 to 9.6.10 fixes the following issues:

These security issues were fixed:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199)
- CVE-2018-10925: Add missing authorization check on certain statements
  involved with 'INSERT ... ON CONFLICT DO UPDATE'. An attacker with 'CREATE
  TABLE' privileges could have exploited this to read arbitrary bytes server
  memory. If the attacker also had certain 'INSERT' and limited 'UPDATE'
  privileges to a particular table, they could have exploited this to update
  other columns in the same table (bsc#1104202)

For addition details please see
https://www.postgresql.org/docs/current/static/release-9-6-10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594621" comment="postgresql96-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594622" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594623" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79335" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594624" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79336" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594625" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548354" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594626" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594627" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594628" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79337" version="1" class="patch">
	<metadata>
		<title>Security update for smt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="1111056" ref_url="https://bugzilla.suse.com/1111056" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004795.html" source="SUSE-SU"/>
		<description>


SMT was updated to version 3.0.38.

Following security issue was fixed:

- CVE-2018-12472: Harden hostname check during sibling check by forcing double
  reverse lookup (bsc#1104076)

Following non security issues were fixed:

- Add migration path check when registration sharing is enabled
- Fix sibling sync errors (bsc#1111056):
  - Synchronize all registered products
  - Handle duplicate registrations when syncing
  - Force resync to the sibling instance in `upgrade` and
    `synchronize` API calls
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111056">SUSE bug 1111056</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594629" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594630" comment="smt-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594631" comment="smt-support-3.0.38-52.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79338" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1109961" ref_url="https://bugzilla.suse.com/1109961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004815.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-11763: In Apache HTTP Server by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. (bsc#1109961)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594632" comment="apache2-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594633" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594634" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594635" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594636" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79339" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594637" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594638" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594639" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594640" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594641" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594642" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79340" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79341" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79342" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594660" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594661" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594662" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594663" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594664" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79343" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594665" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594666" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594667" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594668" comment="openssl-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79344" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594669" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594670" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594671" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594672" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79345" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004887.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to 9.4.19 fixes the following security issue:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199).

A dump/restore is not required for this update unless you use
the functions query_to_xml, cursor_to_xml, cursor_to_xmlschema,
query_to_xmlschema, and query_to_xml_and_xmlschema. In this case please see
the first entry of https://www.postgresql.org/docs/9.4/static/release-9-4-18.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594673" comment="postgresql94-9.4.19-21.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594674" comment="postgresql94-contrib-9.4.19-21.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530335" comment="postgresql94-docs-9.4.19-21.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594675" comment="postgresql94-server-9.4.19-21.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79346" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594676" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594677" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594678" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594679" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79347" version="1" class="patch">
	<metadata>
		<title>Security update for python-oslo.cache, python-oslo.concurrency, python-oslo.db, python-oslo.log, python-oslo.messaging, python-oslo.middleware, python-oslo.serialization, python-oslo.service, python-oslo.utils, python-oslo.versionedobjects, python-oslo.vmware, python-oslotest (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1022043" ref_url="https://bugzilla.suse.com/1022043" source="BUGZILLA"/>
		<reference ref_id="1109756" ref_url="https://bugzilla.suse.com/1109756" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2592" ref_url="https://www.suse.com/security/cve/CVE-2017-2592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004896.html" source="SUSE-SU"/>
		<description>
This update for python-oslo.cache, python-oslo.concurrency, python-oslo.db, python-oslo.log, python-oslo.messaging, python-oslo.middleware, python-oslo.serialization, python-oslo.service, python-oslo.utils, python-oslo.versionedobjects, python-oslo.vmware, python-oslotest fixes the following issues:

python-oslo.cache was updated to 1.14.1:

- use stable/newton constraints

python-oslo.concurrency was updated to version 3.14.1:

- Ignore prlimit argument on Windows
- Update .gitreview for stable/newton

python-oslo.db was updated to version 4.13.6:

- Fix marker checking when value is None

python-oslo.log was updated to version 3.16.1:

- Fix races in unit tests

python-oslo.messaging was updated to fix:

- Skip logging sensitive information to avoid credential leak
- Avoid reconnect to the same AMQP server while trying to error handle the original server error (bsc#1109756)

python-oslo.middleware was updated to version 3.19.1:

- Filter token data out of catch_errors middleware (CVE-2017-2592 bsc#1022043)

python-oslo.serialization was updated to version 2.13.2:

- Don't iterate through addresses in netaddr.IPNetwork

python-oslo.service was updated to version 1.16.1:

- Fix race condition with fast threads

python-oslo.utils was updated to version 3.16.1:

- Updated from global requirements

python-oslo.versionedobjects was updated to version 1.17.1:

- update from global requirements

python-oslo.vmware was updated to version 2.14.1:

- Updated from global requirements

python-oslotest was updated to version 2.10.1:

- Updated from global requirements
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-27"/>
	<updated date="2018-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022043">SUSE bug 1022043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109756">SUSE bug 1109756</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2592/">CVE-2017-2592</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594680" comment="python-oslo.cache-1.14.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594681" comment="python-oslo.concurrency-3.14.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594682" comment="python-oslo.db-4.13.6-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594683" comment="python-oslo.log-3.16.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594684" comment="python-oslo.messaging-5.10.2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594685" comment="python-oslo.middleware-3.19.1-4.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594686" comment="python-oslo.serialization-2.13.2-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594687" comment="python-oslo.service-1.16.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594688" comment="python-oslo.utils-3.16.1-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594689" comment="python-oslo.versionedobjects-1.17.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594690" comment="python-oslo.vmware-2.14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594691" comment="python-oslotest-2.10.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79348" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79349" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594695" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594696" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79350" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<description>

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)

* Class Libraries:

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10930 CVE-2018-3183
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
  - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

  - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
  - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
  - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
  - IJ10931 CVE-2018-3169
  - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
  - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
  - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
  - IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

  - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
  - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
  - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

  - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

  - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
  - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
  - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
  - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER

* z/OS Extentions

  - PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM

* Java Virtual Machine

  - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
  - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

  - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE
  - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
  - IJ08205 CRASH WHILE COMPILING
  - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79351" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79352" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594702" comment="git-core-2.12.3-27.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79353" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594703" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594704" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594705" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594706" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594707" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594708" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594709" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594710" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594711" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594712" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594713" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594714" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594715" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594716" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594717" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79354" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79355" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-22"/>
	<updated date="2018-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79356" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following security vulnerabilities:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594734" comment="mailman-2.1.17-3.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79357" version="1" class="patch">
	<metadata>
		<title>Security update for ansible (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1065872" ref_url="https://bugzilla.suse.com/1065872" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00024.html" source="SUSE-SU"/>
		<description>
This update for ansible fixes the following issues:

- CVE-2017-7550: A flaw was found in the way Ansible passed certain
  parameters to the jenkins_plugin module. Remote attackers could use this
  flaw to expose sensitive information from a remote host's logs. This
  flaw was fixed by not allowing passwords to be specified in the 'params'
  argument, and noting this in the module documentation.  (bsc#1065872)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594735" comment="ansible-2.2.3.0-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79358" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1007869" ref_url="https://bugzilla.suse.com/1007869" source="BUGZILLA"/>
		<reference ref_id="1007870" ref_url="https://bugzilla.suse.com/1007870" source="BUGZILLA"/>
		<reference ref_id="1007871" ref_url="https://bugzilla.suse.com/1007871" source="BUGZILLA"/>
		<reference ref_id="1056865" ref_url="https://bugzilla.suse.com/1056865" source="BUGZILLA"/>
		<reference ref_id="798458" ref_url="https://bugzilla.suse.com/798458" source="BUGZILLA"/>
		<reference ref_id="817781" ref_url="https://bugzilla.suse.com/817781" source="BUGZILLA"/>
		<reference ref_id="857188" ref_url="https://bugzilla.suse.com/857188" source="BUGZILLA"/>
		<reference ref_id="858676" ref_url="https://bugzilla.suse.com/858676" source="BUGZILLA"/>
		<reference ref_id="858677" ref_url="https://bugzilla.suse.com/858677" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4971" ref_url="https://www.suse.com/security/cve/CVE-2011-4971/" source="CVE"/>
		<reference ref_id="CVE-2013-0179" ref_url="https://www.suse.com/security/cve/CVE-2013-0179/" source="CVE"/>
		<reference ref_id="CVE-2013-7239" ref_url="https://www.suse.com/security/cve/CVE-2013-7239/" source="CVE"/>
		<reference ref_id="CVE-2013-7290" ref_url="https://www.suse.com/security/cve/CVE-2013-7290/" source="CVE"/>
		<reference ref_id="CVE-2013-7291" ref_url="https://www.suse.com/security/cve/CVE-2013-7291/" source="CVE"/>
		<reference ref_id="CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706/" source="CVE"/>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<description>
This update for memcached fixes the following issues:

Security issues fixed:

- CVE-2011-4971: remote DoS (bsc#817781).
- CVE-2013-0179: DoS when printing out keys to be deleted in  verbose mode (bsc#798458).
- CVE-2013-7239: SASL authentication allows wrong credentials to access memcache (bsc#857188).
- CVE-2013-7290: remote DoS (segmentation fault) via a request to delete a key (bsc#858677).
- CVE-2013-7291: remote DoS (crash) via a request that triggers 'unbounded key print' (bsc#858676).
- CVE-2016-8704: Server append/prepend remote code execution (bsc#1007871).
- CVE-2016-8705: Server update remote code execution (bsc#1007870).
- CVE-2016-8706: Server ASL authentication remote code execution (bsc#1007869).
- CVE-2017-9951: Heap-based buffer over-read in try_read_command function (incomplete fix for CVE-2016-8705) (bsc#1056865).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007869">SUSE bug 1007869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007870">SUSE bug 1007870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007871">SUSE bug 1007871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798458">SUSE bug 798458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817781">SUSE bug 817781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857188">SUSE bug 857188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858676">SUSE bug 858676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858677">SUSE bug 858677</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4971/">CVE-2011-4971</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0179/">CVE-2013-0179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7239/">CVE-2013-7239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7290/">CVE-2013-7290</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7291/">CVE-2013-7291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79359" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1085276" ref_url="https://bugzilla.suse.com/1085276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00071.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2018-7750: Fixed transport.py in the SSH server implementation of Paramiko that does not properly check whether authentication is completed before processing other requests (bsc#1085276).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085276">SUSE bug 1085276</bugzilla>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594737" comment="python-paramiko-2.0.8-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79360" version="1" class="patch">
	<metadata>
		<title>Security update for erlang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1070960" ref_url="https://bugzilla.suse.com/1070960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000385" ref_url="https://www.suse.com/security/cve/CVE-2017-1000385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003896.html" source="SUSE-SU"/>
		<description>
This update for erlang fixes the following security issue:

- CVE-2017-1000385: An erlang TLS server configured with cipher suites using
  RSA key exchange, may be vulnerable to an Adaptive Chosen Ciphertext attack
  (AKA Bleichenbacher attack) against RSA, which when exploited, may result in
  plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack,
  despite the attacker not having gained access to the server's private key itself. (bsc#1070960)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070960">SUSE bug 1070960</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000385/">CVE-2017-1000385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594738" comment="erlang-17.5.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594739" comment="erlang-epmd-17.5.6-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79361" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1001374" ref_url="https://bugzilla.suse.com/1001374" source="BUGZILLA"/>
		<reference ref_id="1008047" ref_url="https://bugzilla.suse.com/1008047" source="BUGZILLA"/>
		<reference ref_id="1008050" ref_url="https://bugzilla.suse.com/1008050" source="BUGZILLA"/>
		<reference ref_id="1031450" ref_url="https://bugzilla.suse.com/1031450" source="BUGZILLA"/>
		<reference ref_id="1031451" ref_url="https://bugzilla.suse.com/1031451" source="BUGZILLA"/>
		<reference ref_id="1056284" ref_url="https://bugzilla.suse.com/1056284" source="BUGZILLA"/>
		<reference ref_id="1083304" ref_url="https://bugzilla.suse.com/1083304" source="BUGZILLA"/>
		<reference ref_id="1083305" ref_url="https://bugzilla.suse.com/1083305" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401/" source="CVE"/>
		<reference ref_id="CVE-2016-9013" ref_url="https://www.suse.com/security/cve/CVE-2016-9013/" source="CVE"/>
		<reference ref_id="CVE-2016-9014" ref_url="https://www.suse.com/security/cve/CVE-2016-9014/" source="CVE"/>
		<reference ref_id="CVE-2017-12794" ref_url="https://www.suse.com/security/cve/CVE-2017-12794/" source="CVE"/>
		<reference ref_id="CVE-2017-7233" ref_url="https://www.suse.com/security/cve/CVE-2017-7233/" source="CVE"/>
		<reference ref_id="CVE-2017-7234" ref_url="https://www.suse.com/security/cve/CVE-2017-7234/" source="CVE"/>
		<reference ref_id="CVE-2018-7536" ref_url="https://www.suse.com/security/cve/CVE-2018-7536/" source="CVE"/>
		<reference ref_id="CVE-2018-7537" ref_url="https://www.suse.com/security/cve/CVE-2018-7537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

Security issues fixed:

- CVE-2018-7537: Fixed catastrophic backtracking in django.utils.text.Truncator. (bsc#1083305)
- CVE-2018-7536: Fixed catastrophic backtracking in urlize and urlizetrunc template filters. (bsc#1083304)
- CVE-2017-12794: Fixed XSS possibility in traceback section of technical 500 debug page (bsc#1056284)
- CVE-2017-7234: Open redirect vulnerability in django.views.static.serve() (bsc#1031451)
- CVE-2017-7233: Open redirect and possible XSS attack via user-supplied numeric redirect URLs (bsc#1031450)
- CVE-2016-9014: DNS rebinding vulnerability when DEBUG=True (bsc#1008047)
- CVE-2016-9013: User with hardcoded password created when running tests on Oracle (bsc#1008050)
- CVE-2016-7401: CSRF protection bypass on a site with Google Analytics (bsc#1001374)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-18"/>
	<updated date="2018-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001374">SUSE bug 1001374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008047">SUSE bug 1008047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008050">SUSE bug 1008050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031450">SUSE bug 1031450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031451">SUSE bug 1031451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056284">SUSE bug 1056284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083304">SUSE bug 1083304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083305">SUSE bug 1083305</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9013/">CVE-2016-9013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9014/">CVE-2016-9014</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12794/">CVE-2017-12794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7233/">CVE-2017-7233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7234/">CVE-2017-7234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7536/">CVE-2018-7536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7537/">CVE-2018-7537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79362" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1086774" ref_url="https://bugzilla.suse.com/1086774" source="BUGZILLA"/>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086813" ref_url="https://bugzilla.suse.com/1086813" source="BUGZILLA"/>
		<reference ref_id="1086814" ref_url="https://bugzilla.suse.com/1086814" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="1086820" ref_url="https://bugzilla.suse.com/1086820" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715/" source="CVE"/>
		<reference ref_id="CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1302" ref_url="https://www.suse.com/security/cve/CVE-2018-1302/" source="CVE"/>
		<reference ref_id="CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

  * CVE-2018-1283:  when mod_session is configured to forward its session data to CGI applications 
                    (SessionEnv on, not the default), a remote user may influence their content by 
                    using a \'Session\' header leading to unexpected behavior [bsc#1086814].

  * CVE-2018-1301: due to an out of bound access after a size limit being reached by reading the HTTP header, 
                   a specially crafted request could lead to remote denial of service. [bsc#1086817]
  
  * CVE-2018-1303: a specially crafted HTTP request header could lead to crash due to an out of bound read 
                   while preparing data to be cached in shared memory.[bsc#1086813]
  
  * CVE-2017-15715: a regular expression could match '$' to a newline character in a malicious filename, 
                    rather than matching only the end of the filename. leading to corruption of uploaded files.[bsc#1086774]
  
  * CVE-2018-1312: when generating an HTTP Digest authentication challenge, the nonce sent to prevent 
                   reply attacks was not correctly generated using a pseudo-random seed. 
                   In a cluster of servers using a common Digest authentication configuration, 
                   HTTP requests could be replayed across servers by an attacker without detection. [bsc#1086775]
  
  * CVE-2017-15710: mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, 
                    uses the Accept-Language header value to lookup the right charset encoding when verifying the 
                    user's credentials. If the header value is not present in the charset conversion table, 
                    a fallback mechanism is used to truncate it to a two characters value to allow a quick retry 
                    (for example, 'en-US' is truncated to 'en'). 
                    A header value of less than two characters forces an out of bound write of one NUL byte to a 
                   memory location that is not part of the string. In the worst case, quite unlikely, the process 
                   would crash which could be used as a Denial of Service attack. In the more likely case, this memory 
                   is already reserved for future use and the issue has no effect at all. [bsc#1086820]
  
  * CVE-2018-1302: when an HTTP/2 stream was destroyed after being handled, it 
                   could have written a NULL pointer potentially to an already freed memory. 
                   The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, 
                   the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk. 
                   [bsc#1086820]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086820">SUSE bug 1086820</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1302/">CVE-2018-1302</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79363" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1057734" ref_url="https://bugzilla.suse.com/1057734" source="BUGZILLA"/>
		<reference ref_id="1070536" ref_url="https://bugzilla.suse.com/1070536" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076847" ref_url="https://bugzilla.suse.com/1076847" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1083745" ref_url="https://bugzilla.suse.com/1083745" source="BUGZILLA"/>
		<reference ref_id="1083836" ref_url="https://bugzilla.suse.com/1083836" source="BUGZILLA"/>
		<reference ref_id="1084353" ref_url="https://bugzilla.suse.com/1084353" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1084829" ref_url="https://bugzilla.suse.com/1084829" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085402" ref_url="https://bugzilla.suse.com/1085402" source="BUGZILLA"/>
		<reference ref_id="1085404" ref_url="https://bugzilla.suse.com/1085404" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1086194" ref_url="https://bugzilla.suse.com/1086194" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087845" ref_url="https://bugzilla.suse.com/1087845" source="BUGZILLA"/>
		<reference ref_id="1088241" ref_url="https://bugzilla.suse.com/1088241" source="BUGZILLA"/>
		<reference ref_id="1088242" ref_url="https://bugzilla.suse.com/1088242" source="BUGZILLA"/>
		<reference ref_id="1088600" ref_url="https://bugzilla.suse.com/1088600" source="BUGZILLA"/>
		<reference ref_id="1088684" ref_url="https://bugzilla.suse.com/1088684" source="BUGZILLA"/>
		<reference ref_id="1089198" ref_url="https://bugzilla.suse.com/1089198" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1090643" ref_url="https://bugzilla.suse.com/1090643" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)

The following non-security bugs were fixed:

- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&amp;W PX headphones (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: Remove Other from EIAC (bsc#1075428).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- rpm/config.sh: ensure sorted patches.
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).
- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).
- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057734">SUSE bug 1057734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070536">SUSE bug 1070536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076847">SUSE bug 1076847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083745">SUSE bug 1083745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083836">SUSE bug 1083836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085402">SUSE bug 1085402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085404">SUSE bug 1085404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086194">SUSE bug 1086194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087845">SUSE bug 1087845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088242">SUSE bug 1088242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088600">SUSE bug 1088600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088684">SUSE bug 1088684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089198">SUSE bug 1089198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79364" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1008846" ref_url="https://bugzilla.suse.com/1008846" source="BUGZILLA"/>
		<reference ref_id="973786" ref_url="https://bugzilla.suse.com/973786" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3076" ref_url="https://www.suse.com/security/cve/CVE-2016-3076/" source="CVE"/>
		<reference ref_id="CVE-2016-9190" ref_url="https://www.suse.com/security/cve/CVE-2016-9190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003980.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

  * CVE-2016-9190: Pillow allows context-dependent attackers to execute arbitrary code by using the 
    \'crafted image file\' approach, related to an \'Insecure Sign Extension\' issue affecting the 
    ImagingNew in Storage.c component. (bsc#1008846)

  * CVE-2016-3076: Heap-based buffer overflow in the j2k_encode_entry function allows remote attackers 
    to cause a denial of service (memory corruption) via a crafted Jpeg2000 file. (bsc#973786) 

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008846">SUSE bug 1008846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973786">SUSE bug 973786</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3076/">CVE-2016-3076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9190/">CVE-2016-9190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594745" comment="python-Pillow-2.8.1-4.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79365" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1087453" ref_url="https://bugzilla.suse.com/1087453" source="BUGZILLA"/>
		<reference ref_id="1087459" ref_url="https://bugzilla.suse.com/1087459" source="BUGZILLA"/>
		<reference ref_id="1087463" ref_url="https://bugzilla.suse.com/1087463" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003987.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

- Fix some node-gyp permissions

- New upstream LTS release 6.14.1:
  * Security fixes:
    + CVE-2018-7160: Fix for inspector DNS rebinding vulnerability (bsc#1087463)
    + CVE-2018-7158: Fix for 'path' module regular expression denial of service (bsc#1087459)
    + CVE-2018-7159: Reject spaces in HTTP Content-Length header values
      (bsc#1087453)

- New upstream LTS release 6.13.1:
  * http,tls: better support for IPv6 addresses
  * console: added console.count() and console.clear()
  * crypto:
    + expose ECDH class
    + added cypto.randomFill() and crypto.randomFillSync()
    + warn on invalid authentication tag length
  * deps: upgrade libuv to 1.16.1
  * dgram: added socket.setMulticastInterface()
  * http: add agent.keepSocketAlive and agent.reuseSocket as to
    allow overridable keep-alive behavior of Agent
  * lib: return this from net.Socket.end()
  * module: add builtinModules api that provides list of all
    builtin modules in Node
  * net: return this from getConnections()
  * promises: more robust stringification for unhandled rejections
  * repl: improve require() autocompletion
  * src:
    + add openssl-system-ca-path configure option
    + add --use-bundled-ca --use-openssl-ca check
    + add process.ppid
  * tls: accept lookup option for tls.connect()
  * tools,build: a new macOS installer!
  * url: WHATWG URL api support
  * util: add %i and %f formatting specifiers
- remove any old manpage files in %pre from before update-alternatives
  were used to manage symlinks to these manpages.

- Add Recommends and BuildRequire on python2 for npm. node-gyp
  requires this old version of python for now. This is only needed
  for binary modules.

- even on recent codestreams there is no binutils gold on s390
  only on s390x

- New upstream LTS release 6.12.3:
  * v8: profiler-related fixes
  * mostly documentation and test related changes

- Enable CI tests in %check target
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594746" comment="nodejs6-6.14.1-11.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79366" version="1" class="patch">
	<metadata>
		<title>Security update for python-pysaml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1074662" ref_url="https://bugzilla.suse.com/1074662" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000433" ref_url="https://www.suse.com/security/cve/CVE-2017-1000433/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003990.html" source="SUSE-SU"/>
		<description>
This update for python-pysaml2 fixes the following issues:

  - CVE-2017-1000433: When python optimizations are enabled, any user is able to login without knowing their password. (bsc#1074662)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-09"/>
	<updated date="2018-05-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1074662">SUSE bug 1074662</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000433/">CVE-2017-1000433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594747" comment="python-pysaml2-4.0.2-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79367" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).

These non-security issues were fixed:

- bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly
- bsc#1027519: Fixed shadow mode guests
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79368" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<description>
This update for curl fixes several issues:

Security issues fixed:

- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:

- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
  (bsc#1086825)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-17"/>
	<updated date="2018-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594748" comment="curl-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594749" comment="libcurl4-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546204" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79369" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to the ESR 52.8 release fixes the following issues:

Mozil to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594750" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594751" comment="MozillaFirefox-devel-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79370" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1079405" ref_url="https://bugzilla.suse.com/1079405" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

This feature was added:

- Add support for block resize support for xen disks through the monitor

This non-security issue was fixed:

- bsc#1079405: Add new look up path 'sys/class/tpm' for tpm cancel path based
  on Linux 4.0 change
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-21"/>
	<updated date="2018-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079405">SUSE bug 1079405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594753" comment="qemu-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594754" comment="qemu-block-curl-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530396" comment="qemu-block-rbd-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594755" comment="qemu-block-ssh-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594756" comment="qemu-guest-agent-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530399" comment="qemu-ipxe-1.0.0-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550993" comment="qemu-kvm-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594757" comment="qemu-lang-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550995" comment="qemu-s390-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530402" comment="qemu-seabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530403" comment="qemu-sgabios-8-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594758" comment="qemu-tools-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530405" comment="qemu-vgabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530406" comment="qemu-x86-2.6.2-41.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79371" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1090953" ref_url="https://bugzilla.suse.com/1090953" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1092289" ref_url="https://bugzilla.suse.com/1092289" source="BUGZILLA"/>
		<reference ref_id="1093215" ref_url="https://bugzilla.suse.com/1093215" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

The following related and non-security bugs were fixed:

- cpuid: Fix cpuid.edx.7.0 propagation to guest
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090953">SUSE bug 1090953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092289">SUSE bug 1092289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093215">SUSE bug 1093215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594759" comment="kernel-default-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594760" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594761" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551000" comment="kernel-default-man-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594762" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79372" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1086247" ref_url="https://bugzilla.suse.com/1086247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

Security issues fixed:

- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:

- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
  external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086247">SUSE bug 1086247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594763" comment="bash-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594764" comment="libreadline6-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79373" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) used an integer data type
  that is inconsistent with a header file, which allowed remote attackers
  to cause a denial of service (incorrect malloc followed by invalid free)
  or possibly execute arbitrary code via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) did not properly track
  directionally isolated pieces of text, which allowed remote attackers
  to cause a denial of service (heap-based buffer overflow) or possibly
  execute arbitrary code via crafted text (bsc#929629).
- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in
  common/uloc.cpp in International Components for Unicode (ICU) for C/C++
  did not ensure that there is a '\0' character at the end of a certain
  temporary array, which allowed remote attackers to cause a denial of
  service (out-of-bounds read) or possibly have unspecified other impact
  via a call with a long httpAcceptLanguage argument (bsc#990636).
- CVE-2017-7868: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_moveIndex32* function (bsc#1034674)
- CVE-2017-7867: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_setNativeIndex* function (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International
  Components for Unicode (ICU) for C/C++ allowed remote attackers to
  execute arbitrary code via a crafted string, aka a 'redundant UVector
  entry clean up function call' issue (bnc#1067203)
- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp
  in International Components for Unicode (ICU) for C/C++ mishandled
  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote
  attackers to cause a denial of service (stack-based buffer overflow
  and application crash) or possibly have unspecified other impact via a
  crafted string, as demonstrated by ZNC  (bnc#1072193)
- CVE-2017-15422: An integer overflow in icu during persian calendar
  date processing could lead to incorrect years shown (bnc#1077999)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79374" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-nova (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1070603" ref_url="https://bugzilla.suse.com/1070603" source="BUGZILLA"/>
		<reference ref_id="1073933" ref_url="https://bugzilla.suse.com/1073933" source="BUGZILLA"/>
		<reference ref_id="1081685" ref_url="https://bugzilla.suse.com/1081685" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18191" ref_url="https://www.suse.com/security/cve/CVE-2017-18191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004091.html" source="SUSE-SU"/>
		<description>
This update for openstack-nova fixes the following bugs and security issues:

The following security-issue has been fixed:

- CVE-2017-18191: libvirt: Block swap volume attempts with encrypted volumes. (bsc#1081685)

Additionally, the following bugs have been fixed:

- Set TasksMax to infinity for openstack-nova-compute. (bsc#1070603)
- Fix qemu-img convert image incompatability in alpine linux. (bsc#1073933)
- Update openstack-nova-placement-api handling.
  + Remove the systemd .service file. the placement-api should run in a real WSGI container.
  + Add a apache vhost sample configuration.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-28"/>
	<updated date="2018-05-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1070603">SUSE bug 1070603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073933">SUSE bug 1073933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081685">SUSE bug 1081685</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-18191/">CVE-2017-18191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594768" comment="openstack-nova-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594769" comment="openstack-nova-api-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594770" comment="openstack-nova-cells-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594771" comment="openstack-nova-cert-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594772" comment="openstack-nova-compute-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594773" comment="openstack-nova-conductor-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594774" comment="openstack-nova-console-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594775" comment="openstack-nova-consoleauth-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594776" comment="openstack-nova-doc-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594777" comment="openstack-nova-novncproxy-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594778" comment="openstack-nova-placement-api-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594779" comment="openstack-nova-scheduler-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594780" comment="openstack-nova-serialproxy-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594781" comment="openstack-nova-vncproxy-14.0.11~dev13-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594782" comment="python-nova-14.0.11~dev13-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79375" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79376" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1132549" ref_url="https://bugzilla.suse.com/1132549" source="BUGZILLA"/>
		<reference ref_id="1132664" ref_url="https://bugzilla.suse.com/1132664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:

- CVE-2019-11235: Fixed an authentication bypass related to the EAP-PWD Commit frame and insufficent validation of elliptic curve points (bsc#1132549).
- CVE-2019-11234: Fixed an authentication bypass caused by reflecting privous values back to the server (bsc#1132664).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594787" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594788" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594789" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594790" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594791" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594792" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594793" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594794" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594795" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594796" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594797" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79377" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594798" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546273" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79378" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594799" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79379" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594800" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79380" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594801" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551008" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594802" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594803" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594804" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594805" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594806" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594807" comment="krb5-server-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79381" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79382" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005421.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594808" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594809" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551017" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594810" comment="libopenssl1_0_0-hmac-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551019" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594811" comment="openssl-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530435" comment="openssl-doc-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79383" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79384" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005430.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Save registry file outside share as unprivileged user (bsc#1131060).

Non-security issue fixed:

- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-08"/>
	<updated date="2019-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594819" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79385" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1087481" ref_url="https://bugzilla.suse.com/1087481" source="BUGZILLA"/>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1114459" ref_url="https://bugzilla.suse.com/1114459" source="BUGZILLA"/>
		<reference ref_id="1126463" ref_url="https://bugzilla.suse.com/1126463" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005440.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fixed an issue where the first login failed and subsequent ones work (bsc#1126463).
- Fixed winbind running out of memory with high number of domain groups (bsc#1114459).
- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087481">SUSE bug 1087481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114459">SUSE bug 1114459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126463">SUSE bug 1126463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594820" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551030" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594821" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551032" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594822" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551034" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594823" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551036" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594824" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551038" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594825" comment="libndr0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551040" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594826" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551042" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594827" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551044" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594828" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551046" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594829" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551048" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594830" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551050" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594831" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551052" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594832" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551054" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594833" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551056" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594834" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551058" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594835" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551060" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594836" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551062" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594837" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551064" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594838" comment="samba-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594839" comment="samba-client-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551067" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594840" comment="samba-libs-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551069" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594841" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551071" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79386" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005433.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79387" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79388" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79389" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594846" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594847" comment="libudev-devel-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594848" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594849" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594850" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594851" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79390" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Following security issues were fixed:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79391" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1024908" ref_url="https://bugzilla.suse.com/1024908" source="BUGZILLA"/>
		<reference ref_id="1034113" ref_url="https://bugzilla.suse.com/1034113" source="BUGZILLA"/>
		<reference ref_id="1043485" ref_url="https://bugzilla.suse.com/1043485" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1080533" ref_url="https://bugzilla.suse.com/1080533" source="BUGZILLA"/>
		<reference ref_id="1082632" ref_url="https://bugzilla.suse.com/1082632" source="BUGZILLA"/>
		<reference ref_id="1087231" ref_url="https://bugzilla.suse.com/1087231" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1087906" ref_url="https://bugzilla.suse.com/1087906" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094268" ref_url="https://bugzilla.suse.com/1094268" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1124832" ref_url="https://bugzilla.suse.com/1124832" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1129279" ref_url="https://bugzilla.suse.com/1129279" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1132673" ref_url="https://bugzilla.suse.com/1132673" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. (bnc#1096748).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. (bnc#1096748).
- CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c allowed local users to cause a denial of service (memory corruption), obtain sensitive information or possibly have unspecified other impact via a write or read request involving the 'RDMA protocol over infiniband' (aka Soft RoCE) technology (bnc#1024908).
- CVE-2017-18174: In the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c has multiple race conditions (bnc#1133188).
- CVE-2019-3882: A flaw was found in the vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS) (bsc#1131427).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2017-17741: The KVM implementation allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2019-9503, CVE-2019-8564: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828, bnc#1132673).

The following non-security bugs were fixed:

- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- add mainline tags to four hyperv patches
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- Drivers: hv: vmbus: Define an API to retrieve virtual processor index (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the event page (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the message page (bsc#1122822).++ kernel-source.spec (revision 4)Release:    &amp;lt;RELEASE&gt;.gbd4498d
- Drivers: hv: vmbus: Define APIs to manipulate the synthetic interrupt controller (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1111331).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from &lt;linux/bitops.h&gt; to a new &lt;linux/bits.h&gt; file (bsc#1111331).
- MDS: Add CVE refs
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1129279).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1129279).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1129279).
- net: ena: complete host info to match latest ENA spec (bsc#1129279).
- net: ena: enable Low Latency Queues (bsc#1129279).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1129279).
- net: ena: fix auto casting to boolean (bsc#1129279).
- net: ena: fix compilation error in xtensa architecture (bsc#1129279).
- net: ena: fix crash during ena_remove() (bsc#1129279).
- net: ena: fix crash during failed resume from hibernation (bsc#1129279).
- net: ena: fix indentations in ena_defs for better readability (bsc#1129279).
- net: ena: Fix Kconfig dependency on X86 (bsc#1129279).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1129279).
- net: ena: fix race between link up and device initalization (bsc#1129279).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1129279).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1129279).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1129279).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1129279).
- net: ena: minor performance improvement (bsc#1129279).
- net: ena: remove ndo_poll_controller (bsc#1129279).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1129279).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1129279).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129279).
- net: ena: update driver version to 2.0.1 (bsc#1129279).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1129279).
- PCI: hv: Add vPCI version protocol negotiation (bnc#1043485, bsc#1122822).
- PCI: hv: Allocate interrupt descriptors with GFP_ATOMIC (bnc#1034113, bsc#1122822).
- PCI: hv: Disable/enable IRQs rather than BH in hv_compose_msi_msg() (bnc#1094268, bsc#1122822).
- PCI: hv: Do not sleep in compose_msi_msg() (bsc#1082632, bsc#1122822).
- PCI: hv: Fix 2 hang issues in hv_compose_msi_msg() (bsc#1087659, bsc#1087906, bsc#1122822).
- PCI: hv: Fix a comment typo in _hv_pcifront_read_config() (bsc#1087659, bsc#1122822).
- PCI: hv: Fix comment formatting and use proper integer fields (bnc#1043485, bsc#1122822).
- PCI: hv: Only queue new work items in hv_pci_devices_present() if necessary (bsc#1087659, bsc#1122822).
- PCI: hv: Remove the bogus test in hv_eject_device_work() (bsc#1087659, bsc#1122822).
- PCI: hv: Serialize the present and eject work items (bsc#1087659, bsc#1122822).
- PCI: hv: Specify CPU_AFFINITY_ALL for MSI affinity when &gt;= 32 CPUs (bnc#1043485, bsc#1122822).
- PCI: hv: Temporary own CPU-number-to-vCPU-number infra (bnc#1043485, bsc#1122822).
- PCI: hv: Use effective affinity mask (bsc#1109772, bsc#1122822).
- PCI: hv: Use page allocation for hbus structure (bnc#1043485, bsc#1122822).
- PCI: hv: Use vPCI protocol version 1.2 (bnc#1043485, bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1068032).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1111331).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- Use upstream variant of two pci-hyperv patches
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382 bsc#1100152).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1111331).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#1111331).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772, bsc#1122822).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86: stop exporting msr-index.h to userland (bsc#1111331).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382 bsc#1100152).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382 bsc#1100152).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024908">SUSE bug 1024908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034113">SUSE bug 1034113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043485">SUSE bug 1043485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082632">SUSE bug 1082632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087906">SUSE bug 1087906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094268">SUSE bug 1094268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124832">SUSE bug 1124832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129279">SUSE bug 1129279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79392" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79393" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594862" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594863" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594864" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594865" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79394" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594866" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79395" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594869" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594870" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594871" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594872" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594873" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79396" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594874" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594875" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546375" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79397" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Fixed an issue with live migration when spectre is enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue with live migration (bsc#1133818).
- Added upstream bug fix (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79398" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79399" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79400" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594883" comment="bind-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594884" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594885" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594886" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79401" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other security issues fixed:

- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest hostname under readonly mode (bsc#1131595).
- qemu: Add support for using AES secret for SCSI hotplug
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594887" comment="libvirt-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594888" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594889" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594890" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594891" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594892" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594893" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594894" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594895" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594896" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594897" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594898" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594899" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594900" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594901" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594902" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594903" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594904" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594905" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79402" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594906" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594907" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594908" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594909" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594910" comment="python-demo-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594911" comment="python-devel-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594912" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594913" comment="python-idle-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594914" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594915" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79403" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594916" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594917" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594918" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79404" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1114828" ref_url="https://bugzilla.suse.com/1114828" source="BUGZILLA"/>
		<reference ref_id="1116600" ref_url="https://bugzilla.suse.com/1116600" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005535.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

Security issued fixed:

- CVE-2018-16471: Fixed a cross-site scripting vulnerability via 'scheme' method (bsc#1116600).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114828">SUSE bug 1114828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116600">SUSE bug 1116600</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594919" comment="ruby2.1-rubygem-rack-1.6.11-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79405" version="1" class="patch">
	<metadata>
		<title>Recommended update for mariadb, mariadb-connector-c (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1064113" ref_url="https://bugzilla.suse.com/1064113" source="BUGZILLA"/>
		<reference ref_id="1064114" ref_url="https://bugzilla.suse.com/1064114" source="BUGZILLA"/>
		<reference ref_id="1072167" ref_url="https://bugzilla.suse.com/1072167" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112377" ref_url="https://bugzilla.suse.com/1112377" source="BUGZILLA"/>
		<reference ref_id="1112384" ref_url="https://bugzilla.suse.com/1112384" source="BUGZILLA"/>
		<reference ref_id="1112386" ref_url="https://bugzilla.suse.com/1112386" source="BUGZILLA"/>
		<reference ref_id="1112391" ref_url="https://bugzilla.suse.com/1112391" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112404" ref_url="https://bugzilla.suse.com/1112404" source="BUGZILLA"/>
		<reference ref_id="1112415" ref_url="https://bugzilla.suse.com/1112415" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1112767" ref_url="https://bugzilla.suse.com/1112767" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1120041" ref_url="https://bugzilla.suse.com/1120041" source="BUGZILLA"/>
		<reference ref_id="1122198" ref_url="https://bugzilla.suse.com/1122198" source="BUGZILLA"/>
		<reference ref_id="1122475" ref_url="https://bugzilla.suse.com/1122475" source="BUGZILLA"/>
		<reference ref_id="1127027" ref_url="https://bugzilla.suse.com/1127027" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.22 fixes the following issues:

Security issues fixed: 

- Update to MariaDB 10.2.22 GA:
  * CVE-2019-2510: (bsc#1122198)
  * CVE-2019-2537: (bsc#1122198)
- Update to MariaDB 10.2.19 GA (bsc#1116686):
  * CVE-2018-3282: (bsc#1112432)
  * CVE-2016-9843: (bsc#1013882)
  * CVE-2018-3174: (bsc#1112368)
  * CVE-2018-3143: (bsc#1112421)
  * CVE-2018-3156: (bsc#1112417)
  * CVE-2018-3251: (bsc#1112397)
  * CVE-2018-3185: (bsc#1112384)
  * CVE-2018-3277: (bsc#1112391)
  * CVE-2018-3162: (bsc#1112415)
  * CVE-2018-3173: (bsc#1112386)
  * CVE-2018-3200: (bsc#1112404)
  * CVE-2018-3284: (bsc#1112377)
- Update to MariaDB 10.2.18 GA:
  * CVE-2017-10320: (bsc#1064113)
  * CVE-2017-10365: (bsc#1064114)
  * CVE-2017-15365: (bsc#1072167)
  * CVE-2018-3058: (bsc#1101676)
  * CVE-2018-3063: (bsc#1101677)
  * CVE-2018-3064: (bsc#1103342)
  * CVE-2018-3066: (bsc#1101678)
  * CVE-2018-2759, CVE-2018-2777, CVE-2018-2786, CVE-2018-2810, CVE-2018-3060

Other issues fixed:

- Fixed an issue where mysl_install_db fails due to incorrect basedir (bsc#1127027).
- Fixed an issue where the lograte was not working (bsc#1112767).
- Remove xtrabackup dependency  as MariaDB ships a build in mariabackup so xtrabackup is not needed (bsc#1122475).
- Fixed database corruption after renaming a prefix-indexed column (bsc#1120041).
- Remove PerconaFT from the package as it has AGPL licence (bsc#1118754).

The complete changelog can be found at:  https://mariadb.com/kb/en/library/mariadb-10222-changelog/
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064113">SUSE bug 1064113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064114">SUSE bug 1064114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072167">SUSE bug 1072167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112377">SUSE bug 1112377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112384">SUSE bug 1112384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112386">SUSE bug 1112386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112391">SUSE bug 1112391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112404">SUSE bug 1112404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112415">SUSE bug 1112415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112767">SUSE bug 1112767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120041">SUSE bug 1120041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122475">SUSE bug 1122475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127027">SUSE bug 1127027</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79406" version="1" class="patch">
	<metadata>
		<title>Security update for Cloud7 packages (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1063535" ref_url="https://bugzilla.suse.com/1063535" source="BUGZILLA"/>
		<reference ref_id="1074662" ref_url="https://bugzilla.suse.com/1074662" source="BUGZILLA"/>
		<reference ref_id="1112767" ref_url="https://bugzilla.suse.com/1112767" source="BUGZILLA"/>
		<reference ref_id="1113107" ref_url="https://bugzilla.suse.com/1113107" source="BUGZILLA"/>
		<reference ref_id="1118004" ref_url="https://bugzilla.suse.com/1118004" source="BUGZILLA"/>
		<reference ref_id="1120767" ref_url="https://bugzilla.suse.com/1120767" source="BUGZILLA"/>
		<reference ref_id="1122053" ref_url="https://bugzilla.suse.com/1122053" source="BUGZILLA"/>
		<reference ref_id="1122875" ref_url="https://bugzilla.suse.com/1122875" source="BUGZILLA"/>
		<reference ref_id="1123709" ref_url="https://bugzilla.suse.com/1123709" source="BUGZILLA"/>
		<reference ref_id="1127558" ref_url="https://bugzilla.suse.com/1127558" source="BUGZILLA"/>
		<reference ref_id="1127752" ref_url="https://bugzilla.suse.com/1127752" source="BUGZILLA"/>
		<reference ref_id="1128954" ref_url="https://bugzilla.suse.com/1128954" source="BUGZILLA"/>
		<reference ref_id="1128987" ref_url="https://bugzilla.suse.com/1128987" source="BUGZILLA"/>
		<reference ref_id="1130414" ref_url="https://bugzilla.suse.com/1130414" source="BUGZILLA"/>
		<reference ref_id="1131053" ref_url="https://bugzilla.suse.com/1131053" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000433" ref_url="https://www.suse.com/security/cve/CVE-2017-1000433/" source="CVE"/>
		<reference ref_id="CVE-2018-1000872" ref_url="https://www.suse.com/security/cve/CVE-2018-1000872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005539.html" source="SUSE-SU"/>
		<description>
This update provides fixes for the following packages issues:

caasp-openstack-heat-templates:

- Update to version 1.0+git.1553079189.3bf8922:
  * SCRD-2813 Add support for CPI parameters
- Update to version 1.0+git.1547562889.43707e7:
  * Switch LB protocol from HTTP to HTTPS

crowbar:

- Update to version 4.0+git.1551088848.823bcaa3:
  * install-chef-suse: filter comments from  authorized_keys file

crowbar-core:

- Update to version 4.0+git.1556285635.ab602dd4d:
  * network: run wicked ifdown for interface cleanup (bsc#1063535)
- Update to version 4.0+git.1554931881.d98412e0e:
  * Fix cloud-mkcloud9-job-backup-restore (SCRD-7126)
- Update to version 4.0+git.1552239940.5bc9aaac4:
  * crowbar: Do not rely on Chef::Util::FileEdit to write the file (bsc#1127752)
- Update to version 4.0+git.1550493400.9787ea9ad:
  * upgrade: Delay status switch after upgrade ends
- Update to version 4.0+git.1549474445.d9a35cf52:
  * fix hound warning
  * Support RAID 0
- Packaged default upgrade timeouts file 
- Update to version 4.0+git.1549136953.afcde921f:
  * apache2: enable sslsessioncache
- Update to version 4.0+git.1548859099.0edbbfdc2:
  * upgrade: Add default upgrade timeouts file

crowbar-ha:

- Update to version 4.0+git.1556181005.47c643d:
  * pacemaker: wait more for founder if SBD is configured (SCRD-8462)
  * pacemaker: don't check cluster members on founder (SCRD-8462)
- Update to version 4.0+git.1554215159.8a42a71:
  * improve galera HA setup (bsc#1122875)

crowbar-openstack:

- Update to version 4.0+git.1554887450.ff7c30c1c:
  * neutron: Added option to use L3 HA with Keepalived
- Update to version 4.0+git.1554843756.5622551da:
  * ironic: Fix regression in helper
- Update to version 4.0+git.1554814630.ec3c89f25:
  * ceilometer: Install package which contains cron file (bsc#1130414)
- Update to version 4.0+git.1551459192.89433e13b:
  * rabbit: fix mirroring regex
- Update to version 4.0+git.1550582615.f6b433ec7:
  * ceilometer: Use pacemaker to handle expirer cron link (bsc#1113107)
- Update to version 4.0+git.1550262335.9667fa580:
  * mysql: Do not set a custom logfile for mysqld (bsc#1112767)
  * mysql: create .my.cnf in root home directory for mysql cmdline
- Update to version 4.0+git.1549986893.df836d6cc:
  * mariadb: Remove installing the xtrabackup package
  * ssl: Fix ACL setup in ssl_setup provider (bsc#1123709)
  
galera-python-clustercheck:

- readtimeout.patch: Add socket read timeout (bsc#1122053)

openstack-ceilometer:

- Install openstack-ceilometer-expirer.cron into /usr/share/ceilometer
  This is needed in a clustered environment where multiple
  ceilometer-collector services are installed on different nodes
  (and due to that multiple expirer cron jobs installed). That
  can lead to deadlocks when the cron jobs run in parallel on
  the different nodes (bsc#1113107)

openstack-heat-gbp:

- switch to newton branch

python-PyKMIP:

- Fix a denial-of-service bug by setting the server socket timeout (bsc#1120767 CVE-2018-1000872) 

python-pysaml2:

- Fix for the authentication bypass due to optimizations (CVE-2017-1000433, bsc#1074662)

rubygem-crowbar-client:

- Update to 3.9.0
 - Add support for the restricted APIs
 - Add --raw to 'proposal show' and 'proposal edit'
 - Correctly parse error messages that we don't handle natively
 - Better upgrade repocheck output
- Update to 3.7.0
  - upgrade: Use cloud_version config for upgrade
  - ses: Add ses upload subcommand
  - Add cloud_version config field.
  - Wrap os-release file parsing for better reuse.
  - upgrade: Fix repocheck component in error message
  - upgrade: Better repocheck output
- updated to version 3.6.1
  * Hide the database step when it is not used (bsc#1118004)
  * Fix help strings
  * Describe how to upgrade more nodes with one command
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-07"/>
	<updated date="2019-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063535">SUSE bug 1063535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074662">SUSE bug 1074662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112767">SUSE bug 1112767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113107">SUSE bug 1113107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118004">SUSE bug 1118004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122053">SUSE bug 1122053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122875">SUSE bug 1122875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123709">SUSE bug 1123709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127558">SUSE bug 1127558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127752">SUSE bug 1127752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128954">SUSE bug 1128954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128987">SUSE bug 1128987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130414">SUSE bug 1130414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131053">SUSE bug 1131053</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000433/">CVE-2017-1000433</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000872/">CVE-2018-1000872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594926" comment="caasp-openstack-heat-templates-1.0+git.1553079189.3bf8922-1.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594927" comment="crowbar-4.0+git.1551088848.823bcaa3-7.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594928" comment="crowbar-core-4.0+git.1556285635.ab602dd4d-9.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594929" comment="crowbar-core-branding-upstream-4.0+git.1556285635.ab602dd4d-9.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594930" comment="crowbar-devel-4.0+git.1551088848.823bcaa3-7.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594931" comment="crowbar-ha-4.0+git.1556181005.47c643d-4.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594932" comment="crowbar-openstack-4.0+git.1554887450.ff7c30c1c-9.51.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594933" comment="galera-python-clustercheck-0.0+git.1506329536.8f5878c-1.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594934" comment="openstack-ceilometer-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594935" comment="openstack-ceilometer-agent-central-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594936" comment="openstack-ceilometer-agent-compute-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594937" comment="openstack-ceilometer-agent-ipmi-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594938" comment="openstack-ceilometer-agent-notification-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594939" comment="openstack-ceilometer-api-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594940" comment="openstack-ceilometer-collector-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594941" comment="openstack-ceilometer-doc-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594942" comment="openstack-ceilometer-polling-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594943" comment="openstack-heat-gbp-5.1.1~dev1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594944" comment="python-PyKMIP-0.5.0-3.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594945" comment="python-ceilometer-7.1.1~dev4-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594946" comment="python-heat-gbp-5.1.1~dev1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594947" comment="python-pysaml2-4.0.2-3.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594948" comment="ruby2.1-rubygem-crowbar-client-3.9.0-7.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79407" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594949" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594950" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79408" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79409" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activejob-4_2 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1117632" ref_url="https://bugzilla.suse.com/1117632" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16476" ref_url="https://www.suse.com/security/cve/CVE-2018-16476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005062.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activejob-4_2 fixes the following issues:

Security issue fixed:

- CVE-2018-16476: Fixed broken access control vulnerability (bsc#1117632).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-24"/>
	<updated date="2019-01-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1117632">SUSE bug 1117632</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16476/">CVE-2018-16476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594958" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79410" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594959" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594960" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594961" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594962" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79411" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134596" ref_url="https://bugzilla.suse.com/1134596" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel version 4.4.121 was updated to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote
  attacker such that one can trigger an integer overflow, leading to a kernel
  panic. (bsc#1137586).

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  would fragment the TCP retransmission queue. A remote attacker may have been
  able to further exploit the fragmented queue to cause an expensive linked-list
  walk for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  would fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly
  escalate privileges was found in the mwifiex kernel module while connecting
  to a malicious wireless network. (bnc#1136424)

- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in
  drivers/gpu/drm/drm_edid_load.c in the Linux kernel There is an unchecked
  kstrdup of fwstr, which may have allowed an attacker to cause a denial of service
  (NULL pointer dereference and system crash). (bnc#1136586)

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may have been possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server. (bnc#1120843)

- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the
  unused memory region in the extent tree block, which might have allowed local users
  to obtain sensitive information by reading uninitialized data in the
  filesystem. (bnc#1135281)

- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was
  not called before register_netdevice. This allowed local users to cause a denial of 
  service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev
  name containing a / character. This is similar to CVE-2013-4343. (bnc#1135603)

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  had a race condition when reading /proc/pid/stat. (bnc#1131543)

- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c
  in the Linux kernel There was a race condition leading to a use-after-free,
  related to net namespace cleanup. (bnc#1134537)

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not have ended with a '\0' character. (bnc#1134848)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents.
  (bnc#1110785)

The following non-security bugs were fixed:

- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1134596).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1134596).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134596">SUSE bug 1134596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79412" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1125815" ref_url="https://bugzilla.suse.com/1125815" source="BUGZILLA"/>
		<reference ref_id="1132174" ref_url="https://bugzilla.suse.com/1132174" source="BUGZILLA"/>
		<reference ref_id="1132323" ref_url="https://bugzilla.suse.com/1132323" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

Security issues fixed:

- CVE-2016-10745: Fixed a sandbox escape caused by an information disclosure via str.format (bsc#1132174).
- CVE-2019-10906: Fixed a sandbox escape due to information disclosure via str.format (bsc#1132323).
- CVE-2019-8341: Fixed command injection in function from_string (bsc#1125815).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-18"/>
	<updated date="2019-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125815">SUSE bug 1125815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132174">SUSE bug 1132174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132323">SUSE bug 1132323</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530065" comment="python-Jinja2-2.8-22.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79413" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issue:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594967" comment="dbus-1-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594968" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594969" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546450" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79414" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594970" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594971" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594972" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551144" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594973" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551146" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594974" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594975" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551149" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594976" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594977" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594978" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594979" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594980" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551155" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594981" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551157" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79415" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594982" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548610" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594983" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79416" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551158" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551159" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551160" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79417" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594984" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546464" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79418" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 35.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594985" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594986" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79419" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594987" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594988" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594989" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79420" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1054429" ref_url="https://bugzilla.suse.com/1054429" source="BUGZILLA"/>
		<reference ref_id="1076958" ref_url="https://bugzilla.suse.com/1076958" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of
  wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958)

Non-security issue fixed:

- Reload system dbus to pick up policy change on install (bsc#1054429).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054429">SUSE bug 1054429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594990" comment="dnsmasq-utils-2.78-18.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79421" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594991" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594992" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594993" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594994" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594995" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594996" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79422" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1008845" ref_url="https://bugzilla.suse.com/1008845" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9189" ref_url="https://www.suse.com/security/cve/CVE-2016-9189/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005672.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

Security issue fixed:

- CVE-2016-9189: Fixed a integer overflows leading to memory disclosure in PyImaging_MapBuffer() (bsc#1008845).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008845">SUSE bug 1008845</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9189/">CVE-2016-9189</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594997" comment="python-Pillow-2.8.1-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79423" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009594998" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009594999" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546510" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595000" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595001" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595002" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595003" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595004" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595005" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79424" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1134701" ref_url="https://bugzilla.suse.com/1134701" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#)
- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#)
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
- CVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#)
- CVE-2019-11487: The Linux kernel allowed page-_refcount reference count to overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (bnc#1133190)

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- x86/cpu: Unify CPU family, model, stepping calculation (bsc#1134701).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
- x86/microcode/AMD: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/AMD: Fix load of builtin microcode with randomized memory (bsc#1134701).
- x86/microcode/AMD: Reload proper initrd start address (bsc#1134701).
- x86/microcode/amd: Hand down the CPU family (bsc#1134701).
- x86/microcode/amd: Move private inlines to .c and mark local functions static (bsc#1134701).
- x86/microcode/intel: Drop stashed AP patch pointer optimization (bsc#1134701).
- x86/microcode/intel: Fix allocation size of struct ucode_patch (bsc#1134701).
- x86/microcode/intel: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/intel: Remove intel_lib.c (bsc#1134701).
- x86/microcode/intel: Remove unused arg of get_matching_model_microcode() (bsc#1134701).
- x86/microcode/intel: Rename load_microcode_early() to find_microcode_patch() (bsc#1134701).
- x86/microcode/intel: Rename local variables of type struct mc_saved_data (bsc#1134701).
- x86/microcode/intel: Rename mc_intel variable to mc (bsc#1134701).
- x86/microcode/intel: Rename mc_saved_in_initrd (bsc#1134701).
- x86/microcode/intel: Simplify generic_load_microcode() (bsc#1134701).
- x86/microcode/intel: Unexport save_mc_for_early() (bsc#1134701).
- x86/microcode/intel: Use correct buffer size for saving microcode data (bsc#1134701).
- x86/microcode: Collect CPU info on resume (bsc#1134701).
- x86/microcode: Export the microcode cache linked list (bsc#1134701).
- x86/microcode: Fix loading precedence (bsc#1134701).
- x86/microcode: Get rid of find_cpio_data()'s dummy offset arg (bsc#1134701).
- x86/microcode: Issue the debug printk on resume only on success (bsc#1134701).
- x86/microcode: Rework microcode loading (bsc#1134701).
- x86/microcode: Run the AP-loading routine only on the application processors (bsc#1134701).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134701">SUSE bug 1134701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79425" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595010" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595011" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551179" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595012" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551181" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595013" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551183" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595014" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551185" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595015" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551187" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79426" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1014524" ref_url="https://bugzilla.suse.com/1014524" source="BUGZILLA"/>
		<reference ref_id="1015567" ref_url="https://bugzilla.suse.com/1015567" source="BUGZILLA"/>
		<reference ref_id="1022098" ref_url="https://bugzilla.suse.com/1022098" source="BUGZILLA"/>
		<reference ref_id="1023988" ref_url="https://bugzilla.suse.com/1023988" source="BUGZILLA"/>
		<reference ref_id="1029912" ref_url="https://bugzilla.suse.com/1029912" source="BUGZILLA"/>
		<reference ref_id="1060644" ref_url="https://bugzilla.suse.com/1060644" source="BUGZILLA"/>
		<reference ref_id="1069591" ref_url="https://bugzilla.suse.com/1069591" source="BUGZILLA"/>
		<reference ref_id="1090174" ref_url="https://bugzilla.suse.com/1090174" source="BUGZILLA"/>
		<reference ref_id="1100453" ref_url="https://bugzilla.suse.com/1100453" source="BUGZILLA"/>
		<reference ref_id="1101506" ref_url="https://bugzilla.suse.com/1101506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927/" source="CVE"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

Security issues fixed: 

- CVE-2013-1430:  When successfully logging in using RDP into an xrdp session,
  the file ~/.vnc/sesman_${username}_passwd was created. Its content was the equivalent
  of the user's cleartext password, DES encrypted with a known key (bsc#1015567).
- CVE-2017-16927: The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager
  in xrdp through used an untrusted integer as a write length, which could lead to a
  local denial of service (bsc#1069591).
- CVE-2017-6967: Fixed call of the PAM function auth_start_session(). This lead
  to to PAM session modules not being properly initialized, with a potential
  consequence of incorrect configurations or elevation of privileges, aka a
  pam_limits.so bypass (bsc#1029912).

Other issues addressed:

- The KillDisconnected option for TigerVNC Xvnc sessions is now supported (bsc#1101506)
- Fixed an issue with delayed X KeyRelease events (bsc#1100453)
- Force xrdp-sesman.service to start after xrdp.service. (bsc#1014524)
- Avoid use of hard-coded sesman port. (bsc#1060644)
- Backport upstream commit 5575197,
  sesman should stop setting LANG and let initialization scripts
  take care of it (bsc#1023988).
- Backport upstream patches for 32bpp support (bsc#1022098).
- Fixed a regression connecting from Windows 10. (bsc#1090174)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-16"/>
	<updated date="2019-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014524">SUSE bug 1014524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022098">SUSE bug 1022098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023988">SUSE bug 1023988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060644">SUSE bug 1060644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069591">SUSE bug 1069591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090174">SUSE bug 1090174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100453">SUSE bug 1100453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101506">SUSE bug 1101506</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595016" comment="xrdp-0.9.0~git.1456906198.f422461-16.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79427" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595017" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595018" comment="MozillaFirefox-devel-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595019" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79428" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595028" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595029" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595030" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79429" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79430" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595031" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595032" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548656" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79431" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595033" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595034" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595035" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595036" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595037" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79432" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed an issue with live migrations, which used to fail when spectre is
  enabled on xen boot cmdline (bsc#1116380)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79433" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595038" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595039" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548659" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79434" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005761.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed an issue which could ease attackers to discover credentials by
   sniffing the network (bsc#1111622).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-31"/>
	<updated date="2019-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79435" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595041" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595042" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595043" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79436" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79437" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1124991" ref_url="https://bugzilla.suse.com/1124991" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005770.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- Fixed CVE-2019-6975 (bsc#1124991)
  * Added CVE-2019-6975.patch to fix uncontrolled memory consumption
  * If ``django.utils.numberformat.format()`` -- used by ``contrib.admin`` as well
    as the the ``floatformat``, ``filesizeformat``, and ``intcomma`` templates
    filters -- received a ``Decimal`` with a large number of digits or a large
    exponent, it could lead to significant memory usage due to a call to
    ``'{:f}'.format()``.
    To avoid this, decimals with more than 200 digits are now formatted using
    scientific notation.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-02"/>
	<updated date="2019-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124991">SUSE bug 1124991</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595048" comment="python-Django-1.8.19-3.12.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79438" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595050" comment="mariadb-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595051" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595052" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595053" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79439" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595054" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595055" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595056" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595057" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79440" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1137825" ref_url="https://bugzilla.suse.com/1137825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005784.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issue:

Security issue fixed: 	  

- CVE-2019-12387: Fixed an improper sanitization of URIs or HTTP which could have allowed 
  attackers to perfrom CRLF attacks (bsc#1137825).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1137825">SUSE bug 1137825</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595058" comment="python-Twisted-15.2.1-9.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79441" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595059" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595060" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595061" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595062" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595063" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595064" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595065" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595066" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595067" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595068" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595069" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79442" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595070" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79443" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595071" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595072" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595073" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595074" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595075" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595076" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595077" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595078" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595079" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595080" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79444" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issue fixed:

- qemu: Add support for overriding max threads per process limit (bsc#1133719)
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595081" comment="libvirt-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595082" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595083" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595084" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595085" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595086" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595087" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595088" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595089" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595090" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595091" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595092" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595093" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595094" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595095" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595096" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595097" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595098" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595099" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79445" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-06"/>
	<updated date="2019-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595100" comment="qemu-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595101" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595102" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595103" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595104" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595105" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79446" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595106" comment="postgresql94-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595107" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530667" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530668" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530669" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595108" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79447" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595109" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595110" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595111" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595112" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595113" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595114" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79448" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1142880" ref_url="https://bugzilla.suse.com/1142880" source="BUGZILLA"/>
		<reference ref_id="1142882" ref_url="https://bugzilla.suse.com/1142882" source="BUGZILLA"/>
		<reference ref_id="1142883" ref_url="https://bugzilla.suse.com/1142883" source="BUGZILLA"/>
		<reference ref_id="1142885" ref_url="https://bugzilla.suse.com/1142885" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232/" source="CVE"/>
		<reference ref_id="CVE-2019-14233" ref_url="https://www.suse.com/security/cve/CVE-2019-14233/" source="CVE"/>
		<reference ref_id="CVE-2019-14234" ref_url="https://www.suse.com/security/cve/CVE-2019-14234/" source="CVE"/>
		<reference ref_id="CVE-2019-14235" ref_url="https://www.suse.com/security/cve/CVE-2019-14235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2019-14232: Fixed a denial of service in 'django.utils.text.Truncator' (bsc#1142880).
- CVE-2019-14233: Fixed a denial of service in strip_tags() (bsc#1142882).
- CVE-2019-14234: Fixed an SQL injection in key and index lookups for 'JSONField'/'HStoreField' (bsc#1142883).
- CVE-2019-14235: Fixed a potential memory exhaustion in 'django.utils.encoding.uri_to_iri()' (bsc#1142885).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-19"/>
	<updated date="2019-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142880">SUSE bug 1142880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142882">SUSE bug 1142882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142883">SUSE bug 1142883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142885">SUSE bug 1142885</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14233/">CVE-2019-14233</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14234/">CVE-2019-14234</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14235/">CVE-2019-14235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595115" comment="python-Django-1.8.19-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79449" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1140290" ref_url="https://bugzilla.suse.com/1140290" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005829.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

- CVE-2019-13173: Fixed a potential file overwrite via hardlink in fstream.DirWriter() (bsc#1140290).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-19"/>
	<updated date="2019-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595116" comment="nodejs6-6.17.0-11.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79450" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rails-html-sanitizer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1086598" ref_url="https://bugzilla.suse.com/1086598" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005828.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rails-html-sanitizer fixes the following issues:

- CVE-2018-3741: Fixed a XSS vulnerability due to insufficient filtering in scrub_attribute (bsc#1086598).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-19"/>
	<updated date="2019-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086598">SUSE bug 1086598</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595117" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79451" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-loofah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1086598" ref_url="https://bugzilla.suse.com/1086598" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005837.html" source="SUSE-SU"/>
		<description>
This update for rubygem-loofah fixes the following issues:

- Security issue fixed:

- CVE-2018-8048: Update fix to make Loofah::HTML5::Scrub.force_correct_attribute_escaping! callable from other gems (bsc#1086598). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086598">SUSE bug 1086598</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595118" comment="ruby2.1-rubygem-loofah-2.0.2-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79452" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595119" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548722" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595120" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79453" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595121" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595122" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595123" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595124" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595125" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79454" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1045640" ref_url="https://bugzilla.suse.com/1045640" source="BUGZILLA"/>
		<reference ref_id="1076033" ref_url="https://bugzilla.suse.com/1076033" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140012" ref_url="https://bugzilla.suse.com/1140012" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1141628" ref_url="https://bugzilla.suse.com/1141628" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142098" ref_url="https://bugzilla.suse.com/1142098" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<description>
 The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).


The following non-security bugs were fixed:

- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
- i40e: add functions to control default VSI (bsc#1141628).
- i40e: set default VSI without a reset (bsc#1141628).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045640">SUSE bug 1045640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076033">SUSE bug 1076033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140012">SUSE bug 1140012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141628">SUSE bug 1141628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142098">SUSE bug 1142098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79455" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530687" comment="libspice-server1-0.12.7-10.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79456" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="967970" ref_url="https://bugzilla.suse.com/967970" source="BUGZILLA"/>
		<reference ref_id="975500" ref_url="https://bugzilla.suse.com/975500" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2533" ref_url="https://www.suse.com/security/cve/CVE-2016-2533/" source="CVE"/>
		<reference ref_id="CVE-2016-4009" ref_url="https://www.suse.com/security/cve/CVE-2016-4009/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005895.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2016-2533: Fixed a buffer overflow in the PCD decoding (bsc#967970).
- CVE-2016-4009: Fixed an interger overflow in ImagingResampleHorizontal() (bsc#975500).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/967970">SUSE bug 967970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975500">SUSE bug 975500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2533/">CVE-2016-2533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4009/">CVE-2016-4009</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595130" comment="python-Pillow-2.8.1-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79457" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79458" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595134" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595135" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548731" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79459" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79460" version="1" class="patch">
	<metadata>
		<title>Security update for python-SQLAlchemy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1124593" ref_url="https://bugzilla.suse.com/1124593" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005905.html" source="SUSE-SU"/>
		<description>
This update for python-SQLAlchemy fixes the following issues:

Security issues fixed:

- CVE-2019-7164: Fixed SQL Injection via the order_by parameter (bsc#1124593).
- CVE-2019-7548: Fixed SQL Injection via the group_by parameter (bsc#1124593).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-10"/>
	<updated date="2019-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595143" comment="python-SQLAlchemy-1.0.14-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79461" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79462" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1139945" ref_url="https://bugzilla.suse.com/1139945" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005918.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

Security issue fixed:

- CVE-2019-12781: Add incorrect HTTP detection with reverse-proxy connecting via HTTPS (bsc#1139945).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-16"/>
	<updated date="2019-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595146" comment="python-Django-1.8.19-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79463" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595147" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595148" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595149" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595150" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595151" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79464" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1119376" ref_url="https://bugzilla.suse.com/1119376" source="BUGZILLA"/>
		<reference ref_id="1129071" ref_url="https://bugzilla.suse.com/1129071" source="BUGZILLA"/>
		<reference ref_id="1132663" ref_url="https://bugzilla.suse.com/1132663" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

Security issues fixed:

- CVE-2019-9740: Fixed CRLF injection issue (bsc#1129071).
- CVE-2019-11236: Fixed CRLF injection via request parameter (bsc#1132663).
- CVE-2018-20060: Remove Authorization header when redirecting cross-host (bsc#1119376).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-18"/>
	<updated date="2019-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119376">SUSE bug 1119376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595152" comment="python-urllib3-1.16-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79465" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595153" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595154" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595155" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595156" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79466" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595157" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595158" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595159" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595160" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79467" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595161" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595162" comment="MozillaFirefox-devel-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595163" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79468" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1138461" ref_url="https://bugzilla.suse.com/1138461" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005962.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

Security issue fixed:

- CVE-2019-12855: Fixed TLS certificate verification to protecting against MITM attacks (bsc#1138461).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138461">SUSE bug 1138461</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595164" comment="python-Twisted-15.2.1-9.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79469" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595165" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595166" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595167" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595168" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79470" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79471" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595171" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595172" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79472" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="1086036" ref_url="https://bugzilla.suse.com/1086036" source="BUGZILLA"/>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fix crash when handling empty hostnames (bsc#1100097).
- CVE-2017-2885: Fix chunk decoding buffer overrun that could be exploited against either clients or servers (bsc#1052916).

Bug fixes:

- bsc#1086036: translation-update-upstream commented out for Leap
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-08"/>
	<updated date="2019-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086036">SUSE bug 1086036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595173" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595174" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79473" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595175" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548753" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595176" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548755" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79474" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79475" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79476" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges 
  that allowed them to run commands with an arbitrary uid, could 
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595183" comment="sudo-1.8.10p3-10.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79477" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595184" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595185" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79478" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-core, crowbar-openstack, grafana, novnc, openstack-keystone, openstack-neutron, openstack-neutron-lbaas, openstack-nova, openstack-tempest, python-pysaml2, python-urllib3, rubygem-chef, rubygem-easy_diff, sleshammer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1019074" ref_url="https://bugzilla.suse.com/1019074" source="BUGZILLA"/>
		<reference ref_id="1052286" ref_url="https://bugzilla.suse.com/1052286" source="BUGZILLA"/>
		<reference ref_id="1106515" ref_url="https://bugzilla.suse.com/1106515" source="BUGZILLA"/>
		<reference ref_id="1108033" ref_url="https://bugzilla.suse.com/1108033" source="BUGZILLA"/>
		<reference ref_id="1115960" ref_url="https://bugzilla.suse.com/1115960" source="BUGZILLA"/>
		<reference ref_id="1118159" ref_url="https://bugzilla.suse.com/1118159" source="BUGZILLA"/>
		<reference ref_id="1118900" ref_url="https://bugzilla.suse.com/1118900" source="BUGZILLA"/>
		<reference ref_id="1120657" ref_url="https://bugzilla.suse.com/1120657" source="BUGZILLA"/>
		<reference ref_id="1127558" ref_url="https://bugzilla.suse.com/1127558" source="BUGZILLA"/>
		<reference ref_id="1128954" ref_url="https://bugzilla.suse.com/1128954" source="BUGZILLA"/>
		<reference ref_id="1128987" ref_url="https://bugzilla.suse.com/1128987" source="BUGZILLA"/>
		<reference ref_id="1131053" ref_url="https://bugzilla.suse.com/1131053" source="BUGZILLA"/>
		<reference ref_id="1131961" ref_url="https://bugzilla.suse.com/1131961" source="BUGZILLA"/>
		<reference ref_id="1132860" ref_url="https://bugzilla.suse.com/1132860" source="BUGZILLA"/>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1133722" ref_url="https://bugzilla.suse.com/1133722" source="BUGZILLA"/>
		<reference ref_id="1136784" ref_url="https://bugzilla.suse.com/1136784" source="BUGZILLA"/>
		<reference ref_id="1143475" ref_url="https://bugzilla.suse.com/1143475" source="BUGZILLA"/>
		<reference ref_id="1145796" ref_url="https://bugzilla.suse.com/1145796" source="BUGZILLA"/>
		<reference ref_id="1145867" ref_url="https://bugzilla.suse.com/1145867" source="BUGZILLA"/>
		<reference ref_id="1148383" ref_url="https://bugzilla.suse.com/1148383" source="BUGZILLA"/>
		<reference ref_id="1150895" ref_url="https://bugzilla.suse.com/1150895" source="BUGZILLA"/>
		<reference ref_id="1152916" ref_url="https://bugzilla.suse.com/1152916" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10127" ref_url="https://www.suse.com/security/cve/CVE-2016-10127/" source="CVE"/>
		<reference ref_id="CVE-2018-15727" ref_url="https://www.suse.com/security/cve/CVE-2018-15727/" source="CVE"/>
		<reference ref_id="CVE-2018-19039" ref_url="https://www.suse.com/security/cve/CVE-2018-19039/" source="CVE"/>
		<reference ref_id="CVE-2018-558213" ref_url="https://www.suse.com/security/cve/CVE-2018-558213/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<description>
This update for crowbar-core, crowbar-openstack, grafana, novnc, openstack-keystone, openstack-neutron, openstack-neutron-lbaas, openstack-nova, openstack-tempest, python-pysaml2, python-urllib3, rubygem-chef, rubygem-easy_diff, sleshammer fixes the following issues:

In python-pysaml2 the following security issue was fixed:

- CVE-2016-10127: Fixed an XML external entity attack. (bsc#1019074)

crowbar-core was updated to version 4.0+git.1570463621.40b11cd48:
* network: Don't set datapath-ids on ovs-bridges anymore (bsc#1152916)
* barclamp_lib: Sync timeout with other barclamps (SOC-10513, SOC-10011)
* gems: Update easy_diff to 1.0.0 (SOC-10505)
* crowbar: Do not read /etc/crowbar.install.key in non-SUSE init script
* transition.sh: Do not read /etc/crowbar.install.key
* gather_logs: Make it a bit useful again
* gather_logs: Do not read /etc/crowbar.install.key
* network: Allow locking down the network config for nodes (bsc#1120657)
* network: Check existing upper layers before bond setup  (bsc#1120657)
* network: never plug two interface into the same ovs bridge (bsc#1120657)
* network: Avoid plugging the same interface to two ovs bridges (bsc#1120657)
* nic library: some helper for identifying base interface (bsc#1120657)
* network: Rework the vlan port replugging code (bsc#1120657)
* network: DRY out 'kill_nic_files' (noref)
* Add CVE-2019-5477 the to travis ignore list (SOC-9635)

crowbar-openstack was updated to version 4.0+git.1569429513.e7016b2b6:
* tempest: don't rely on service catalogue (SOC-10633)
* nova: set default attribute for max_threads_per_process
* database: Hardcode ruby version for package installation (SOC-10010)
* neutron: restore dhcp_domain in stable/4.0 (bsc#1145867)
* nova: add max_threads_per_process tuneable (SOC-10001, bsc#1133719)

grafana was updated to:

- CVE-2019-15043: Adds authentication to a few rest endpoints that could be used to access grafana snapshot apis to cause denial of service (SOC-10357 bsc#1148383)
  Also see https://github.com/grafana/grafana/compare/v5.4.4...v5.4.5


grafana was updated to version 4.6.5:

- CVE-2018-19039: Users with Editor or Admin permissions could exfiltrate files  (jsc#SOC-9976 bsc#1115960)

grafana was updated version to 4.6.4:

- CVE-2018-15727 / CVE-2018-558213: Fixed an authentication bypass because an attacker can generate a valid 'remember me'cookie knowing only a username of an LDAP or OAuth user (jsc#SOC-9980 bsc#1106515)

Other fixes:

* sql: added code migration type
* release 4.6.3
* fix default alias
* fixes broken alert eval when first condition is using OR
* fix: alert list panel now works correctly after adding manual annotation on dashboard, fixes #9951
* fix: fix for avatar images when gzip is turned on, fixes #5952
* sets version to 4.6.2
* prom: add support for default step param (#9866)
* build: fixed jshint error
* fix: Html escaping caused issue in InfluxDB query editor,  could not pick greater than or less then operators, fixes #9871
* heatmap: fix tooltip in 'Time series bucket' mode, #9332 (#9867)
* fix cloudwatch ec2_instance_attribute (#9718)
* colorpicker: fix color string change #9769 (#9780)
* changes version to 4.6.1
* fix: panel view now wraps, no scrolling required, fixes #9746
* plugins: fix for loading external plugins behind auth proxy, fixes #9509
* fix: color picker bug at series overrides page, #9715 (#9738)
* tech: switch to golang 1.9.2
* tech: add missing include
* save as should only delete threshold for panels with alerts
* fix: graphite annotation tooltip included undefined, fixes #9707
* build: updated version to v4.6.0
* plugins: added backward compatible path for rxjs
* ux: updated singlestat default colors
* prometheus: fixed unsaved changes warning when changing time range due to step option on query model was changed in datasource.query code, fixes #9675
* fix: firefox can now create region annotations, fixes #9638
* alerting: only editors can pause rules
* fix: another fix for playlist view state, #9639
* fix: fixed playlist controls and view state, fixes #9639
* prom: adds pre built grafana dashboard
* bump version for publish_testing.sh
* update version to 4.6.0-beta3
* plugins: expose dashboard impression store
* modify $__timeGroup macro so it can be used in select clause (#9527)
* plugins: fixes path issue on Windows
* prometheus: enable gzip for /metrics endpoint
* fix: fixed save to file button in export modal, fixes #9586
* mysql: add usage stats for mysql
* pluginloader: esModule true for systemjs config
* Fix heatmap Y axis rendering (#9580)
* fix vector range
* prometheus: add builtin template variable as range vectors
* fix: fixed prometheus step issue that caused browser crash, fixes #9575
* fix: getting started panel and mark adding data source as done, fixes #9568
* Fixes for annotations API (#9577)
* bump packagecloud script
* build: added imports of rxjs utility functions
* prepare for v4.6.0-beta2 release
* fix template variable expanding
* annotations: quote reserved fields (#9550)
* ux: align alert and btn colors
* fix: fixed color pickers that were broken in minified builds, fixes #9549
* textpanel: fixes #9491
* csv: fix import for saveAs shim
* plugins: expose more util and flot dependencies
* alert_tab: clear test result when testing rules
* (cloudwatch) fix cloudwatch query error over 24h (#9536)
* show error message when cloudwatch datasource can't add
* update packagecloud script for 4.6.0-beta1
* changelog: adds note about closing #9516
* alerting: add count_non_null reducer
* Update rpm.md
* fix: can now remove annotation tags without popover closing
* tech: add backward compatibility for &lt;spectrum-picker&gt; directive (#9510)
* fix: fixed links on new 404 page, fixes #9493
* logging: dont use cli logger in http_server
* oauth: raise error if session state is missing
* oauth: provide more logging for failed oauth requests
* prepare for 4.6.0-beta1 release
* docs: updated whats new article
* docs: initial draft release v46
* graph: fix y-axis decimalTick check. Fixes #9405
* minor docs update
* docs: annotation docs update
* changelog: adds note about closing #7104
* changelog: adds note about closing #9373
* metrics: disable gzip for /metrics endpoint (#9468)
* Annotation docs (#9506)
* Update CHANGELOG.md
* Update PLUGIN_DEV.md
* Update PLUGIN_DEV.md
* Update README.md
* Fixed link issue in CHANGELOG
* Create PLUGIN_DEV.md
* changelog: adds note about closing #9371,#5334,#8812
* ds_edit: placeholder should only be cert header
* fixed minor styling issus (#9497)
* fix: alert api limit param did not work and caused SQL syntax error, fixes #9492
* annotations: add endpoint for writing graphite-like events (#9495)
* Update unsaved_changes_modal.ts
* fix: set lastSeenAt date when creating users to then years in past insteasd of empty date, fixes #9260
* ux: minor ux fix
* Retain old name for TLS client auth
* Return error if datasource TLS CA not parsed
* Datasource settings: Make HTTP all caps
* Datasource HTTP settings: Add TLS skip verify
* Make URL capitalisation consistent in UI
* Alias macron package in app_routes.go
* Verify datasource TLS and split client auth and CA
* Tidy spacing in datasource TLS settings
* Tests: Clarify what InsecureSkipVerify does
* postgres: add missing ngInject decorator
* docs: initial docs for new annotation features, #9483
* Adds note for #9209 to changelog
* Postgres Data Source  (#9475)
* tech: expose more to plugins, closes #9456
* Fix NaN handling (#9469)
* snapshots: improve snapshot listing performance, #9314 (#9477)
* mysql: fix interpolation for numbers in temp vars
* Added docs for Kafka alerting
* Fixed failing go tests
* gofmt fixes
* Added tests
* Kafka REST Proxy works with Grafana
* added insrtuctions for oauth2 okta bitbucket (#9471)
* Unified Color picker fixes (#9466)
* Show min interval query option for mixed datasource (#9467)
* gzip: plugin readme content set explicitly
* ignore pattern for vendored libs
* fix: escape metric segment auto complete, fixes #9423
* Corrected a PostgreSQL SELECT statement. (#9460)
* tests: found the unhandled promise issue in the dash import tests
* testing: fixing tests
* annotations: minor change to default/edit annotation color
* Create annotations (#8197)
* OAuth: Rename sslcli
* OAuth: Separate TLS client auth and CA config
* OAuth: Check both TLS client cert and key
* Always verify TLS unless explicitly told otherwise
* fix: threshold's colors in table panels (#9445) (#9453)
* singlestat: fix sizing bug #9337 (#9448)
* Revert 'Fix coloring in singlestat if null value (#9438)' (#9443)
* Fix coloring in singlestat if null value (#9438)
* fix: missing semicolon
* changed jsontree to use jsonexplorer (#9416)
* docs page for authproxy (#9420)
* Update codebox (#9430)
* Series color picker fix (#9442)
* fix type in readme
* removed commented line
* changelog: adds note about closing #9110
* Fixed typo
* Change empty string checks and improve logging
* changelog: adds note about closing #9208
* Fix spelling on 404 page.
* Lint fix
* Update kbn.js
* Add Norwegian Krone denominator for currency
* fixed layout for column options, changed dropdown for date format kept old code
* build: add noUnusedLocals to tsc parameters
* build: install go based on env variable
* changes go version to 1.9.1
* changelog: adds note about closing #9226
* changelog: add note about closing #9429
* changelog: adds note about closing #9399
* Fix formatting issue
* Add milliseconds format in table panel's config
* support for s3 path (#9151)
* Remove apparently unnecessary .flush() calls.
* Fix empty message and toolong attribute names Use default state message if no message is provided by the user Slice attribute name to maximum of 50 chars
* Address review comments.
* changelog: add note about closing #7175
* plugin_loader: expose app_events to plugins
* Add the missing comma
* colorpicker: refactoring the new unififed colorpicker, #9347
* Unified colorpicker (#9347)
* fix missing column headers in excel export (#9413)
* build: remove clean plugin from dev build
* build: fixed broken elastic unit test
* shore: cleanup unused stuff in common.d.ts
* Build URL for close alert request differently
* some restyling (#9409)
* Docs text fixes (#9408)
* Checkbox fixes (#9400)
* fix: ensure panel.datasource is null as default
* plugibs: expose more to plugins
* properly parse &amp; pass upload image bool from config
* break out slack upload into separate function
* tech: minor npm scripts update
* build: fixed build
* refactoring: minor refactoring of PR #8916
* Update script to make it use OpsGenie's REST API
* docs: minor docs fix
* Merge branch 'master' of github.com:grafana/grafana
* build: minor webpack fix
* docs: updated building from source docs
* playlist: play and edit should use same width
* shore: fixed html indentation, #9368
* tech: updated yarn.lock
* shore: minor cleanup
* Webpack (#9391)
* fixing json for CI
* adding support for token-based slack file.upload API call for posting images to slack
* changelog: adds note about closing #8479
* changelog: adds note about closing #8050
* changelog: adds note about closing #9386
* change pdiff to percent_diff for conditions
* panel: rename label on csv export modal
* add diff and pdiff for conditions
* fix, add targetContainsTemplate()
* fix cloudwatch alert bug
* add debug log
* move extend statistics handling code to backend
* fix assume role
* improve cloudwatch tsdb
* refactor cloudwatch code
* remove obsolete code
* move cloudwatch crendential related code
* remove old handler
* fix annotation query
* fix time
* fix dimension convertion
* re-implement annotation query
* fix parameter format
* fix alert feature
* fix parameter format
* refactor cloudwatch to support new tsdb interface
* refactor cloudwatch frontend code
* refactor cloudwatch frontend code
* fix test
* re-implement dimension_values()
* fix error message
* remove performEC2DescribeInstances()
* re-implement ec2_instance_attribute()
* re-implement ebs_volume_ids()
* import the change, https://github.com/grafana/grafana/pull/9268
* fix conflict
* fix test
* remove obsolete GetMetricStatistics()
* fix test
* move test code
* fix conflict
* porting other suggestion
* re-implement get regions
* move the metric find query code
* (cloudwatch) move query parameter to 'parameters'
* parse duration
* remove offset for startTime
* cache creds for keys/credentials auth type
* fix test
* fix invalid query filter
* count up metrics
* (cloudwatch) alerting
* add brazil currency
* tech: upgrade of systemjs to 0.20.x working
* tech: reverted to systemjs
* tech: migrating elasticsearch to typescript
* changelog: add note about using golang 1.9
* change go version to 1.9
* changelog: adds note about closing #9367
* tech: systemjs upgrade
* made a text-panel page, maybe we don't need it
* cleaned up html/sass and added final touches
* Enable dualstack in every net.Dialer, fixes #9364
* jaeger: capitalize tracer name
* jaeger: logging improvement
* tech: systemjs upgrade
* Have  include intervalFactor in its calculation, so always equal to the step query parameter.
* alertlist: toggle play/pause button
* updated css and html for recent state changes for alert lists
* Fix export_modal message (#9353)
* s3: minor fix for PR #9223
* internal metrics: add grafana version
* changelog: adds note about closing 5765
* Update latest.json
* typescript: stricter typescript option
* prom_docker: give targets correct job name
* testdata: add bucket scenarios for heatmap
* dev-docker: add grafana as target
* changelog: add note ablout closing #9319
* introduce smtp config option for EHLO identity
* changelog: note about closing #9250
* go fmt
* new page for text, needs more work
* replaced img in graph, created alert list page
* docs: update docs
* Update CHANGELOG.md
* changelog: adds note about closing #5873
* replaced image
* Docs new updates (#9324)
* Update CHANGELOG.md
* Update latest.json
* cleanup: removed unused file
* tech: remove bower and moved remaining bower dependencies to npm
* tech: cleanup and fixed build issue
* tech: upgraded angularjs and moved dependency from bower to npm, closes #9327
* follow go idiom and return error as second param
* tech: updated tsconfig
* docker: adds alertmanager to prometheus fig
* tech: more tslint rules
* another img update
* tech: removing unused variables from typescript files, and making tslint rules more strict
* deleted old shortcuts instruction
* text uppdates for dashlist and singlestat(+img). updated the keyboard shortcuts
* context is reserved for go's context
* make ds a param for Query
* remove batch abstraction
* rename executor into tsdbqueryendpoint
* remove unused structs
* refactor response flow
* tech: removed test component
* ux: minor singlestat update
* singlestat: minor change
* Update CHANGELOG.md
* Singlestat time (#9298)
* tech: progress on react poc
* adds note about closing #9213
* Update _navbar.scss
* replaced images, updating text(not finished)
* fix: close for 'Unsaved Changes' modal, #9284 (#9313)
* Initial graphite tags support (#9239)
* tech: initial react poc
* Make details more clean in PD description
* bug: enable HEAD requests again
* Add `DbClusterIdentifier` to CloudWatch dimensions (#9297)
* templating: fix dependent variable updating (#9306)
* Fix adhoc filters restoration (#9303)
* Explicitly refer to Github 'OAuth' applications
* config bucket and region for s3 uploader
* fixes bug introduced with prom namespaces
* fixing spelling of millesecond -&gt; millisecond
* fixing spelling of millesecond -&gt; millisecond
* Remove duplicate bus.AddHandler() (#9289)
* Update CHANGELOG.md
* use same key as mt
* tag alert queries that return no_data
* updated error page html+css, added ds_store to ignore (#9285)
* public/app/plugins/panel/graph/specs/graph_specs.ts: relax tests to be 'within' instead of 'equal', so they won't fail on i686 (#9286)
* Fix path to icon (#9276)
* adds note about fix in v4.5.2
* skip NaN values when writing to graphite
* addded mass units, #9265 (#9273)
* Fully fill out nulls in cloudfront data source (#9268)
* make it possible to configure sampler type
* mark &gt;=400 responses as error
* change port for jaeger dev container
* logwrapper for jaeger
* make samplerconfig.param configurable
* adds custom tags from settings
* use route as span name
* add trace headers for outgoing requests
* docker file for running jaeger
* better formating for error trace
* attach context with span to *http.Request
* add traces for datasource reverse proxy requests
* trace failed executions
* use tags instead of logs
* use opentracing ext package when possible
* set example port to zipkin default
* adds codahale to vendor
* makes jaeger tracing configurable
* add trace parameters for outgoing requests
* adds basic traces using open traces
* require dashboard panels to have id
* fix: jsonData should not be allowed to be null, fixes #9258
* packaging: reduce package size
* Update upgrading.md (#9263)
* Added --pluginUrl option to grafana-cli for local network plugin installation
* adds note about closing #1395
* add locale format
* update changelog
* fixes broken tests :boom:
* minor code adjusetments
* pass context to image uploaders
* remove unused deps
* Reduced OAuth scope to read_write
* GCS support via JSON API
* gofmt fixes
* Added GCS support #8370
* move more known datasources from others
* Remove alert thresholds on panel duplicate, issue #9178 (#9257)
* 4.5.1 docs + update version to 5.0.0-pre1
* publish_both.sh update for 4.5.1
* Update CHANGELOG.md
* docs: updated changelog
* packaging: reducing package size be only including public vendor stuff we need
* docs: update download links
* allow ssl renegotiation for datasources
* check args for query
* add test for completer
* fix
* follow token name change
* (prometheus) support label value completion
* (prometheus) support label name completion
* get s3 url via aws-sdk-go, fix #9189
* Prometheus: Rework the interaction between auto interval (computed based on graph resolution), min interval (where specified, per query) and intervalFactor (AKA resolution, where specified, per query). As a bonus, have  and  reflect the actual interval (not the auto interval), taking into account min interval and Prometheus' 11k data points limit.
* minor fix
* (prometheus) support instant query for table format, use checkbox to switch query type
* (prometheus) instant query support
* Add thumbnail to card
* Add values to the hipchat card
* Reorder editorconfig
* Enable datasources to be able to round off to a UTC day properly
* Include triggering metrics to pagerduty alerts

novnc was updated to fix the following issue:

- Add tightPNG encoding (bsc#1145796)
  This encoding is needed to allow noVNC to work with instances that
  run on ESX hypervisors. It is not possible to update the Newton package
  to noVNC 1.1.0 as that version is not supported with openstack-nova until Rocky.

openstack-keystone was updated to fix:

- A domain_admin should be allowed to list role assignments for the
  domain and for all projects of this domain with a domain-scoped token.
  (bsc#1118159)

openstack-neutron was updated to fix:
- Add path to not update device lists in large sets. (bsc#1136784)
  Since the ssh timeout issue was resolved, start adding back the removed
  patches. Backport based on comment #1.
- Revert OVS timeout patch as it  also seams to cause CI issues. (SOC-10092)
- Since the CI failures are mostly seen in ha jobs, let us first
  try to revert the last added HA related patches. Once we nail
  down the issue, we can add one at a time. (SOC-10092)
- Disallow router interface out of subnet IP range (bsc#1108033)
- Fix for dhcp serializing port delete and network rpc calls (bsc#1143475)
- Fixed a function call error with get_reader_session
  Fixed an argument issue with respect to Context not having 'bein'
  function, we should have passed the session instead of context.
  Also fixed another function argument error with respect to
  'is_ha_router_port'.  (bsc#1133722)
- Divide and conquer local hridge flows beasts (bsc#1133722) 
- Choose random value for HA routes vr_id
- Change duplicate OVS bridge datapath ids
- Async notify neutron server for HA states
- Divide and conquer security group beasts
- Change default local ovs connection timeout (bsc#1136784)
- Do not call update device list in large sets (bsc#1136784)
- More accurate agent restart state transfer (bsc#1136784)
- OVS agent: Always send start flag during initial sync (bsc#1136784)
- Keep HA ports info for HA router during entire lifecycle
- Packets getting lost during SNAT with too many connections
- Don't restart neutron-ovs-cleanup on RPM update (bsc#1132860)
- neutron-keepalived-state-change will check VIP before spawning ip monitor (bsc#1131961)
- handle database query correctly
- Fix the update port status issue without getting the ports to BUILD status.(bsc#1131053)

- OVS Raise RuntimeError in_get_dp if id is None
- OVS Survive errors from check ovs status
- Trigger port status DOWN on VIF replug.patch
- Fix dvr ha router gateway port binding to incorrect host
- DVR HA Unbinding a HA router from agent does not clear HA interface
- Don't trigger DVR port update if status the same
- Add retry decorator update_segment_host_mapping (bsc#1127558)
- Do state report after setting start flag on OVS restart

openstack-nova was updated to fix:

Security issue fixed:

- CVE-2016-10127: Fixed XXE in XML Parsing (bsc#1019074)

- Allow to attach more than 26 volumes (bsc#1118900)

openstack-tempest was updated to fix:

- Avoid server check teardown exception breaking tearDown (SOC 10092)

python-urllib3 was updated to fix:

- Add missing dependency on python-six (bsc#1150895)

sleshammer was updated to fix:

- Really drop etc/udev/rules.d/70-persistent-net.rules from the overlay
  it was still present in the tarball. (SOC-9288)

rubygem-chef was updated to fix:

- pretty print inspect results and force encode the content (SOC-9954)

- updated to version 1.0.0

  - Unmerge Arrays containing Hashes
  - Handle duplicate values in arrays correctly

rubygem-easy_diff was updated to version 0.0.6

- Fix merging arrays of hashes

		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052286">SUSE bug 1052286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106515">SUSE bug 1106515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108033">SUSE bug 1108033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115960">SUSE bug 1115960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118159">SUSE bug 1118159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120657">SUSE bug 1120657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127558">SUSE bug 1127558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128954">SUSE bug 1128954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128987">SUSE bug 1128987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131053">SUSE bug 1131053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131961">SUSE bug 1131961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132860">SUSE bug 1132860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133722">SUSE bug 1133722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136784">SUSE bug 1136784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143475">SUSE bug 1143475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145796">SUSE bug 1145796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145867">SUSE bug 1145867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150895">SUSE bug 1150895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152916">SUSE bug 1152916</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10127/">CVE-2016-10127</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-15727/">CVE-2018-15727</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19039/">CVE-2018-19039</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-558213/">CVE-2018-558213</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595186" comment="crowbar-core-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595187" comment="crowbar-core-branding-upstream-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595188" comment="crowbar-openstack-4.0+git.1569429513.e7016b2b6-9.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595189" comment="grafana-4.6.5-1.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595193" comment="openstack-neutron-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595194" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595195" comment="openstack-neutron-doc-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595196" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595197" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595201" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595202" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595203" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595204" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595205" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595206" comment="openstack-neutron-server-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595207" comment="openstack-nova-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595208" comment="openstack-nova-api-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595209" comment="openstack-nova-cells-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595210" comment="openstack-nova-cert-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595211" comment="openstack-nova-compute-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595212" comment="openstack-nova-conductor-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595213" comment="openstack-nova-console-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595214" comment="openstack-nova-consoleauth-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595215" comment="openstack-nova-doc-14.0.11~dev13-4.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595216" comment="openstack-nova-novncproxy-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595217" comment="openstack-nova-placement-api-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595218" comment="openstack-nova-scheduler-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595219" comment="openstack-nova-serialproxy-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595220" comment="openstack-nova-vncproxy-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595221" comment="openstack-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595222" comment="openstack-tempest-test-12.2.1~a0~dev177-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595224" comment="python-neutron-9.4.2~dev21-7.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595226" comment="python-nova-14.0.11~dev13-4.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595227" comment="python-pysaml2-4.0.2-3.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595228" comment="python-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79479" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595237" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595238" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595239" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79480" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:
	  
- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79481" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79482" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595243" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79483" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595244" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551276" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595245" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551278" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595246" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551280" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595247" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551282" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595248" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551284" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595249" comment="libndr0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551286" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595250" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551288" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595251" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551290" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595252" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551292" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595253" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551294" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595254" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551296" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595255" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551298" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595256" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551300" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595257" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551302" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595258" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551304" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595259" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551306" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595260" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551308" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595261" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551310" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595262" comment="samba-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595263" comment="samba-client-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551313" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595264" comment="samba-libs-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551315" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595265" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551317" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79484" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006096.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]

- Add gdb-s390-handle-arch13.diff to handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595266" comment="gdb-8.3.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79485" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-haml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1155089" ref_url="https://bugzilla.suse.com/1155089" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1002201" ref_url="https://www.suse.com/security/cve/CVE-2017-1002201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006101.html" source="SUSE-SU"/>
		<description>
This update for rubygem-haml fixes the following issue:

- CVE-2017-1002201: Fixed an insufficient character escape that could have led to arbitrary code execution (bsc#1155089).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155089">SUSE bug 1155089</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1002201/">CVE-2017-1002201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595267" comment="ruby2.1-rubygem-haml-4.0.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79486" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595268" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548820" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79487" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595269" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551319" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79488" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79489" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595270" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595271" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548828" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595272" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595273" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548831" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595274" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79490" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595275" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595276" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79491" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139550" ref_url="https://bugzilla.suse.com/1139550" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1144338" ref_url="https://bugzilla.suse.com/1144338" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1149849" ref_url="https://bugzilla.suse.com/1149849" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150223" ref_url="https://bugzilla.suse.com/1150223" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)

- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)

- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)

The following non-security bugs were fixed:

- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)
- ipv6: Update ipv6 defrag code (add bsc#1141054).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm kABI Fix for NX patches (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- mm: use upstream patch for bsc#1106913
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).
- x86/mitigations: Backport the STIBP pile See bsc#1139550
- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139550">SUSE bug 1139550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144338">SUSE bug 1144338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149849">SUSE bug 1149849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150223">SUSE bug 1150223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79492" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79493" version="1" class="patch">
	<metadata>
		<title>Security update for python-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<description>
This update for python-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-21"/>
	<updated date="2019-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525259" comment="python-ecdsa-0.13.3-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79494" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595281" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548839" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595282" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79495" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595283" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595284" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595285" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79496" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595286" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79497" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595287" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79498" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79499" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:
	  
Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-09"/>
	<updated date="2019-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595292" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595293" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79500" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595294" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79501" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595295" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79502" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595296" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595297" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595298" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595299" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79503" version="1" class="patch">
	<metadata>
		<title>Security update for caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, crowbar-ui, etcd, flannel, galera-3, mariadb, mariadb-connector-c, openstack-dashboard-theme-SUSE, openstack-heat-templates, openstack-neutron, openstack-nova, openstack-quickstart, patterns-cloud, python-oslo.messaging, python-oslo.utils, python-pysaml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1075812" ref_url="https://bugzilla.suse.com/1075812" source="BUGZILLA"/>
		<reference ref_id="1123053" ref_url="https://bugzilla.suse.com/1123053" source="BUGZILLA"/>
		<reference ref_id="1126088" ref_url="https://bugzilla.suse.com/1126088" source="BUGZILLA"/>
		<reference ref_id="1126428" ref_url="https://bugzilla.suse.com/1126428" source="BUGZILLA"/>
		<reference ref_id="1129729" ref_url="https://bugzilla.suse.com/1129729" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136035" ref_url="https://bugzilla.suse.com/1136035" source="BUGZILLA"/>
		<reference ref_id="1143215" ref_url="https://bugzilla.suse.com/1143215" source="BUGZILLA"/>
		<reference ref_id="1152916" ref_url="https://bugzilla.suse.com/1152916" source="BUGZILLA"/>
		<reference ref_id="1155089" ref_url="https://bugzilla.suse.com/1155089" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1002201" ref_url="https://www.suse.com/security/cve/CVE-2017-1002201/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<description>
This update for caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, crowbar-ui, etcd, flannel, galera-3, mariadb, mariadb-connector-c, openstack-dashboard-theme-SUSE, openstack-heat-templates, openstack-neutron, openstack-nova, openstack-quickstart, patterns-cloud, python-oslo.messaging, python-oslo.utils, python-pysaml2 fixes the following issues:

Security fix for mariadb:

- MariaDB was update to version 10.2.25 (bsc#1136035)
- CVE-2019-2628: Fixed a remote denial of service by an privileged attacker (bsc#1136035).
- CVE-2019-2627: Fixed another remote denial of service by an privileged attacker (bsc#1136035).
- CVE-2019-2614: Fixed a potential remote denial of service by an privileged attacker (bsc#1136035).

- adjust mysql-systemd-helper ('shutdown protected MySQL' section)
  so it checks both ping response and the pid in a process list
  as it can take some time till the process is terminated.
  Otherwise it can lead to 'found left-over process' situation
  when regular mariadb is started [bsc#1143215]
- update suse_skipped_tests.list

- remove client_ed25519.so plugin because it's shipped in
  mariadb-connector-c package (libmariadb_plugins)
- update suse_skipped_tests.list

- update to 10.2.25 GA
  * Fixes for the following security vulnerabilities:
    * 10.2.23: none
    * 10.2.24: CVE-2019-2628, CVE-2019-2627, CVE-2019-2614
    * 10.2.25: none
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10223-release-notes
    https://mariadb.com/kb/en/library/mariadb-10223-changelog
    https://mariadb.com/kb/en/library/mariadb-10224-release-notes
    https://mariadb.com/kb/en/library/mariadb-10224-changelog
    https://mariadb.com/kb/en/library/mariadb-10225-release-notes
    https://mariadb.com/kb/en/library/mariadb-10225-changelog
- remove mariadb-10.2.22-fix_path.patch that was applied upstream
  in mariadb 10.2.23 
- remove caching_sha2_password.so because it's shipped in
  mariadb-connector-c package (libmariadb_plugins)
- remove xtrabackup scripts as it was replaced by mariabackup (we
  already removed xtrabackup requires in the first phase)
- fix reading options for multiple instances if my${INSTANCE}.cnf
  is used. Also remove 'umask 077' from mysql-systemd-helper that
  causes that new datadirs are created with wrong permissions. Set
  correct permissions for files created by us (mysql_upgrade_info,
  .run-mysql_upgrade) [bsc#1132666]
- fix build comment to not refer to openSUSE
- tracker bug [bsc#1136035]


- Update to version 1.0+git.1560518045.ad7dc6d:
  * Patching node before bootstraping

- Update to version 4.0+git.1573109906.0f62e9503:
  * Ignore CVE-2017-1002201 in CI builds (bsc#1155089)

- Update to version 4.0+git.1573038068.1e32b3205:
  * Make sure the input file with ssh key exists (SOC-10133)
  * mysql: fix WSREP sync race (SOC-10717)
  * mysql: stop service for mysql_install_db (SOC-10717)

- Update to version 4.0+git.1571404877.8edf9dd5c:
  * Do not use obsoleted --endpoint-type option with CLI
  * [4.0] Configurable timeout for Galera pre-sync

- Switch to stable/7-8 branch

- Update to 25.3.25:
  * A new Galera configuration parameter cert.optimistic_pa was added. If the
    parameter value is set to true, full parallelization in applying write
    sets is allowed as determined by certification algorithm. If set to false,
    no more parallelism is allowed in applying than seen on the master.
  * Support for ECDH OpenSSL engines on CentOS 6 (galera#520)
  * Fixed compilation on Debian testing and unstable (galera#516, galera#528)

- Add unescape_IPv6_bind_ip.patch
  * https://github.com/dciabrin/galera-1/commit/0f6f8aeeb09809280c956514cfd5844b8acad4f9

- remove galera-3-25.3.23-scons_fixes.patch (merged upstream)
- update to 25.3.24:
  * A support for new certification key type was added to allow
    more relaxed certification rules for foreign key references (galera#491).
  * New status variables were added to display the number of open transactions
    and referenced client connections inside Galera provider (galera#492).
  * GCache was sometimes cleared unnecessarily on startup if the recovered
    state had smaller sequence number than the highest found from GCache.
    Now only entries with sequence number higher than recovery point will be
    cleared (galera#498).
  * Non-primary configuration is saved into grastate.dat only when if the
    node is in closing state (galera#499).
  * Exception from GComm was not always handled properly resulting in
    Galera to remain in half closed state. This was fixed by propagating the
    error condition appropriately to upper layers (galera#500).
  * A new status variable displaying the total weight of the cluster nodes
    was added (galera#501).
  * The value of pc.weight did not reflect the actual effective value after
    setting it via wsrep_provider_options. This was fixed by making sure that
    the new value is taken into use before returning the control back to
    caller (galera#505, MDEV-11959)
  * Use of ECHD algorithms with old OpenSSL versions was enabled (galera#511).
  * Default port value is now used by garbd if the port is not explicitly
    given in cluster address (MDEV-15531).
  * Correct error handling for posix_fallocate().
  * Failed causal reads are retried during configuration changes.

- New upstream version 3.1.2 [bsc#1136035]
  * CONC-383: client plugins can't be loaded due to missing prefix
  * Fixed version setting in GnuTLS by moving 'NORMAL' at the end
    of priority string
  * CONC-386: Added support for pem files which contain certificate
    and private key.
  * Replication/Binlog API: The main mechanism used in replication
    is the binary log. 
  * CONC-395: Dashes and underscores are not interchangeable in
    options in my.cnf
  * CONC-384: Incorrect packet when a connection attribute name or
    value is equal to or greater than 251
  * CONC-388: field-&gt;def_length is always set to 0
  * Getter should get and the setter should set
    CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS
  * Disable LOAD DATA LOCAL INFILE support by default and auto-enable
    it for the duration of one query, if the query string starts with
    the word 'load'. In all other cases the application should enable
    LOAD DATA LOCAL INFILE support explicitly.
  * Changed return code for mysql_optionv/mysql_get_optionv to 1 (was -1)
    and added CR_NOT_IMPLEMENTED error message if a option is unknown
    or not supported.
  * mingw fix: use lowercase names for include files
  * CONC-375: Fixed handshake errors when mixing TLSv1.3 cipher
    suites with cipher suites from other TLS protocols
  * CONC-312: Added new caching_sha2_password authentication plugin
    for authentication with MySQL 8.0
- refresh mariadb-connector-c-2.3.1_unresolved_symbols.patch and
  private_library.patch
- pack caching_sha2_password.so and client_ed25519.so
- move libmariadb.pc from /usr/lib/pkgconfig to
  /usr/lib64/pkgconfig for x86_64 [bsc#1126088] 

- Switch to new GitHub repo

- Add trigger for openstack-horizon-plugin-murano-ui
- Update to version 0.0.0+git.1515995585.81ed236:
  * Migrate templates job to Zuul v3

- add 0001-set_db_attribute-differs-between-vsctl-and-native.patch (bsc#1152916)
  part of lp#1630920

- add copytruncate to openstack-neutron.logrotate (bsc#1126428)

- Add 0001-When-converting-sg-rules-to-iptables-do-not-emit-dpo.patch (bsc#1129729)

- Add back the HA related patches that we removed to debug(SOC-10092)
  Add 0001-Keep-HA-ports-info-for-HA-router-during-entire-lifecycle.patch
   backported from https://review.opendev.org/#/c/659644/1
  Add 0001-Async-notify-neutron-server-for-HA-states.patch
   backported from https://review.opendev.org/#/c/658507/1
  Add 0001-Change-duplicate-OVS-bridge-datapath-ids.patch
   backported from https://review.opendev.org/#/c/649192/3
  Add 0001-Choose-random-value-for-HA-routes-vr_id.patch
   backported from https://review.opendev.org/#/c/651988/2

- add copytruncate to openstack-nova.logrorate (bsc#1126428)

- Update to version 2016.2+git.1492839294.d76879d:
  * Setup monasca-agent

- Update to version 2016.2+git.1492611783.2908851:
  * Adding support for monasca

- Update to version 2016.2+git.1490964440.09a9673:
  * Move aliases inside Keystone vhost configuration

- Update to version 2016.2+git.1486720712.bea5be9:
  * Use qemu instead of lxc as virt_type fallback
  * Check for net/subnet/router existance before creating it
  * Use get_or_*() functions for Heat

- skip magnum service image for non-x86_64

- add 0001-Suppress-excessive-debug-logs-when-consume-rabbit (bsc#1123053):
- Add adjust-to-setuptools-8-plus.patch (SOC-10947): this
  patch fixes oslo.utils breakage caused by the more recent
  python-setuptools version introduced by (bsc#1075812).

- Revert change on using license macro from previous commit.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075812">SUSE bug 1075812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123053">SUSE bug 1123053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126088">SUSE bug 1126088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126428">SUSE bug 1126428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129729">SUSE bug 1129729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143215">SUSE bug 1143215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152916">SUSE bug 1152916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155089">SUSE bug 1155089</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1002201/">CVE-2017-1002201</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595300" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595301" comment="crowbar-core-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595302" comment="crowbar-core-branding-upstream-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595303" comment="crowbar-openstack-4.0+git.1573038068.1e32b3205-9.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595304" comment="crowbar-ui-1.1.0+git.1547500033.d0fb2bf2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595305" comment="galera-3-wsrep-provider-25.3.25-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595306" comment="libmariadb3-3.1.2-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595307" comment="mariadb-10.2.25-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595308" comment="mariadb-client-10.2.25-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595309" comment="mariadb-errormessages-10.2.25-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595310" comment="mariadb-galera-10.2.25-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595311" comment="mariadb-tools-10.2.25-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595312" comment="openstack-dashboard-theme-SUSE-2016.2-5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595313" comment="openstack-heat-templates-0.0.0+git.1515995585.81ed236-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595314" comment="openstack-neutron-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595315" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595316" comment="openstack-neutron-doc-9.4.2~dev21-7.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595317" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595318" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595319" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595320" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595321" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595322" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595323" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595324" comment="openstack-neutron-server-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595325" comment="openstack-nova-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595326" comment="openstack-nova-api-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595327" comment="openstack-nova-cells-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595328" comment="openstack-nova-cert-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595329" comment="openstack-nova-compute-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595330" comment="openstack-nova-conductor-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595331" comment="openstack-nova-console-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595332" comment="openstack-nova-consoleauth-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595333" comment="openstack-nova-doc-14.0.11~dev13-4.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595334" comment="openstack-nova-novncproxy-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595335" comment="openstack-nova-placement-api-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595336" comment="openstack-nova-scheduler-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595337" comment="openstack-nova-serialproxy-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595338" comment="openstack-nova-vncproxy-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595339" comment="patterns-cloud-admin-20170124-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595340" comment="patterns-cloud-compute-20170124-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595341" comment="patterns-cloud-controller-20170124-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595342" comment="patterns-cloud-network-20170124-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595343" comment="patterns-cloud-user-20170124-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595344" comment="python-neutron-9.4.2~dev21-7.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595345" comment="python-nova-14.0.11~dev13-4.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595346" comment="python-oslo.messaging-5.10.2-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595347" comment="python-oslo.utils-3.16.1-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595348" comment="python-pysaml2-4.0.2-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79504" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154980" ref_url="https://bugzilla.suse.com/1154980" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006251.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2019-18277: Fixed HTTP smuggling in messages with transfer-encoding header missing the 'chunked' value (bsc#1154980).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-12"/>
	<updated date="2019-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154980">SUSE bug 1154980</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595349" comment="haproxy-1.6.11-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79505" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79506" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79507" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595354" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595355" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595356" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595357" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595358" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595359" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595360" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595361" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595362" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595363" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595364" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595365" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79508" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005118.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595366" comment="libblkid1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551327" comment="libblkid1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595367" comment="libfdisk1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595368" comment="libmount1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551330" comment="libmount1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595369" comment="libsmartcols1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595370" comment="libuuid1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551333" comment="libuuid1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595371" comment="python-libmount-2.28-44.18.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595372" comment="util-linux-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530805" comment="util-linux-lang-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595373" comment="util-linux-systemd-2.28-44.18.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595374" comment="uuidd-2.28-44.18.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79509" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-loofah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1085967" ref_url="https://bugzilla.suse.com/1085967" source="BUGZILLA"/>
		<reference ref_id="1113969" ref_url="https://bugzilla.suse.com/1113969" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005122.html" source="SUSE-SU"/>
		<description>
This update for rubygem-loofah fixes the following issues:

Security issues fixed:

- CVE-2018-16468: Fixed XXS by removing the svg animate attribute `from` from the allowlist (bsc#1113969).
- CVE-2018-8048: Fixed XSS vulnerability due to unescaped characters by libcxml2 (bsc#1085967).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085967">SUSE bug 1085967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113969">SUSE bug 1113969</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595375" comment="ruby2.1-rubygem-loofah-2.0.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79510" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1117625" ref_url="https://bugzilla.suse.com/1117625" source="BUGZILLA"/>
		<reference ref_id="1117626" ref_url="https://bugzilla.suse.com/1117626" source="BUGZILLA"/>
		<reference ref_id="1117627" ref_url="https://bugzilla.suse.com/1117627" source="BUGZILLA"/>
		<reference ref_id="1117629" ref_url="https://bugzilla.suse.com/1117629" source="BUGZILLA"/>
		<reference ref_id="1117630" ref_url="https://bugzilla.suse.com/1117630" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12120" ref_url="https://www.suse.com/security/cve/CVE-2018-12120/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.16.0 fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652)
- CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534)
- CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625)
- CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626)
- CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627)
- CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630)
- CVE-2018-12123: Fixed hostname spoofing in URL parser for javascript protocol (bsc#1117629)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117625">SUSE bug 1117625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12120/">CVE-2018-12120</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79511" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005135.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595377" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551339" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595378" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551341" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595379" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551343" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595380" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595381" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086535" ref_url="https://bugzilla.suse.com/1086535" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091197" ref_url="https://bugzilla.suse.com/1091197" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1110837" ref_url="https://bugzilla.suse.com/1110837" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1113192" ref_url="https://bugzilla.suse.com/1113192" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117187" ref_url="https://bugzilla.suse.com/1117187" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).

The following non-security bugs were fixed:

- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ata: Fix racy link clearance (bsc#1107866).
- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ip: hash fragments consistently (bsc#1042286 bsc#1108145).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- libfc: sync strings with upstream versions (bsc#1114763).
- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.
- mm: add support for releasing multiple instances of a page (bsc#1100105).
- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- NFS: add nostatflush mount option (bsc#1065726).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bsc#1114648).
- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bsc#1105931).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086535">SUSE bug 1086535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091197">SUSE bug 1091197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110837">SUSE bug 1110837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113192">SUSE bug 1113192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117187">SUSE bug 1117187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79513" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595386" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595387" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79514" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005144.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-21"/>
	<updated date="2019-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595388" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79515" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104301" ref_url="https://bugzilla.suse.com/1104301" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:
  
Security issue fixed:

- CVE-2018-5383: Fixed an implementation issue in Bluetooth where the eliptic curve parameters 
  were not sufficiently validated during Diffie-Hellman key exchange (bsc#1104301).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-22"/>
	<updated date="2019-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79516" version="1" class="patch">
	<metadata>
		<title>Security update for python-amqp, python-oslo.messaging, python-ovs, python-paramiko, python-psql2mysql (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111151" ref_url="https://bugzilla.suse.com/1111151" source="BUGZILLA"/>
		<reference ref_id="1115099" ref_url="https://bugzilla.suse.com/1115099" source="BUGZILLA"/>
		<reference ref_id="1116437" ref_url="https://bugzilla.suse.com/1116437" source="BUGZILLA"/>
		<reference ref_id="1123054" ref_url="https://bugzilla.suse.com/1123054" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005151.html" source="SUSE-SU"/>
		<description>
This update for python-amqp, python-oslo.messaging, python-ovs, python-paramiko, python-psql2mysql fixes the following issues:

Security issue fixed for python-paramiko:

- CVE-2018-1000805: Fixed an authentication bypass (bnc#1111151).

Non-security issues fixed:

- python-oslo.messaging: Fixed an issue if the client tries to reconnect after connection was lost (bsc#1123054).
- python-ovs: Fixed memory leak in c parser (bsc#1116437).
- python-ovs: Switched away from noarch and build the C based backend (bsc#1115099).
- python-psql2mysql: Update to version 0.5.0+git.1539592188.13e5d0f.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115099">SUSE bug 1115099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116437">SUSE bug 1116437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123054">SUSE bug 1123054</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595389" comment="python-amqp-1.4.9-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595390" comment="python-oslo.messaging-5.10.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595391" comment="python-ovs-2.5.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595392" comment="python-paramiko-2.0.9-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595393" comment="python-psql2mysql-0.5.0+git.1539592188.13e5d0f-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79517" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595394" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595395" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595396" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595397" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595398" comment="python-demo-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595399" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595400" comment="python-idle-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595401" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595402" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79518" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1120932" ref_url="https://bugzilla.suse.com/1120932" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005149.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

Security issue fixed:

- CVE-2019-3498: Fixed a content spoofing attack in the default 404 page (bsc#1120932)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120932">SUSE bug 1120932</bugzilla>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595403" comment="python-Django-1.8.19-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79519" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).
- CVE-2018-7858: Fixed a denial of service which could occur while updating the VGA display, after guest has adjusted the display dimensions (bsc#1084604).
- CVE-2017-13673: Fixed a denial of service in the cpu_physical_memory_snapshot_get_dirty function.
- CVE-2017-13672: Fixed a denial of service via vectors involving display update.

Non-security issues fixed:

- Fixed bad guest time after migration (bsc#1113231).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79520" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79521" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79522" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1104662" ref_url="https://bugzilla.suse.com/1104662" source="BUGZILLA"/>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005299.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could
  have resulted in a remote denial of service via the guest agent (bsc#1127458).

Other issues fixed:   

- libxl: save current memory value after successful balloon (bsc#1120813).
- spec: Don't restart libvirt-guests when updating libvirt-client (bsc#1104662).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104662">SUSE bug 1104662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595421" comment="libvirt-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595422" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595423" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595424" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595425" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595426" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595427" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595428" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595429" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595430" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595431" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595432" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595433" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595434" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595435" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595436" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595437" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595438" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595439" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79523" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79524" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79525" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120119" ref_url="https://bugzilla.suse.com/1120119" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79526" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	  

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595451" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595452" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595453" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79527" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128158" ref_url="https://bugzilla.suse.com/1128158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:

Security issues fixed:

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). 

More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595454" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595455" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79528" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79529" version="1" class="patch">
	<metadata>
		<title>Security update for openstack-cinder, openstack-horizon-plugin-designate-ui, openstack-neutron, openstack-neutron-lbaas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1089834" ref_url="https://bugzilla.suse.com/1089834" source="BUGZILLA"/>
		<reference ref_id="1105476" ref_url="https://bugzilla.suse.com/1105476" source="BUGZILLA"/>
		<reference ref_id="1116475" ref_url="https://bugzilla.suse.com/1116475" source="BUGZILLA"/>
		<reference ref_id="1119902" ref_url="https://bugzilla.suse.com/1119902" source="BUGZILLA"/>
		<reference ref_id="1124695" ref_url="https://bugzilla.suse.com/1124695" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15139" ref_url="https://www.suse.com/security/cve/CVE-2017-15139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005229.html" source="SUSE-SU"/>
		<description>
This update for openstack-cinder, openstack-horizon-plugin-designate-ui, openstack-neutron, openstack-neutron-lbaas fixes the following issues:

Security vulnerabity fixed in openstack-cinder:

- CVE-2017-15139: Fixed a leakage of sensitive information between tenants
  in certain storage volume configurations (bsc#1105476)

Bug fixes and other changes in openstack-horizon-plugin-designate-ui:

- Remove the py{c} files unconditionally without error messages

Bug fixes and other changes in openstack-neutron:

- Fixed an issue with neutron leaving behind ovs ports when already in
  skipped_ports (bsc#1124695)
- Require version and release to ensure that subpackages are consistent
  and coherent (bsc#1119902)
- Fixed an issue with lbass neutron ports being down or in status build
  (bsc#1119902)
- Enable liberal TCP connection tracking to prevent connection resets
  (bsc#1116475)
- Switch to mariadb.service
- Add dependency on rabbitmq to neutron-server.service

Bug fixes and changes in openstack-neutron-lbaas.changes

- Improve performance of loadbalancer objects (bsc#1089834)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089834">SUSE bug 1089834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105476">SUSE bug 1105476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116475">SUSE bug 1116475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119902">SUSE bug 1119902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124695">SUSE bug 1124695</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15139/">CVE-2017-15139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595457" comment="openstack-cinder-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595458" comment="openstack-cinder-api-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595459" comment="openstack-cinder-backup-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595460" comment="openstack-cinder-doc-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595461" comment="openstack-cinder-scheduler-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595462" comment="openstack-cinder-volume-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595463" comment="openstack-horizon-plugin-designate-ui-3.0.2~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595464" comment="openstack-neutron-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595465" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595466" comment="openstack-neutron-doc-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595467" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595468" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595469" comment="openstack-neutron-lbaas-9.2.2~dev11-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595470" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595471" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595472" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595473" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595474" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595475" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595476" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595477" comment="openstack-neutron-server-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595478" comment="python-cinder-9.1.5~dev6-4.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595479" comment="python-horizon-plugin-designate-ui-3.0.2~dev1-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595480" comment="python-neutron-9.4.2~dev21-7.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595481" comment="python-neutron-lbaas-9.2.2~dev11-4.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79530" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595482" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595483" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79531" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005232.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79532" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595484" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595485" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79533" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595486" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595487" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551392" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595488" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551394" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595489" comment="openssl-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79534" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1010700" ref_url="https://bugzilla.suse.com/1010700" source="BUGZILLA"/>
		<reference ref_id="1072728" ref_url="https://bugzilla.suse.com/1072728" source="BUGZILLA"/>
		<reference ref_id="1080156" ref_url="https://bugzilla.suse.com/1080156" source="BUGZILLA"/>
		<reference ref_id="1087320" ref_url="https://bugzilla.suse.com/1087320" source="BUGZILLA"/>
		<reference ref_id="1098377" ref_url="https://bugzilla.suse.com/1098377" source="BUGZILLA"/>
		<reference ref_id="1101877" ref_url="https://bugzilla.suse.com/1101877" source="BUGZILLA"/>
		<reference ref_id="1110299" ref_url="https://bugzilla.suse.com/1110299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

This security issue was fixed:

- CVE-2018-10852: Set stricter permissions on /var/lib/sss/pipes/sudo to prevent the disclosure of sudo rules for arbitrary users (bsc#1098377)

These non-security issues were fixed:

- Fix a segmentation fault in sss_cache command. (bsc#1072728)
- Fix a failure in autofs initialisation sequence upon system boot. (bsc#1010700)
- Fix race condition on boot between SSSD and autofs. (bsc#1010700)
- Fix a bug where file descriptors were not closed (bsc#1080156)
- Fix an issue where sssd logs were not rotated properly (bsc#1080156)
- Remove whitespaces from netgroup entries (bsc#1087320)
- Remove misleading log messages (bsc#1101877)
- exit() the forked process if exec()-ing a child process fails (bsc#1110299)
- Do not schedule the machine renewal task if adcli is not executable (bsc#1110299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010700">SUSE bug 1010700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072728">SUSE bug 1072728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080156">SUSE bug 1080156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087320">SUSE bug 1087320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101877">SUSE bug 1101877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110299">SUSE bug 1110299</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595490" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595491" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595492" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595493" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595494" comment="sssd-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551401" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595495" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595496" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595497" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595498" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595499" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595500" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595501" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79535" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="1127532" ref_url="https://bugzilla.suse.com/1127532" source="BUGZILLA"/>
		<reference ref_id="1127533" ref_url="https://bugzilla.suse.com/1127533" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-5739" ref_url="https://www.suse.com/security/cve/CVE-2019-5739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.17.0 fixes the following issues:

Security issues fixed:


- CVE-2019-5739: Fixed a potentially attack vector which could lead to Denial of Service 
  when HTTP connection are kept active (bsc#1127533).
- CVE-2019-5737: Fixed a potentially attack vector which could lead to Denial of Service
  when HTTP connection are kept active (bsc#1127532).
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances 
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Release Notes: https://nodejs.org/en/blog/release/v6.17.0/    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127533">SUSE bug 1127533</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5739/">CVE-2019-5739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595502" comment="nodejs6-6.17.0-11.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79536" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1105402" ref_url="https://bugzilla.suse.com/1105402" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1121698" ref_url="https://bugzilla.suse.com/1121698" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1122821" ref_url="https://bugzilla.suse.com/1122821" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127758" ref_url="https://bugzilla.suse.com/1127758" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).
- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).

The following non-security bugs were fixed:

- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).
- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105402">SUSE bug 1105402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121698">SUSE bug 1121698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122821">SUSE bug 1122821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127758">SUSE bug 1127758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79537" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0838-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005665.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-05"/>
	<updated date="2019-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595507" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595508" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551416" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79538" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79539" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1131233" ref_url="https://bugzilla.suse.com/1131233" source="BUGZILLA"/>
		<reference ref_id="1131237" ref_url="https://bugzilla.suse.com/1131237" source="BUGZILLA"/>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="1131245" ref_url="https://bugzilla.suse.com/1131245" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595512" comment="apache2-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595513" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595514" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595515" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595516" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79540" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595517" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79541" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111789" ref_url="https://bugzilla.suse.com/1111789" source="BUGZILLA"/>
		<reference ref_id="1123022" ref_url="https://bugzilla.suse.com/1123022" source="BUGZILLA"/>
		<reference ref_id="1130116" ref_url="https://bugzilla.suse.com/1130116" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issues fixed: 

- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing 
  local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).

Other issue fixed: 
- Fixed handling of command continuation(bsc#1111789)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111789">SUSE bug 1111789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595518" comment="dovecot22-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595519" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595520" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595521" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79542" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595522" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595523" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79543" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1129271" ref_url="https://bugzilla.suse.com/1129271" source="BUGZILLA"/>
		<reference ref_id="1129272" ref_url="https://bugzilla.suse.com/1129272" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

Security issues fixed: 	  

- CVE-2019-5418: Fixed a file content disclosure vulnerability in Action View which 
  could be exploited via specially crafted accept headers in combination with calls 
  to render file (bsc#1129272).
- CVE-2019-5419: Fixed a resource exhaustion issue in Action View which could make
  the server unable to process requests (bsc#1129271). 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129271">SUSE bug 1129271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129272">SUSE bug 1129272</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595524" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79544" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)

Other issue addressed: 

- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-10"/>
	<updated date="2019-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79545" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595525" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79546" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595526" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595527" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595528" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595529" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79547" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595530" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595531" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546718" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79548" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595532" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595533" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595534" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548956" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79549" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595535" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548963" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79550" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79551" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595543" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595544" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595545" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79552" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595546" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595547" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79553" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595548" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595549" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548971" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595550" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79554" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595551" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551431" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595552" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595553" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595554" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595555" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79555" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595556" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595557" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595558" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595559" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595560" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595561" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595562" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79556" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595563" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595564" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595565" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79557" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79558" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595569" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79559" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1037216" ref_url="https://bugzilla.suse.com/1037216" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1099279" ref_url="https://bugzilla.suse.com/1099279" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155311" ref_url="https://bugzilla.suse.com/1155311" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1156060" ref_url="https://bugzilla.suse.com/1156060" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158381" ref_url="https://bugzilla.suse.com/1158381" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158427" ref_url="https://bugzilla.suse.com/1158427" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162298" ref_url="https://bugzilla.suse.com/1162298" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).
- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).
- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).
- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).
- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).
- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).
- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).
- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).
- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).
- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1155311).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).
- cgroup: avoid copying strings longer than the buffers (bsc#1146544).
- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037216">SUSE bug 1037216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099279">SUSE bug 1099279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155311">SUSE bug 1155311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156060">SUSE bug 1156060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162298">SUSE bug 1162298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79560" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595574" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595575" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595576" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595577" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595578" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79561" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1165439" ref_url="https://bugzilla.suse.com/1165439" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<description>
This update for python-PyYAML fixes the following issues:

- CVE-2020-1747: Fixed an arbitrary code execution when YAML files are parsed by FullLoader (bsc#1165439).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-15"/>
	<updated date="2020-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595579" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79562" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595580" comment="git-core-2.26.2-27.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79563" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595581" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79564" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79565" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595582" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595583" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595584" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595585" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595586" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595587" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595588" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595589" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595590" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595591" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79566" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79567" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595598" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595599" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79568" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79569" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595601" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595602" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79570" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595603" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595604" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595605" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79571" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79572" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79573" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595614" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595615" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595616" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79574" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79575" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- KEYS: allow reaching the keys quotas exactly (bsc#1171689).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79576" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595621" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79577" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79578" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1166916" ref_url="https://bugzilla.suse.com/1166916" source="BUGZILLA"/>
		<reference ref_id="1172443" ref_url="https://bugzilla.suse.com/1172443" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

- CVE-2020-8174: Fixed multiple memory corruption in napi_get_value_string_*() (bsc#1172443).
- CVE-2020-7598: Fixed an issue which could have tricked minimist into adding or modifying 
  properties of Object.prototype (bsc#1166916).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-15"/>
	<updated date="2020-06-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1166916">SUSE bug 1166916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172443">SUSE bug 1172443</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595623" comment="nodejs6-6.17.1-11.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79579" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595624" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595625" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79580" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79581" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79582" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79583" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595635" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595636" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551499" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79584" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79585" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79586" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595637" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79587" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595638" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79588" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595639" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595640" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79589" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595641" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595642" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595643" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595644" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595645" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595646" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595647" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595648" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595649" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79590" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595650" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551522" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595651" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595652" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595653" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595654" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79591" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79592" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595659" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595660" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595661" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595662" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79593" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1138954" ref_url="https://bugzilla.suse.com/1138954" source="BUGZILLA"/>
		<reference ref_id="1144327" ref_url="https://bugzilla.suse.com/1144327" source="BUGZILLA"/>
		<reference ref_id="1144379" ref_url="https://bugzilla.suse.com/1144379" source="BUGZILLA"/>
		<reference ref_id="1150584" ref_url="https://bugzilla.suse.com/1150584" source="BUGZILLA"/>
		<reference ref_id="1152711" ref_url="https://bugzilla.suse.com/1152711" source="BUGZILLA"/>
		<reference ref_id="1153471" ref_url="https://bugzilla.suse.com/1153471" source="BUGZILLA"/>
		<reference ref_id="1155789" ref_url="https://bugzilla.suse.com/1155789" source="BUGZILLA"/>
		<reference ref_id="1155952" ref_url="https://bugzilla.suse.com/1155952" source="BUGZILLA"/>
		<reference ref_id="1157860" ref_url="https://bugzilla.suse.com/1157860" source="BUGZILLA"/>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
		<description>
This update for xrdp provides the following fix:

- CVE-2020-4044: xrdp-sesman can be crashed remotely over port 3350 (bsc#1173580).
- Fixed an issue where xrdp-sesman could not restart (bsc#1155952).	  
- Fixed an issue where xrdp could not start due to an error in the service file use absolute path in ExecStart (bsc#1155789).
- Fixed a PAM error after 2nd xrdp session after logout (bsc#1153471).
- Fixed a crash in xrdp-sesman, caused by terminating and reconnecting an xrdp session (bsc#1152711).
- Fixed a failure in RDP session recovery (bsc#1150584).
- Fixed a process leak (bsc#1144379).  
- Let systemd handle the daemons, fixing daemon start failures. (bsc#1138954, bsc#1144327)
- Don't try to create .vnc directory if it already exists. (bsc#1157860)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138954">SUSE bug 1138954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144327">SUSE bug 1144327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144379">SUSE bug 1144379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150584">SUSE bug 1150584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152711">SUSE bug 1152711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153471">SUSE bug 1153471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155789">SUSE bug 1155789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155952">SUSE bug 1155952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157860">SUSE bug 1157860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595663" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79594" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595664" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79595" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595665" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79596" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79597" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
- Backport gcc-7 build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79598" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595674" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595675" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79599" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79600" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595679" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551554" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595680" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551556" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595681" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551558" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595682" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551560" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595683" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551562" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595684" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551564" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595685" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595686" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551567" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595687" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595688" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551570" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595689" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551572" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595690" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595691" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551575" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595692" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595693" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551578" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595694" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595695" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551581" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79601" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79602" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173144" ref_url="https://bugzilla.suse.com/1173144" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8163" ref_url="https://www.suse.com/security/cve/CVE-2020-8163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007231.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- Fixed a potential remote code execution of user-provided local names (bsc#1173144, CVE-2020-8163).
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173144">SUSE bug 1173144</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8163/">CVE-2020-8163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595700" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595701" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79603" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79604" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79605" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595704" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551590" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595705" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551592" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79606" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595706" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551594" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79607" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79608" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: Multiple xenoprof issues
- bsc#1168142 - CVE-2020-11739: Missing memory barriers in read-write unlock paths
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79609" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595714" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595715" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595716" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595717" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79610" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595718" comment="grub2-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551607" comment="grub2-s390x-emu-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79611" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007296.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595719" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551609" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595720" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551611" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595721" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551613" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595722" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551615" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595723" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551617" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595724" comment="libndr0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551619" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595725" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551621" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595726" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551623" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595727" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551625" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595728" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551627" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595729" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551629" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595730" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551631" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595731" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551633" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595732" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551635" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595733" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551637" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595734" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551639" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595735" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551641" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595736" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551643" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595737" comment="samba-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595738" comment="samba-client-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551646" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595739" comment="samba-libs-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551648" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595740" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551650" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79612" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595741" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595742" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79613" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-31"/>
	<updated date="2020-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595743" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595744" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595745" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595746" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595747" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595748" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595749" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595750" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595751" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595752" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595753" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79614" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79615" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595756" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595757" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79616" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595758" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595759" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595760" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595761" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595762" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79617" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79618" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159352" ref_url="https://bugzilla.suse.com/1159352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775/" source="CVE"/>
		<reference ref_id="CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776/" source="CVE"/>
		<reference ref_id="CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 to version 6.17.1 fixes the following issues:

Security issues fixed:

- CVE-2019-16777, CVE-2019-16776, CVE-2019-16775: Updated npm to 6.13.4, fixing
    an arbitrary path overwrite and access via 'bin' field (bsc#1159352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-28"/>
	<updated date="2020-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595765" comment="nodejs6-6.17.1-11.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79619" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595766" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79620" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595767" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551674" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595768" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551676" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79621" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79622" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595772" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595773" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595774" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79623" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.

The following security bugs were fixed:


- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bug was fixed:

- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595775" comment="kernel-default-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595776" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595777" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595778" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79624" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79625" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79626" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537694" comment="shim-15+git47-22.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79627" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595783" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79628" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159548" ref_url="https://bugzilla.suse.com/1159548" source="BUGZILLA"/>
		<reference ref_id="1172037" ref_url="https://bugzilla.suse.com/1172037" source="BUGZILLA"/>
		<reference ref_id="1173351" ref_url="https://bugzilla.suse.com/1173351" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="CVE-2020-8161" ref_url="https://www.suse.com/security/cve/CVE-2020-8161/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack to version 1.6.13 fixes the following issues:

- CVE-2020-8184: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1173351).
- CVE-2020-8161: Fixed a directory traversal (bsc#1172037).
- CVE-2019-16782: Fixed an information leak / session hijack vulnerability (bsc#1159548).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-18"/>
	<updated date="2020-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172037">SUSE bug 1172037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8161/">CVE-2020-8161</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595784" comment="ruby2.1-rubygem-rack-1.6.13-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79629" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176421" ref_url="https://bugzilla.suse.com/1176421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007446.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- CVE-2020-15169:  Fix cross-site scripting in translation helpers (bsc#1176421)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176421">SUSE bug 1176421</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595785" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79630" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007448.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2019-20916: Fixed a directory traversal in _download_http_url (bsc#1176262)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525275" comment="python-pip-10.0.1-11.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79631" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79632" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595791" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551694" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595792" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551696" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595793" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551698" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595794" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551700" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595795" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551702" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595796" comment="libndr0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551704" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595797" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551706" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595798" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551708" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595799" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551710" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595800" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551712" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595801" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551714" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595802" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551716" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595803" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551718" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595804" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551720" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595805" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551722" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595806" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551724" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595807" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551726" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595808" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551728" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595809" comment="samba-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595810" comment="samba-client-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551731" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595811" comment="samba-libs-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551733" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595812" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551735" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79633" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595813" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595814" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595815" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79634" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595816" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595817" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595818" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595819" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595820" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595821" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595822" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595823" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595824" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595825" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595826" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595827" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595828" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595829" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595830" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79635" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic  modification of live EPT PTE (bsc#1173380,XSA-328)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-01"/>
	<updated date="2020-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79636" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595831" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79637" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79638" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595836" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595837" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595838" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79639" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595839" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595840" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595841" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595842" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79640" version="1" class="patch">
	<metadata>
		<title>Security update for ansible, crowbar-core, crowbar-openstack, grafana, grafana-natel-discrete-panel, openstack-aodh, openstack-barbican, openstack-cinder, openstack-gnocchi, openstack-heat, openstack-ironic, openstack-magnum, openstack-manila, openstack-monasca-agent, openstack-murano, openstack-neutron, openstack-neutron-vpnaas, openstack-nova, openstack-sahara, python-Pillow, rubygem-crowbar-client (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1154434" ref_url="https://bugzilla.suse.com/1154434" source="BUGZILLA"/>
		<reference ref_id="1164140" ref_url="https://bugzilla.suse.com/1164140" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="1172450" ref_url="https://bugzilla.suse.com/1172450" source="BUGZILLA"/>
		<reference ref_id="1173413" ref_url="https://bugzilla.suse.com/1173413" source="BUGZILLA"/>
		<reference ref_id="1173416" ref_url="https://bugzilla.suse.com/1173416" source="BUGZILLA"/>
		<reference ref_id="1173418" ref_url="https://bugzilla.suse.com/1173418" source="BUGZILLA"/>
		<reference ref_id="1174583" ref_url="https://bugzilla.suse.com/1174583" source="BUGZILLA"/>
		<reference ref_id="1175484" ref_url="https://bugzilla.suse.com/1175484" source="BUGZILLA"/>
		<reference ref_id="965582" ref_url="https://bugzilla.suse.com/965582" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775/" source="CVE"/>
		<reference ref_id="CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954/" source="CVE"/>
		<reference ref_id="CVE-2018-18623" ref_url="https://www.suse.com/security/cve/CVE-2018-18623/" source="CVE"/>
		<reference ref_id="CVE-2018-18624" ref_url="https://www.suse.com/security/cve/CVE-2018-18624/" source="CVE"/>
		<reference ref_id="CVE-2018-18625" ref_url="https://www.suse.com/security/cve/CVE-2018-18625/" source="CVE"/>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<reference ref_id="CVE-2020-10177" ref_url="https://www.suse.com/security/cve/CVE-2020-10177/" source="CVE"/>
		<reference ref_id="CVE-2020-10378" ref_url="https://www.suse.com/security/cve/CVE-2020-10378/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-10994" ref_url="https://www.suse.com/security/cve/CVE-2020-10994/" source="CVE"/>
		<reference ref_id="CVE-2020-11110" ref_url="https://www.suse.com/security/cve/CVE-2020-11110/" source="CVE"/>
		<reference ref_id="CVE-2020-12052" ref_url="https://www.suse.com/security/cve/CVE-2020-12052/" source="CVE"/>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<reference ref_id="CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733/" source="CVE"/>
		<reference ref_id="CVE-2020-17376" ref_url="https://www.suse.com/security/cve/CVE-2020-17376/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<description>
This update for ansible, crowbar-core, crowbar-openstack, grafana, grafana-natel-discrete-panel, openstack-aodh, openstack-barbican, openstack-cinder, openstack-gnocchi, openstack-heat, openstack-ironic, openstack-magnum, openstack-manila, openstack-monasca-agent, openstack-murano, openstack-neutron, openstack-neutron-vpnaas, openstack-nova, openstack-sahara, python-Pillow, rubygem-crowbar-client fixes the following issues:

Security fixes included on this update:

for ansible:
- CVE-2020-1733,CVE-2020-10744: Fixed a race condition and insecure permissions which could have allowed
  another user on the node to gain control of the become user (bsc#1171823 and bsc#1164140).

for grafana:
- CVE-2020-11110, CVE-2018-18623, CVE-2018-18624, CVE-2018-18625: Fixed XSS vulnerabilities in dashboard
  due to an incomplete fix for CVE-2018-12099

for openstack-nova:

- CVE-2020-17376: Fixed an issue in which live migration failed to update persistent domain XML (bsc#1175484)

for python-pillow:
- CVE-2016-0775: Fixed a buffer overflow in FliDecode.c (bsc#965582)
- CVE-2020-10177: Fix-OOB-reads-in-FLI-decoding (bsc#1173413)
- CVE-2020-10994: Fix-bounds-overflow-in-JPEG-2000-decoding (bsc#1173418)
- CVE-2020-10378: Fix-bounds-overflow-in-PCX-decoding (bsc#1173416)

for rubygem-crowbar-client:
- CVE-2018-17954: Fixed an issue where provision leaks admin password to all nodes in cleartext (bsc#1117080)

Non-security fixes included on this update:

Changes in ansible:
- Update CVE-2020-10744_avoid_mkdir_p.patch to include missing parts
  and rename to CVE-2020-1733_avoid_mkdir_p.patch to make it clear
  which CVE is fixed there (bsc#1164140)

- Add CVE-2020-10744_avoid_mkdir_p.patch (bsc#1171823) to fix
  insecure temporary directory creation.

Changes in crowbar-core:
- Update to version 4.0+git.1600767499.0615a418f:
  * provisioner: check for client_user (SOC-11389)
  * crowbar: Also add access to /restricted/ in SSL vhost (SOC-11352)
  * crowbar: Allow hardware-installing -&gt; discovering transition (noref)
  * crowbar: Add Restricted controller with API for restricted clients (bsc#1117080)
  * crowbar: Add complete list of states to Crowbar::State (noref)
  * provisioner: Remove the need for /updates/parse_node_data (noref)
  * crowbar: Create helper module to validate states (noref)
  * provisioner: Use new restricted API (bsc#1117080)
  * provisioner: Do not read /etc/crowbar.install.key from crowbar_joi (bsc#1117080)
  * provisioner: Remove use of privileged user for Windows machine (bsc#1117080)
  * provisioner: Use restricted client during provisioning (bsc#1117080)
  * provisioner: Use restricted client for crowbar_register (bsc#1117080)
  * provisioner: Drop /etc/crowbar.install.key bits from autoyast prof (bsc#1117080)
  * Avoid hardcoding machine-install user (bsc#1117080)
  * crowbar: Restrict admin access (bsc#1117080)

- Update to version 4.0+git.1600416364.5a9286e31:
  * Whitelist fixed CVEs in travis (noref)
  * Disable cookbook tests (noref)


Changes in crowbar-openstack:
- Update to version 4.0+git.1599037255.25b759234:
  * horizon: Update configuration for Grafana 5.x

Changes in grafana:
- BuildRequire go1.14 explicitly
- Add recompress source service
- Add go_modules source service to create vendor.tar.gz
  containing 3rd party go modules.
- Adjust spec to work for Grafana-6.7.4
- Adjust Makefile to work for Grafana-6.7.4
- Remove CVE-2019-15043.patch (merged upstream)
- Remove CVE-2020-13379.patch (merged upstream)
- Remove 0001-CVE-2020-12052-bsc1170657-XSS-annotation-popup-vulnerability.patch
  (merged upstream)
- Update to version 6.7.4 (bsc#1172450, CVE-2018-18623,
  CVE-2018-18624, CVE-2018-18625, bsc#1174583, CVE-2020-11110)
  * Only allow 32 hexadecimal digits for the avatar hash
  * 6.7.3 cherry-picks (#23808)
  * Fix CI for pushing a multi-architecture manifest (#23327)
  * AzureMonitor: Fix Log Analytics and Application Insights
    for Azure China (#21803) (#22753)
  * Revert 'grafana/data: PanelTypeChangedHandler API update
    to use PanelModel instead of panel options object
    [BREAKING] (#22754)'
  * Bumped version
  * Snapshots: Sanitize orignal url (#23254)
  * Plugins: Expose promiseToDigest (#23249)
  * Variables: Do not update variable from url when value is
    the same (#23220)
  * DashboardSave: Add new dashboard check (#23104)
  * Fix: reverted back to `import * as module` instead of
    using namespaces (#23069)
  * BackendSrv: Adds config to response to fix external
    plugins that use this  (#23032)
  * DataLinks: make sure we use the correct datapoint when
    dataset contains null value. (#22981)
  * Fix mysterious Babel plugin errors (#22974)
  * Select: Fixed select text positition (#22952)
  * grafana/data: PanelTypeChangedHandler API update to use
    PanelModel instead of panel options object [BREAKING]
    (#22754)
  * Docs: Fix Broken Link (#22894)
  * Panels: Fixed size issue with panels when existing panel
    edit mode (#22912)
  * Azure: Fixed dropdowns not showing current value (#22914)
  * BackendSrv: only add content-type on POST, PUT requests
    (#22910)
  * Check if the datasource is of type loki using meta.id
    instead of name. (#22877)
  * CircleCI: Pin grabpl to 0.1.0 (#22904)
  * Design tweaks (#22886)
  * Rich history UX fixes (#22783)
  * AzureMonitor: support workspaces function for template
    variables (#22882)
  * SQLStore: Add migration for adding index on
    annotation.alert_id (#22876)
  * Plugins: Return jsondetails as an json object instead of
    raw json on datasource healthchecks. (#22859)
  * Backend plugins: Exclude plugin metrics in Grafana's
    metrics endpoint (#22857)
  * Graphite: Fixed issue with query editor and next select
    metric now showing after selecting metric node  (#22856)
  * Stackdriver: Fix GCE auth bug when creating new data
    source (#22836)
  * @grafana/runtime: Add cancellation of queries to
    DataSourceWithBackend (#22818)
  * Rich history: Test coverage (#22852)
  * Datasource config was not mapped for datasource
    healthcheck (#22848)
  * upgrades plugin sdk to 0.30.0 (#22846)
  * Rich History: UX adjustments and fixes (#22729)
  * TablePanel: Enable new units picker (#22833)
  * Fix dashboard picker's props (#22815)
  * Grafana-UI: Add invalid state to Forms.Textarea (#22775)
  * SaveDashboard: Updated modal design/layout a bit (#22810)
  * Forms: Fix input suffix position (#22780)
  * AngularPanels: Fixed inner height calculation (#22796)
  * Fix: fixes issue with headers property with different
    casing (#22778)
  * DataSourceWithBackend: use /health endpoint for test
    (#22789)
  * Chore: remove expressions flag and allow (#22764)
  * Core: Pass the rest of to props to Select (#22776)
  * Add support for sending health check to datasource
    plugins. (#22771)
  * Datasource: making sure we are having the same data field
    order when using mixed data sources. (#22718)
  * DashboardSave: Autofocus save dashboard form input
    (#22748)
  * @grafana/e2e: cherry picked
    4fecf5a7a65f5b7b4c03fefb9a3da15cee938f02 (#22739)
  * CircleCI: Implement new release pipeline (#22625)
  * Toolkit: use fs-extra instead of fs (#22723)
  * What's new docs for 6.7 release (#22721)
  * Backend Plugins: use sdk v0.26.0 (#22725)
  * PanelInspector: Add Stats Tab (#22683)
  * Revert 'Graph: Improve point rendering performance
    (#22610)' (#22716)
  * Docs: add rendering configuration in reporting (#22715)
  * reverting the changes that failed the e2e tests. (#22714)
  * Remove multiple occurrences of 'before' (#22710)
  * Datasources: Update dashboards (#22476)
  * API: Fix redirect issues (#22285)
  * Explore: adds QueryRowErrors component, moves error
    display to QueryRow (#22438)
  * RichHistory: Design Tweaks  (#22703)
  * Modals: Unify angular/react modals backdrop color (#22708)
  * Graphite: Don't issue empty 'select metric' queries
    (#22699)
  * support duplicate field names in arrow format (#22705)
  * UX: Update new form styles to dark inputs (#22701)
  * Docs: Grammar corrections
  * Docs: Overcoming Grammatical errors (#22707)
  * Pass dashboard via angular directive (#22696)
  * Docs: Replace 'API' by 'Integration' key for PagerDuty
    (#22639)
  * Docs: Edited Enterprise docs (#22602)
  * CloudWatch: Expand alias variables when query yields no
    result (#22695)
  * Dependency: sdk's dataframe package renamed to data
    (#22700)
  * @grafana/e2e: include Cypress tsconfig in published
    package (#22698)
  * Graphite: Update config editor (#22553)
  * @grafana/e2e: fix runtime ts-loader errors with Cypress
    support files (#22688)
  * Docs: Add version note about Azure AD OAuth2 (#22692)
  * StatPanel: Return base color when there is no value set
    (#22690)
  * Send jsondata for Datasources on DatasourceConfig for
    backend plugins (#22681)
  * Explore: Rich History (#22570)
  * XSS: Fixed history XSS issue (#22680)
  * Fix caching problem (#22473)
  * on update for checkbox and switch (#22656)
  * Notification Channel: Make test button wider (#22653)
  * Backend plugins: Updates due to changes in SDK (#22649)
  * Make sure commit hook in FieldPropertiesEditor is
    invalidated when value changes (#22673)
  * Docs: Plugin.json: Fix property descriptions, add missing
    properties, add example (#22281)
  * Alerting: Fixed bad background color for default
    notifications in alert tab  (#22660)
  * Webpack: Updated terser plugin (#22669)
  * Core: DashboardPicker improvements (#22619)
  * Storybook: Forms.Form docs (#22654)
  * Templating: Migrates some variable types from Angular to
    React/Redux (#22434)
  * Grafana UI: Fix Forms.Select onChangeWithEmpty (#22647)
  * Azure Monitor: Fix app insights source to allow for new
    __timeFrom and __timeTo (#21879)
  * @grafana/e2e: install necessary dependencies for published
    package (#22657)
  * DashboardSave: Correctly overwrite dashboard when saving
    (#22650)
  * StatPanel: Fixes base color is being used for null values
    (#22646)
  * FieldOverrides: Add value mappings editor to standard
    config properties registry (#22648)
  * Docs: Update gauge.md (#22637)
  * Docs: Create Intro grafana (#22522)
  * Toolkit: wrap plugin signing stub with error checking
    (#22626)
  * @grafana/e2e: fix empty bundle files (#22607)
  * Toolkit: include a github release utility (#22520)
  * Rendering: Have phantomjs wait a bit before rendering to
    give fonts a change to load (#22623)
  * Cascader: Do not override default width behavior (#22620)
  * Update documentation-style-guide.md (#22581)
  * Adds signed in user to backend v2 plugins requests
    (#22584)
  * CloudWatch: updated namespaces - Athena, DocDB, and
    Route53Resolver (#22604)
  * Graph: Improve point rendering performance (#22610)
  * Alerting: Fix state age test failures (#22606)
  * Docs: Update image_rendering.md (#22586)
  * UI: Segment improvements (#22601)
  * remove section about alias imports (#22585)
  * Backend Plugins: Support handling of streaming resource
    response (#22580)
  * Stackdriver: Migrate GCE default project (#22593)
  * Toolkit: plugin ci needs to cooperate better with
    make/mage (#22588)
  * surround CloudWatch dimension names with double quotes
    (#22222)
  * Fix: when reloading page make sure that time picker
    history is converted to dateTime.
  * Core: add active users stat (#22563)
  * Chore: Modules tidy and vendor (#22578)
  * Loki: use series API for stream facetting (#21332)
  * Testing code owners for backend code (#22572)
  * Azure Monitor: config editor updates, update sameas
    switch, fix test snaps (#22554)
  * Grafana-UI: Use value for Radio group id (#22568)
  * Chore: fix moment import in alerting tests (#22567)
  * avoid aliased import in cli (#22566)
  * Chore: Avoid aliasing importing models in api package
    (#22492)
  * ShareModal: able to extend tabs (#22537)
  * Tests: fix alerting reducers tests (#22560)
  * Logs: Improve log level guess (#22094)
  * DataSourceWithBackend: apply template variables (#22558)
  * @grafana/e2e: added support for plugin repositories
    (#22546)
  * Add fallback to search_base_dns if group_search_base_dns
    is undefined. (#21263)
  * Docs: Added a Markdown Style Guide (#22425)
  * Old AsyncSelect: Add story (#22536)
  * Chore: add missing aria-label for rendered panel image
    (e2e tests) (#22543)
  * Form migrations: Dashboard- and TimeZonePicker (#22459)
  * Migration: Share dashboard/panel modal (#22436)
  * Revert 'Select: scroll into view when navigate with
    up/down arrows (#22503)' (#22535)
  * Backend plugins: Prepare and clean request headers before
    resource calls (#22321)
  * Cascader: Add size for input (#22517)
  * ArrowDataFrame: allow empty results (#22524)
  * Migration: Save dashboard modals (#22395)
  * Toolkit: don't clean dist folder before build (#22521)
  * Docs: Add Storybook guidelines (#22465)
  * Docs: Removed menu links to SDK Reference until we are
    ready for 7.0 (#22509)
  * Stackdriver: Project selector (#22447)
  * Select: scroll into view when navigate with up/down arrows
    (#22503)
  * Elastic: To get fields, start with today's index and go
    backwards (#22318)
  * API: Include IP address when logging request error
    (#21596)
  * chore: avoid aliasing imports in services (#22499)
  * Grafana-UI: add storysource addon to Storybook (#22490)
  * canary 404 previous versions (#22495)
  * Fix Dockerfile lint errors (#22496)
  * Migration: Invite Signup (#22437)
  * Core: add hideFromMenu for child items (#22494)
  * Dashboard: Adds support for a global minimum dashboard
    refresh interval (#19416)
  * CI: Deploy enterprise image (#22488)
  * changelog: adds note about breaking change (#22480)
  * chore: avoid alias for models in plugins (#22483)
  * chore: avoid aliasing models in middleware (#22484)
  * Grafana UI: Add missing argument (#22487)
  * NewPanelEditor: Angular panel options, and angular
    component state to redux major change (#22448)
  * @grafana/ui: Create slider component (#22275)
  * Icons: add reports icon (#22445)
  * Panel inspect: Horizontal scrolling in Data table (#22245)
  * Alerting: Fixed the issue/bug of diff and percent_diff
    functions *Breaking change* (#21338)
  * App Plugins: support react pages in nav (#22428)
  * Optimized package.json files (#22475)
  * Toolkit: add junit reporting and jest.config.js to plugin
    build (#22450)
  * Grafana UI: Add forwardRef (#22466)
  * Docs: Update Getting started (#22422)
  * pkg/api/pluginproxy: Access token provider should handle
    access tokens without ExpiresOn field (#19928)
  * Documentation: Specify usage of datasource whitelist
    (#22412)
  * Form: Allow default values updates (#22435)
  * NewPanelEditor: Wait a bit before resending query result
    on panel editor exit (#22421)
  * Grafana-UI: update date picker (#22414)
  * grafana-cli: Upgrade to urfave/cli v2 (#22402)
  * Docs: adding first version of the auto-generated packages
    API docs. (#22107)
  * NewPanelEditor: Panel edit tweaks (#22415)
  * Core: Make application title customizable for WL (#22401)
  * Fix: making select to return empty list when no values are
    selected in multivalue mode.
  * Fix: Added missing 'remove'-icon for light theme.
  * Docs: adding API reference documentation support for the
    packages libraries. (#21931)
  * Accessibility: Makes tag colors more accessible (#22398)
  * Admin: fix images on license page (#22413)
  * DataSourceWithBackend: Add a get/post resource standard
    path (#22408)
  * Docs: Fix examples, grammar, add links (#22406)
  * Docs: Add links, fix grammar, formatting, wording (#22381)
  * Changelog: adds missing enterprise features (#22399)
  * Docs: Add info on active LDAP sync (#22347)
  * Docs: Fixed formatting issue in new stat docs (#22390)
  * @grafana/toolkit: completed support for source maps in
    plugin builds (#22379)
  * UX: BackButton left arrow icon (#22369)
  * Scrollbar: Show scrollbar on only on hover (#22386)
  * NewPanelEditor: Fixed cleanup that could cause crash
    (#22384)
  * Theme: Fixed bug in sass file (#22382)
  * Alerting: Don't include image_url field with Slack message
    if empty (#22372)
  * Docs: New doc pages for panels Stat, Gauge &amp; Bar Gauge
    (#22335)
  * Docs: Update front-end style guide (#22197)
  * Chore: Update latest.json (#22345)
  * CircleCI: Fix publishing of releases (#22342)
  * Changelog: v6.6.2 (#22341)
  * CircleCI: Switch to new master build pipeline (#22158)
  * Docs: Update white-labeling.md (#22224)
  * Webpack: Upgrade terser webpack plugin (#22332)
  * grafana/ui: Export TextArea under Forms namespace (#22328)
  * Suggesting couple of changes to the document (#22298)
  * Correcting Line 22 (#22292)
  * Docs: Fix 'enable' steps formatting (#22324)
  * [Docs] Improvised instructions for adding data source.
    (#22305)
  * DashLinks: Add pull right to dropdown menu (#22233)
  * Migration: User invite (#22263)
  * Select: Fix focus issue and remove select container
    (#22309)
  * Annotations: Call panel refresh when table transform
    changes to annotations (#22323)
  * Docs: Couple of changes to the document (#22291)
  * Docs: Typo correction in Line 19 (#22297)
  * Rendering: Store render key in remote cache (#22031)
  * Backend Plugins: Provide proper plugin config to plugins
    (#21985)
  * New panel edit: data links tweaks (#22304)
  * Metrics: Add gauge for requests currently in flight
    (#22168)
  * OAuth: Enforce auto_assign_org_id setting when role
    mapping enabled using Generic OAuth (#22268)
  * CircleCI: Upgrade Ubuntu base image to 19.10 also for
    enterprise (#22315)
  * CI: check ubuntu and alpine images with trivy (#22314)
  * Docker: Upgrade Ubuntu to 19.10 (#22306)
  * grafana/data: runtime dependencies moved from
    devDependencies (#22283)
  * PanelInspector: Fixed issue in panel inspector (#22302)
  * grafana/ui: Add basic horizontal and vertical layout
    components (#22303)
  * Field Config Editors: Remove namespacing from standard
    field config editors (#22296)
  * CircleCI: Increase nodejs max memory (#22295)
  * Update rpm.md (#22284)
  * FieldConfigs: String select type &amp; cell display mode added
    to table panel (#22274)
  * LinkSrv: Add newlines so I can read code
  * Docs: Fix TestData docs (#22279)
  * API: Improve recovery middleware when response already
    been written (#22256)
  * Update mac.md (#22280)
  * @grafana/toolkit: lint fix option now writes changes to
    disk (#22278)
  * Docs: minor fixes (#22223)
  * Reorder cipher suites for better security (#22101)
  * Docs: Minor typo fix (#22221)
  * NewPanelEdit: Add back datalinks and new table panel fix
    (#22267)
  * Prometheus: Implement region annotation (#22225)
  * Table: Fixed header alignment (#22236)
  * Data proxy: Log proxy errors using Grafana logger (#22174)
  * TimePicker: fixing weird behavior with calendar when
    switching between months/years  (#22253)
  * Update timeseries.md (#20795)
  * Auth: Don't rotate auth token when requests are cancelled
    by client (#22106)
  * Elastic: Map level field based on config. (#22182)
  * Sqlstore: guard against getting a dashboard without
    specifying identi… (#22246)
  * Migrations: Signup page (#21514)
  * Storybook: Add color theme and theme switcher (#22005)
  * NewPanelEditor: Making angular panels reuse data and
    render on edit mode enter (#22229)
  * PanelEdit: Title tweaks (#22237)
  * NewPanelEdit: Minor changes (#22239)
  * Chore: Fixed strict null errors (#22238)
  * NewPanelEditor: Thresholds v2 (#22232)
  * Toolkit: support sass style for plugins (#22235)
  * add CloudWatch Usage Metrics (#22179)
  * FieldOverrides: Fix issue with same series name for every
    display value (#22234)
  * Inspector: find the datasource from the refId, not the
    metadata (#22231)
  * New panel editor: Persist panel editor ui state (#22210)
  * Toolkit: don't create declaration files for plugins (by
    default) (#22228)
  * Docs: Update windows.md (#22185)
  * Docs: Add linking topic (#21986)
  * Docs: Refactored Enterprise side menu (#22189)
  * CircleCI: Push master Docker images without revision in
    tag (#22218)
  * Alerting: Update the types of recipient supported by the
    Slack notifier (#22205)
  * docs: change URL occurences to uppercase (#22151)
  * Docs: Fix link for provisioning data sources (#22159)
  * DevEnv: update frontend dependencies - tests (#22140)
  * DevEnv: update frontend dependencies - type definitions
    (#22141)
  * Make Explore panel link work when grafana served from sub
    url (#22202)
  * DevEnv: update frontend dependencies - node (#22139)
  * API: Fix redirect issue when configured to use a subpath
    (#21652)
  * Inspect: Inspect header design update (#22120)
  * FieldOverrides: FieldOverrides UI (#22187)
  * Azure OAuth: enable teamsync (#22160)
  * Docs: Organize basic concepts and getting started (#21859)
  * FieldOverides: apply field overrides based on
    configuration (#22047)
  * Docs: Suggesting few changes to the doc (#22115)
  * Docs: Update phrasing line 35 (#22152)
  * Docs: Correcting Typo in Line131 (#22155)
  * Dashboard: fixed padding inconsistency
  * BackendSrv: Fixes a stupid mistake with a missing return
    (#22177)
  * PanelEdit: Fixed timing and state related issues (#22131)
  * Elastic: Replace range as number not string (#22173)
  * change sync target branch to master (#21930)
  * e2e: Fixed issue with aria label (#22166)
  * Fix: Do not remove whitespace in PanelLink url (#22087)
  * React Migration: Migrates FolderPicker from angular to
    react (#21088)
  * Auth: Azure AD OAuth (#20030)
  * DevEnv: update frontend dependencies - grunt (#22136)
  * Bugfix: updates cloudwatch query editor test async render
    to prevent it from throwing error (#22150)
  * NewPanelEdit: Design tweaks (#22156)
  * TestData: Update streaming.json (#22132)
  * DevEnv: update frontend dependencies - babel (#22135)
  * Docs: Fix port config list formatting (#22113)
  * Explore: Refactor active buttons css (#22124)
  * Forms/Switch: Simplifies and adjusts CSS/Markup (#22129)
  * Datasource/Loki: Fixes issue where live tailing displayed
    date as invalid (#22128)
  * NewPanelEditor: Fixed issue going back to dashboard after
    pull page reload  (#22121)
  * Loki, Prometheus: Fix PromQL and LogQL syntax highlighting
    (#21944)
  * NewPanelEdit: Added visualization tab / selection view
    (#22117)
  * Increase ts fork check mem limit (#22118)
  * NewPanelEditor: Panel editor tabs in state (url)  (#22102)
  * Delete report.20200209.125304.14262.0.001.json
  * Annotation &amp; Alerts: Makes various annotation and alert
    requests cancelable (#22055)
  * Select zindex (#22109)
  * Docs: Add doc templates (#21927)
  * Fix mentioning Slack users/groups (#21734)
  * Docs: Update rules.md (#21989)
  * Docs: Update metrics.md (#21988)
  * Docs: Update dashboard.md (#21951)
  * Docs: Added release notes tag (#22012)
  * Forms/RadioButtonGroup: Improves semantics and simplifies
    CSS (#22093)
  * Docs: add LDAP active sync limitation for single bind
    configuration (#22098)
  * Docs: Update behind_proxy.md to include HTTPS and URL
    rewrite example (#21832)
  * DataLinks: Avoid null exception in new edit mode (#22100)
  * Docs: Image rendering improvements (#22084)
  * Fix display of multiline logs in log panel and explore
    (#22057)
  * Fix/add width to toggle button group (#21924)
  * NewPanelEditor: Introduce redux state and reducer
    (#22070)
  * Prometheus: make $__range more precise (#21722)
  * New panel edit: data links edit (#22077)
  * Docs: fix minor typos in datasources.md (#22092)
  * Toolkit: add a warning about tslint migration (#22089)
  * Read `target` prop from the links in the footer (#22074)
  * CircleCI: Publish enterprise Docker dev image for new
    master pipeline (#22091)
  * CircleCI: Include build ID in version for new master
    pipeline (#22013)
  * Alerting: Handle NaN in reducers (#22053)
  * Toolkit: create manifest files for plugins (#22056)
  * Backend Plugins: make transform work again (#22078)
  * Docs: Fix broken link (#22010)
  * Docs: Fix formatting typo (#22067)
  * CircleCI: Publish enterprise ARM variants from master
    pipeline (#22011)
  * Chore: Adds cancellation to backendSrv request function
    (#22066)
  * Dashboard: Move some plugin &amp; panel state to redux
    (#22052)
  * Docs: Clarify that extraction of zip is required to
    install plugin (#22061)
  * Chore: Fixes non utc tests (#22063)
  * Grafana ui/time of day picker ui improvements (#21950)
  * Links: Assure base url when single stat, panel and data
    links are built (#21956)
  * BackendSrv: Returns correct error when a request is
    cancelled (#21992)
  * Make zoom and time shift work after emmitter change
    (#22051)
  * New Editor: refresh when time values change (#22049)
  * New Editor: Add ValuePicker for overrides selection
    (#22048)
  * Collapse: add a controlled collapse (#22046)
  * Cascader: Fix issue where the dropdown wouldn't show
    (#22045)
  * New Editor: add display modes to fix ratio with actual
    display (#22032)
  * Chore: Use forwardRef in ButtonSelect (#22042)
  * DashNavTimeControls: remove $injector and rootScope from
    time picker (#22041)
  * New panel edit: field overrides ui (#22036)
  * Select: Portaling for Select (#22040)
  * New Select: Fix the overflow issue and menu positioning
    (#22039)
  * Upgrade: React layout grid upgrade (#22038)
  * PanelChrome: Use react Panel Header for angular panels.
    (#21265)
  * New Editor: add a tabs row for the query section (#22037)
  * New Editor: use unit picker (#22033)
  * Dashboard: Refactor dashboard reducer &amp; actions (#22021)
  * New panel editor: Add title editor (#22030)
  * UnitPicker: Use the new Cascader implementation (#22029)
  * FieldEditor: extendable FieldConfig UI (#21882)
  * Cascader: Add enable custom value (#21812)
  * New panel edit: support scrolling (#22026)
  * Thresholds: get theme from context automatically (#22025)
  * New Panel Edit: works for panels with and without queries
    (#22024)
  * PanelEditor: use splitpane for new editor (#22022)
  * Select: Fixed allow custom value in
    Select/UnitPicker/Segment/AsyncSegment (#22018)
  * Chore: export arrow dataframe utilities (#22016)
  * TSLint → ESLint (#21006)
  * Docker: Publish enterprise image with master-commit tag
    (#22008)
  * Chore: Resolve random failure with golangci-lint (#21970)
  * New panel edit: don't query when entering edit mode
    (#21921)
  * Fix bad grammar in Dashboard Link page (#21984)
  * Update documentation-style-guide.md (#21736)
  * Prometheus: Allow sub-second step in the prometheus
    datasource (#21861)
  * Update latest.json versions to 6.6.1 (#21972)
  * Change log for 6.6.1 (#21969)
  * Datasource: updates PromExploreQueryEditor to prevent it
    from throwing error on edit (#21605)
  * Explore: Adds Loki explore query editor (#21497)
  * @grafana/ui: Fix displaying of bars in React Graph
    (#21968)
  * Prometheus: Do not show rate hint when increase function
    is applied (#21955)
  * Elastic: Limit the number of datapoints for the counts
    query (#21937)
  * Storybook: Update categories (#21898)
  * Quota: Makes sure we provide the request context to the
    quota service (#21949)
  * Docs: Documentation for 6.6 Explore and Logs panel
    features (#21754)
  * Annotations: Change indices and rewrites annotation find
    query to improve database query performance (#21915)
  * Prometheus: Fixes default step value for annotation query
    (#21934)
  * Dashboard edit: Fix 404 when making dashboard editable
  * Publish from new master pipeline (#21813)
  * Metrics: Adds back missing summary quantiles (#21858)
  * delete redundant alias (#21907)
  * grafana/ui: Fix displaying of bars in React Graph (#21922)
  * Docs: Added developer-resources.md (#21806)
  * Fix formatting (#21894)
  * New Select: Blur input on select (#21876)
  * Fix/add default props to prom query editor (#21908)
  * Graph Panel: Fixed typo in thresholds form (#21903)
  * Disable logging in button (#21900)
  * DatasourceEditor: Add UI to edit custom HTTP headers
    (#17846)
  * Datasource: Show access (Browser/Server) select on the
    Prometheus datasource (#21833)
  * Docs: Update dashboard.md (#21896)
  * Docs: Update dashboard.md (#21200)
  * Docs: Make upgrading instructions for Docker work (#21836)
  * deps so can mock in tests (#21827)
  * Templating: Add new global built-in variables (#21790)
  * Fix: Reimplement HideFromTabs in Tabs component (#21863)
  * grafana/data: Remove unused PanelSize interface (#21877)
  * New Select: Extend creatable select api (#21869)
  * Backend plugins: Implement support for resources (#21805)
  * Docker: change plugin path in custom docker (#21837)
  * Image Rendering: Fix render of graph panel legend aligned
    to the right using Grafana image renderer plugin/service
    (#21854)
  * Docs: Update _index.md (#21700)
  * grafana/toolkit: Fix failing linter when there were lint
    issues (#21849)
  * DatasourceSettings: Fixed issue navigating away from data
    source settings page (#21841)
  * AppPageCtrl: Fix digest issue with app page initialisation
    (#21847)
  * Explore: adds basic tests to TableContainer checking the
    render and output on 0 series returned
  * Explore: adds MetaInfoText tests
  * Explore: adds export of MetaItem and its props
  * Explore: updates TableContainer to use MetaInfoText
    component
  * Explore: updates Logs component to use MetaInfoText
    component
  * Explore: adds MetaInfoText component
  * Explore: removes unnecessary styles for panel logs
  * Explore: updates Table container render to avoid rendering
    table on empty result
  * Explore: updates explore table container to show a span on
    0 series returned
  * docs/cli: Fix documentation of reset-admin-password with
    --homepath (#21840)
  * Replace ts-loader with Babel (#21587)
  * Docs: Add information about license expiration (#21578)
  * Fix digest issue with query part editor's actions menu
    (#21834)
  * Graphite: Fixed issue with functions with multiple
    required params and no defaults caused params that could
    not be edited (groupByNodes groupByTags) (#21814)
  * TimePicker: Should display in kiosk mode (#21816)
  * Chore: Upgrade Storybook to 5.3.9 (#21550)
  * Table: Make the height of the table include header cells
    (#21824)
  * StatPanels: Fixed migration from old singlestat and
    default min &amp; max being copied even when gauge was disbled
    (#21820)
  * Docs: Update docker image run and configuration
    instructions (#21705)
  * DataFrame: update golden test files (#21808)
  * Docs: Alphabetize datasource names in sidebar under
    docs/Features/DataSources (#21740)
  * Inspect: Add error tab (#21565)
  * Select: Fix direct usages of react-select to make the
    scroll great again (#21822)
  * TablePanel: display multi-line text (#20210)
  * Fixed strict errors (#21823)
  * Fix: prevents the BarGauge from exploding when the
    datasource returns empty result. (#21791)
  * Select: Fix scroll issue (#21795)
  * Fix: Fixes user logout for datasourceRequests with 401
    from  datasource (#21800)
  * Azure Monitor: Fix Application Insights API key field to
    allow input (#21738)
  * Influxdb: Fix cascader when doing log query in explore
    (#21787)
  * Devenv: OpenTSDB dashboard (#21797)
  * MSI: License for Enterprise (#21794)
  * OpenTSDB: Add back missing ngInject (#21796)
  * Heatmap: Legend color range is incorrect when using custom
    min/max (#21748)
  * Config: add meta feature toggle (#21786)
  * Logs panel: Rename labels to unique labels (#21783)
  * Add link guide for installing new renderer (#21702)
  * Chore: Lowers strict error limit (#21781)
  * Chore: Removes Cypress record (#21782)
  * Docs: Document configuration of console, file and syslog
    log formats (#21768)
  * Annotations: Fixes this.templateSrv.replace is not a
    function error for Grafana datasource (#21778)
  * Fix typos in the communication documentation (#21774)
  * Chore: Fixes various strict null errors (#21763)
  * Forms: Allow custom value creation in async select
    (#21759)
  * Chore: bump react-select to 3.0.8 (#21638)
  * grafana/data: Add type for secure json in DataSourceAPI
    (#21772)
  * Influxdb: Fix issues with request creation and parsing
    (#21743)
  * Explore/Loki: Fix handling of legacy log row context
    request (#21767)
  * 6.6.0 latest (#21762)
  * Docs: Updates Changelog for 6.6.0 (#21753)
  * Docs: Update image rendering (#21650)
  * Docs: misc. nitpicks to the HTTP API docs (#21758)
  * Dashboard: fixes issue with UI not being re-rendered after
    moving dashboard
  * Dashboard: fixed issues with re-rendering of UI when
    importing dashboard (#21723)
  * Build: Added devenv docker block for testing grafana with
    traefik.
  * Update What's new in 6.6 (#21745)
  * Footer: Display Grafana edition (#21717)
  * BackendSrv: Fixes POST body for form data (#21714)
  * Docs: Update CloudWatch and Stackdriver docs for 6.6
    (#21679)
  * BackendSrv: Adds missing props back to response object in
    datasourceRequest (#21727)
  * Explore: Fix context view in logs, where some rows may
    have been filtered out. (#21729)
  * Toolkit: add canvas-mock to test setup (#21739)
  * TablePabel: Sanitize column link (#21735)
  * Docs: Fix getting started links on Windows installation
    page (#21724)
  * Docs: Enterprise 6.6 (#21666)
  * Template vars: Add error message for failed query var
    (#21731)
  * Loki: Refactor editor and syntax hooks (#21687)
  * Devenv: Fixed devenv dashboard template var datasource
    (#21715)
  * Footer: added back missing footer to login page (#21720)
  * Admin: Viewer should not see link to teams in side menu
    (#21716)
  * Annotations: Fix issue with annotation queries editors
    (#21712)
  * grafana/ui: Remove path import  from grafana-data (#21707)
  * Loki: Fix Loki with repeated panels and interpolation for
    Explore (#21685)
  * CircleCI: Add workflow for building with Grafana Build
    Pipeline (#21449)
  * StatPanels: Fixed possible migration issue (#21681)
  * Make importDataSourcePlugin cancelable (#21430)
  * Docs: Update what's new in 6.6 (#21699)
  * Docs: Fix broken link in upgrade notes (#21698)
  * Alerting: Support passing tags to Pagerduty and allow
    notification on specific event categories (#21335)
  * PhantomJS: Fix rendering of panels using Prometheus
    datasource
  * backendSrv: Only stringifies request body if payload isn't
    already a string (#21639)
  * Update changelog generation to ignore not merged pull
    requests (#21641)
  * StatPanel: minor height tweak (#21663)
  * Circle: Introduce es-check to branches &amp; pr workflow
    (#21677)
  * Run query when region, namespace and metric changes
    (#21633)
  * Explore: Fixes some LogDetailsRow markup (#21671)
  * SQLStore: Fix PostgreSQL failure to create organisation
    for first time (#21648)
  * Migrations: migrate admin user create page (#21506)
  * Docs: Whats new updates (#21664)
  * CloudWatch: Auto period snap to next higher period
    (#21659)
  * Login: Better auto sizing of login logo (#21645)
  * Chore: Fixes PhantomJs by adding polyfills for fetch and
    AbortController (#21655)
  * Alert: Minor tweak to work with license warnings (#21654)
  * Toolkit: copyIfNonExistent order swapped (#21653)
  * Doc: Update configuration.md (#21602)
  * Explore: Fix log level color and add tests (#21646)
  * Templating: A way to support object syntax for global vars
    (#21634)
  * CloudWatch: Add DynamoDB Accelerator (DAX) metrics &amp;
    dimensions (#21644)
  * next version 6.7.0 (#21617)
  * latest.jso: Update latest beta 6.6.0-beta1 (#21623)
  * Docs: Update changelog with attribution (#21637)
  * Docs: Updated what's new article (#21624)
  * Plugins: Apply adhoc filter in Elasticsearch logs query
    (#21346)
  * Changelog: v6.6.0-beta1 (#21619)
  * Chore: Remove angular dependency from backendSrv (#20999)
  * Emotion: Add main package with version 10 (#21560)
  * TestData: allow negative values for random_walk parameters
    (#21627)
  * Update musl checksums (#21621)
  * CloudWatch: Expand dimension value in alias correctly
    (#21626)
  * Devenv: InfluxDB logs dashboard (#21620)
  * Build: adds missing filters required to build oss msi
    (#21618)
  * BigValue: Updated test dashboard and made some chart
    sizing tweaks (#21616)
  * TestData: Adds important new features to the random walk
    scenario (#21613)
  * graphite: does not modify last segment when... (#21588)
  * grafana/ui: Add synced timepickers styling to TimePicker
    (#21598)
  * Explore: Remove destructuring of empty state in
    LogRowMessage (#21579)
  * Build: enables deployment of enterprise msi (#21607)
  * CI: MSI for Enterprise (#21569)
  * E2E docs: Add guide to debuging PhantomJS (#21606)
  * Toolkit: fix prettier error reporting (#21599)
  * Render: Use https as protocol when rendering if HTTP2
    enabled (#21600)
  * Typescript: null check fixes, and news panel fix (#21595)
  * Inspect: table take full height in drawer (#21580)
  * OAuth: Fix role mapping from id token (#20300)
  *  ButtonCascader: Fix error in Explore (#21585)
  * CloudWatch: Fix ordering of map to resolve flaky test take
    2 (#21577)
  * Redux: Fixed function adding a new reducer (#21575)
  * Minor style changes on upgrade page (#21566)
  * Revert 'Babel: use babel-loader instead of ts-loader,
    ng-annotate with babel-plugin-angularjs-annotate (#21554)'
    (#21570)
  * Explore: Context tooltip to copy labels and values from
    graph (#21405)
  * Config: Use license info instead of build info for feature
    toggling (#21558)
  * Fix merge problem (#21574)
  * CloudWatch: Fix ordering of map to resolve flaky test
    (#21572)
  * Docs: What's new in Grafana v6.6 Draft (#21562)
  * Explore: Create unique ids and deduplicate Loki logs
    (#21493)
  * Chore: Fix go vet problem (#21568)
  * Provisioning: Start provision dashboards after Grafana
    server have started (#21564)
  * CloudWatch: Calculate period based on time range (#21471)
  * Inspect: Download DataFrame to Csv (#21549)
  * CloudWatch: Multi-valued template variable dimension alias
    fix (#21541)
  * Babel: use babel-loader instead of ts-loader, ng-annotate
    with babel-plugin-angularjs-annotate (#21554)
  * Stackdriver: Support meta labels (#21373)
  * CI: Revert msi build (#21561)
  * Alerting: Fix image rendering and uploading timeout
    preventing to send alert notifications (#21536)
  * CI: adds missing files for ee msi (#21559)
  * CI: Enterprise MSI (#21518)
  * Add component: Cascader (#21410)
  * CloudWatch: Display partial result in graph when max
    DP/call limit is reached  (#21533)
  * Dashboards: Default Home Dashboard Update (#21534)
  * Docs: Update rpm.md (#21547)
  * Docs: Update mac.md (#20782)
  * Templating: update variables on location changed (#21480)
  * Vendor: grafana-plugin-sdk-go v0.11.0 (#21552)
  * fix dateMath import in grafana-ui (#21546)
  * Explore/Loki: Filter expression only treated as regex when
    regex operator is used (#21538)
  * Fix TypeScript error (#21545)
  * Build: Ignore content of /pkg/extensions, not directory
    (#21540)
  * Update latest to 6.5.3 (#21509)
  * Explore: Ensures queries aren't updated when returning to
    dashboard if browser back is used (#20897)
  * Inspect: Use AutoSizer for managing width for content in
    tabs. (#21511)
  * Changelog generation: Generate grafana/ui changelog
    (#21531)
  * Toolkit: support less loader (#21527)
  * AppPlugin: remove simple app from the core repo (#21526)
  * @grafana/toolkit: cleanup (#21441)
  * DataFrames: add arrow test and capture metadata parsing
    errors (#21524)
  * DataLinks: allow using values from other fields in the
    same row (#21478)
  * grafana/data: Update plugin config page typings (BREAKING)
    (#21503)
  * Fix regex in convertCSSToStyle, add test coverage (#21508)
  * CloudWatch: Annotation Editor rewrite (#20765)
  * Admin: Add promotional page for Grafana Enterprise
    (#21422)
  * Add changelog for 6.5.3
  * Backend Plugins: Collect and expose metrics and plugin
    process health check (#21481)
  * Auth: Rotate auth tokens at the end of requests (#21347)
  * Tabs: Hide Tabs on Page header on small screens (#21489)
  * Fix importing plugin dashboards (#21501)
  * SideMenu: Fixes issue with logout link opened in new tab
    (#21488)
  * DataLinks: Make data links input grow again (#21499)
  * Templating: use default datasource when missing (#21495)
  * Explore: Fix timepicker when browsing back after switching
    datasource (#21454)
  * Add disabled option for cookie samesite attribute (#21472)
  * Chore: Adds basic alerting notification service tests
    (#21467)
  * ImportDashboardCommand: Validate JSON fields (#21350)
  * Docs: add test for website build (#21364)
  * Fix: when clicking a plot on a touch device we won't
    display the annotation menu (#21479)
  * Backend Plugins: add a common implementation (#21408)
  * Alerting: new min_interval_seconds options to enforce a
    minimum eval frequency  (#21188)
  * Panel: Use Tabs in panel inspector (#21468)
  * Docs: Update rpm install (#21475)
  * Alerting: Enable setting of OpsGenie priority via a tag
    (#21298)
  * Alerting: fallbackText added to Google Chat notifier
    (#21464)
  * Plugins: Move backend plugin manager to service (#21474)
  * Backend Plugins: Refactor backend plugin registration and
    start (#21452)
  * Admin: New Admin User page (#20498)
  * Docs: Update cli.md (#21470)
  * Fix:  Tab icons not showing (#21465)
  * Chore: Add react-table typings to Table (#21418)
  * Login: Refactoring how login background is rendered
    (#21446)
  * StatPanel: Refactoring &amp; fixes (#21437)
  * Chore: Migrates reducers and actions to Redux Toolkit
    (#21287)
  * DeleteButton: Button with icon only was not centered
    correctly. (#21432)
  * Logos: Refactoring a bit how logos are rendered (#21421)
  * Docs: Update documentation-style-guide.md (#21322)
  * More datasource funcs poc (#21047)
  * Docs: Update plugin installation and CLI (#21179)
  * Docs: Update debian.md (#21339)
  * Alerting: Adds support for sending a single email to all
    recipients in notification channel (#21091)
  * ThreemaNotifier: Use fully qualified status emoji (#21305)
  * Settings: Env override support for dynamic settings
    (#21439)
  * Security: refactor 'redirect_to' cookie to use 'Secure'
    flag (#19787)
  * Logs: Fix parsing for logfmt fields that have parens
    (#21407)
  * Improve documentation for the Prometheus data source
    (#21415)
  * Heatmap: fix formatting (#21433)
  * Docs: Fixed broken links of Datasource doc at Grafana
    plugin page (#21363)
  * ApiUser: Fix response when enabling, disabling or deleting
    a nonexistent user (#21391)
  * grafana/ui: Create Tabs component (#21328)
  * Inspector: support custom metadata display (#20854)
  * Table: Added text align option to column styles (#21175)
  * PluginPage: Add appSubUrl string to config pages url
    (#21414)
  * Docs: Remove comment about upcoming alerting for
    singlestat and table panels (#21416)
  * Footer: Single footer component for both react &amp; angular
    pages (#21389)
  * API: Added alert state validation before changing its
    state (#21375)
  * AddDataSource: Added missing phantom plugin (#21406)
  * Plugins: Use grafana-plugin-sdk-go v0.5.0 (#21116)
  * UnitPicker: show custom units on load (#21397)
  * Cloud Watch: Standardize Config Editor Implementation
    (#20489)
  * CloudWatch: dimension_values templating fix (#21401)
  * Docs: explain how to setup the apt repo without helpers
    (#21194)
  * Build: prevent changes to pkg/extentions/main.go from
    throwing error on merge
  * TimeZones: fix utc test (#21393)
  * Build: package all binaries for enterprise (#21381)
  * Datasource: fixes prometheus datasource tests - adds align
    range
  * CircleCI: Testing upgrade to CircleCI 2.1 (#21374)
  * Storybook: Remove reference to jquery.flot.pie file from
    storybook config (#21378)
  * Cloudwatch: Fixed crash when switching from cloudwatch
    data source (#21376)
  * Docs: Added Squadcast notifications (#21372)
  * Chore: upgrade d3 (#21368)
  * Datasource: fix a bug where deleting data source will
    trigger save and test events (#21300)
  * Forms: revamped select (#21092)
  * Toolkit: add git log info to the plugin build report
    (#21344)
  * Docs: Use https scheme for Grafana playground links
    (#21360)
  * fix docs links (#21359)
  * AddDatasourcePage: Refactoring &amp; more Phantom plugins
    (#21261)
  * Chore: Remove empty flot.pie file (#21356)
  * Docs: Fix link (#21358)
  * Docs: Fix InfluxDB templated dashboard link (#21343)
  * Rendering: Fix panel PNG rendering when using sub url &amp;
    serve_from_sub_path = true (#21306)
  * NewsPanel: update default feed url (#21342)
  * docs: fix influxdb templated dashboard link (#21336)
  * Docs: Update Windows.md (#21333)
  * Arrow: don't export arrow... breaking phantomjs e2e test
    (#21331)
  * DataFrame: round trip metadata to arrow Table (#21277)
  * Prometheus: user metrics metadata to inform query hints
    (#21304)
  * Panel: disable edit/duplicate/delete entry for repeat
    panel (#21257)
  * Prometheus: Disable suggestions at beginning of value
    (#21302)
  * grafana/ui: Do not build in strict mode as grafana/ui
    depends on non-strict libs (#21319)
  * Docs: Update security.md (#20981)
  * @grafana/data: use timeZone parameter rather than isUtc
    (#21276)
  * Units: support dynamic count and currency units (#21279)
  * Docs: Added sudo and removed $ where inconsistent.
    (#21314)
  * ImgUploader: add support for non-amazon S3 (#20354)
  * Fix: tooltips value disappear when label has too long word
    (#21267)
  * Docs: Update provisioning.md (#21303)
  * Docs: Update alerting_notification_channels.md (#21245)
  * Loki: fix filter expression suggestions (#21290)
  * Prometheus: Fix label value suggestion (#21294)
  * Prometheus: Fix term completion that contain keywords
    (#21295)
  * Docs: Fixed broken links in Basic Concepts (#21035)
  * Docs: Edited Windows install instructions (#20780)
  * Docs: Update troubleshooting.md (#21244)
  * Fix internal links in http_api/dashboard.md (#21255)
  * Docs: Update README.md (#21274)
  * Docs: Fix aliases/redirects (#21241)
  * Docs: Document tracing.jaeger configuration (#21181)
  * Websockets: upgrade websocket libray to 1.4.1 (#21280)
  * FieldConfig: add thresholds and color modes (#21273)
  * Prometheus: improve tooltips (#21247)
  * Explore: Moves PromContext from query level to
    DataQueryRequest level (#21260)
  * BridgeSrv: do not strip base from `state.location.url`
    (#20161)
  * Graph: another tooltip fix (#21251)
  * Alerting: Add configurable severity support for PagerDuty
    notifier (#19425)
  * Graph: Fixed no value in graph tooltip (#21246)
  * Units: support farenheit (existing misspelling) (#21249)
  * Docs: fix typo (#21190)
  * Promtheus: Fix hint and error display for query rows
    (#21242)
  * Docs: fixed broken doc link for graph and table panels
    (#21238)
  * Docs: fix of broken doc link in the dashlist panel's help
    section (#21230)
  * Docs: Update the link to docs for singlestat (#21225)
  * Docks: Update provisioning.md with proper Slack settings
    (#21227)
  * Editor: Ignore closing brace when it was added by editor
    (#21172)
  * Explore: moves add query row button below query rows
    (#20522)
  * Explore: adds PrometheusExploreQueryEditor (#20195)
  * Simplify adjustInterval (#21226)
  * Sass: Checked in tmpl files
  * Table: Component progress &amp; custom FieldConfig options
    (#21231)
  * Chore: remove StreamHandler and DataStreamState  (#21234)
  * DashboardGrid: Fixed flickering while resizing (#21221)
  * docs: rename premium plugins to enterprise plugins
    (#21222)
  * NewsPanel: add news as a builtin panel (#21128)
  * grafana/toolkit: Readme update (#21218)
  * grafana/toolkit: Resolve modules correctly (#21216)
  * New bar gauge style: Unfilled (#21201)
  * Dashboard: new updated time picker (#20931)
  * Metrictank: fix bundled dashboard (#21209)
  * Tooltip: preventing xss injections via the colors
    variable. (#21203)
  * Livetailing: set table withd to 100% (#21213)
  * Docs: Fix broken link in debian.md (#21199)
  * Added back logo file (#21198)
  * Docs: fix ordering of apt setup (#21192)
  * Docs: Fix Azure ad generic OAuth code markdown formatting
    (#21189)
  * docs: rendering plugin required for reporting (#21162)
  * Chore: Fixes wrong e2e path in .gitignore (#21186)
  * e2e: Waits for login before moving forward (#21185)
  * PanelChrome: Mini refactor (#21171)
  * Tracing: Support configuring Jaeger client from
    environment (#21103)
  * @grafana/toolkit: webpack extend TS→JS (#21176)
  * [docs] Azure monitor link in templating (#21173)
  * grafana/toolkit: Add option to override webpack config
    (#20872)
  * Docs: Adds best practices after visit and a link back to
    e2e.md (#21117)
  * Changelog: Add PagerDuty breaking change (#21170)
  * DashboardGrid: Change grid margin to 8, to align to 8px
    grid (#21167)
  * Alerting: Add more information to webhook notifications
    (#20420)
  * Panel: Show inspect panel in Drawer instead of Modal
    (#21148)
  * Prometheus: Fix typehead after binary operators (#21152)
  * docs: always updates docker image before building docs
    site (#21165)
  * Table: Matches column names with unescaped regex
    characters (#21164)
  * DataLinks: Sanitize data/panel link URLs (#21140)
  * Dashboard: Only show resize-handle on hover (#21160)
  * PagerDuty: Fix custom_details to be a JSON object instead
    of a string (#21150)
  * grafana/ui: New table component (#20991)
  * e2e: Migrates query variable CRUD tests to new framework
    (#21146)
  * Chore: Upgrade react, react-dom, react-test-renderer
    versions (#21130)
  * Fix log row when query is short (#21126)
  * Prometheus: Display HELP and TYPE of metrics if available
    (#21124)
  * e2e: Updates truth image (#21132)
  * Cloudwatch ECS Container Insights Support (#21125)
  * FontSize: Change base font size to 14px (#21104)
  * Explore: Refactor log rows (#21066)
  * phantomjs: performance.getEntriesByType not supported
    (#21009)
  * New panel editor (behind feature toggle) (#21097)
  * e2e: Adds ScenarioContext and video recordings to e2e
    (#21110)
  * DashboardImport: Fixes broken import page in prod builds
    (#21101)
  * Dependencies: Bump npm from 6.9.0 to 6.13.4 (#21095)
  * Docs: Fix broken link in loki.md (#21098)
  * Dependencies: Upgrade grunt-contrib-compress to resolve
    issues with iltorb (#21096)
  * Update CODEOWNERS (#21093)
  * E2E: Testing recording e2e tests (#21094)
  * FieldConfig: set min/max automatically for gauge (#21073)
  * Postgres/MySQL/MSSQL: Adds support for region annotations
    (#20752)
  * Azure Monitor: Use default from datasource if not saved on
    dashboard/query (#20899)
  * Azure Monitor:  Copy AM Creds to Log Analytics When Using
    Same As (#21032)
  * Docs: Add minimal hugo build, update docs README (#20905)
  * CI: Added junit test report (#21084)
  *  UI: ConfirmButton component (#20993)
  * Angular/React: Migrates team creation form to react
    (#21058)
  * Templating: Fixes digest issues in Template Variable
    Editor (#21079)
  * OrgSwitcher: Fixed issue rendering org switcher even when
    it's not open (#21061)
  * Chore: Remove rejected files (#21072)
  * e2e: Uses should on first element after visit to prevent
    flakiness (#21077)
  * FieldConfig: support overrides model (#20986)
  * AngularPanels: fixed transparency issue (#21070)
  * Docs: Update configuration.md for #3349 (#21069)
  * OAuth: Removes send_client_credentials_via_post setting
    (#20044)
  * API: Validate redirect_to cookie has valid (Grafana) url
    (#21057)
  * Explore: Refactor log details table (#21044)
  * Prometheus: Prevents validation of inputs when clicking in
    them without changing the value (#21059)
  * Prometheus: Fixes so user can change HTTP Method in config
    (#21055)
  * MetricSegment: Fix metric segment UI crash in prod builds
    (#21053)
  * OpenTSDB: Adding lookup limit to OpenTSDB datasource
    settings (#20647)
  * Templating: Fixes default visibility for submenu to same
    as dashboard (#21050)
  * Create CODEOWNERS (#21045)
  * Elastic: Add data links in datasource config (#20186)
  * Alerting: Fix panic in dingding notifier  (#20378)
  * Logs: Optional logs label column (#21025)
  * Chore: updated to latest stable version (#21033)
  * Docs: change log for release v6.5.2 (#21028)
  * Chore: Improve rendering logging (#21008)
  * Modules: Add patched goavro dependency for extensions
    (#21027)
  * Explore: Sync timepicker and logs after live-tailing stops
    (#20979)
  * Fix: Shows SubMenu when filtering directly from table
    (#21017)
  * Alerting: Fix template variable in query check  (#20721)
  * Toolkit: remove unused plugin-ci report types  (#21012)
  * MixedDatasources: Do not filter out all mixed data sources
    in add mixed query dropdown (#20990)
  * Docs: Change checkout to check out where necessary
    (#20926)
  * Promtheus: Improve tab completion (#20938)
  * build: adds IANA timezone info to windows build (#21001)
  * Loki: fix labels fetching when no initial range given
    (#21000)
  * Docs: Update datasource API examples (#20951)
  * UI: Segment fixes (#20947)
  * Stackdriver: Make service list searchable (#20989)
  * Remove un-used imports (#20937)
  * upgrade aws-sdk-go (#20957)
  * UI: ConfirmModal component (#20965)
  * Docs: Updates from puppeteer to Cypress (#20962)
  * e2e: Adds better log information during test runs (#20987)
  * Alert: If the permission is forbidden, keep the historical
    alarm data present. (#19007)
  * Graph: Add fill gradient option to series override line
    fill (#20941)
  * use https for fetch gravatar by default (#20964)
  * Prometheus: disable dynamic label lookup on big
    datasources (#20936)
  * Loki: Fix datasource config page test run (#20971)
  * Devenv: Fix loki block (#20967)
  * e2e: Replaces truth image (#20966)
  * Forms: introduce RadioButtonGroup (#20828)
  * Fix: Adds e2e as a package that needs to be built (#20961)
  * Make sure datasource variable is being used everywhere
    (#20917)
  * Refactor: Navigates directly to add data source page
    instead (#20959)
  * Alerting: Improve alert threshold handle dragging behavior
    (#20922)
  * DisplayProcessor: Interpret empty strings as NaN instead
    of 0 to support empty value map texts in Singlestat
    (#20952)
  * Prometheus: Refactor labels caching (#20898)
  * e2e: Uses Cypress instead of Puppeteer (#20753)
  * Renderer: Add user-agent to rendering plugin requests
    (#20956)
  * DataSource: remove delta option (#20949)
  * Elasticsearch: set default port to 9200 in ConfigEditor
    (#20948)
  * Loki: Remove appending of (?i) in Loki query editor if not
    added by user (#20908)
  * Datasource/Loki: Loki now goes to Logs mode when importing
    prom queries (#20890)
  * Cloudwatch: Defined explore query editor for cloudwatch
    (#20909)
  * Datasource/Loki: Empty metric name no longer replaced by
    query (#20924)
  * Revert 'Modules: Add goavro dependency for extensions
    (#20920)' (#20928)
  * Docs: Update debian.md (#20910)
  * UI: Segment Input change (#20925)
  * Modules: Add goavro dependency for extensions (#20920)
  * UI: Segment Input (#20904)
  * Remove escaping of \ ( ) characters (#20915)
  * AngularPanels: Check for digest cycle on root scope
    (#20919)
  * InfluxDB: Use new datasource update option funcs (#20907)
  * Docs: Update debian-ubuntu installation instructions
    (#20875)
  * Search: Fixed angular digest issues (#20906)
  * Remove false positive error message for expression and id
    field (#20864)
  * fix notifications page (#20903)
  * Update documentation-style-guide.md (#20871)
  * Docs: update content to work with website repo (#20693)
  * Elastic: Fix multiselect variable interpolation for logs
    (#20894)
  * Singlestat: Fixed unit not showing and switched to new
    unit picker (#20892)
  * MetaAnalytics: Minor fix for meta analytics event (#20888)
  * Explore: Cleanup redundant state variables and unused
    actions (#20837)
  * Chore/Tech debt: Remove (most) instances of $q angular
    service use (#20668)
  * AngularPanels: Fixed loading spinner being stuck in some
    rare cases (#20878)
  * TeamPicker: Increase size limit from 10 to 100 (#20882)
  * Echo: mechanism for collecting custom events lazily
    (#20365)
  * StatPanel: change to beta
  * Azure Monitor: Standardize Config Editor Implementation
    (#20455)
  * GraphTooltip: added boundaries so we never render tooltip
    outside window. (#20874)
  * Graphite: Use data frames when procesing annotation query
    in graphite ds (#20857)
  * Elastic: Fix parsing for millisecond number timestamps
    (#20290)
  * Docs: Sync docs with website repo via GitHub Action
    (#20694)
  * Gauge/BarGauge: Added support for value mapping of 'no
    data'-state to text/value (#20842)
  * UI: Use SelectableValue as Segment value (#20867)
  * Datasource/Loki: Fixes issue where time range wasn't being
    supplied with annotation query (#20829)
  * Server: Return 404 when non-pending invite is requested
    (#20863)
  * Explore: Fix reset reducer duplication (#20838)
  * CLI: Return error and aborts when plugin file extraction
    fails (#20849)
  * Datasource/Loki: Simplifies autocompletion (#20840)
  * Update README.md (#20820)
  * ValueFormats: dynamically create units (#20763)
  * @grafana/data: don't export ArrowDataFrame (#20855)
  * @grafana/data: export ArrowDataFrame (#20832)
  * Docs: Add section about derived fields for Loki (#20648)
  * Migration: Migrate org switcher to react (#19607)
  * Remove screencasts.md (#20845)
  * Update requirements.md (#20778)
  * Explore: Log message line wrapping options for logs
    (#20360)
  * AlertNotifier: Support alert tags in OpsGenie notifier
    (#20810)
  * Fix prettier (#20827)
  * Loki: Support for template variable queries (#20697)
  * Explore: Export timezone from redux state (#20812)
  * Forms: introduce checkbox (#20701)
  * OpenTsdb: Migrate Config Editor to React (#20808)
  * TablePanel, GraphPanel: Exclude hidden columns from CSV
    (#19925)
  * DataFrame: add utilities to @grafana/data that support
    apache arrow (#20813)
  * Panels: Fixed transparency option for angular panels
    (#20814)
  * CloudWatch: Upgrade aws-sdk-go (#20510)
  * Update documentation-style-guide.md (#20777)
  * Chore: Move Prometheus datasorce tests from specs folder
    and merge duplicated test files (#20755)
  * Profile: Remove sign-out tab from profile page (#20802)
  * Doc: Change inline comment on interface to doc comment
    (#20794)
  * Server: Fail when unable to create log directory (#20804)
  * Update stale.yml
  * Rename config.yaml to config.yml
  * GitHub: Add link to forum when adding new issue (#20798)
  * Datasource/Loki: Fixes regression where enhanceDataFrame
    was not called (#20660)
  * Updated changelog
  * Docs: Updated changelog
  * SQLStore: Test admins/editors/viewers stats validity
    (#20751)
  * Graph-Panel: Center option for bar charts (#19723)
  * Packages: Fixed rollup issue with grafana-ui (#20790)
  * Stalebot: update issue config (#20789)
  * Stalebot: Automatically label PRs with no activity after
    14 days as stale, then after 30 days close (#20179)
  * StatPanel: ColorMode, GraphMode &amp; JustifyMode changes
    (#20680)
  * Units: Remove SI prefix symbol from new
    milli/microSievert(/h) (#20650)
  * Graphite: Add metrictank dashboard to Graphite datasource
    (#20776)
  * Docs: Remove typo from mssql.md (#20748)
  * Navigation: Fix navigation when new password is chosen
    (#20747)
  * Cleanup: use the local variable (#20767)
  * Prometheus: Fix caching for default labels request
    (#20718)
  * Release: Updates latest.json and
    grafana/packages/*/package.json (#20734)
  * Release: Updates Changelog for 6.5.1 (#20723)
  * ReactMigration: Migrate Graphite config page to React
    (#20444)
  * SQLStore: Rewrite system statistics query to count users
    once (#20711)
  * Docs: Clean up influxdb.md (#20618)
  * CloudWatch: Region template query fix (#20661)
  * Units: remove unreachable code (#20684)
  * Tests: Skipping Template Variable tests for now (#20707)
  * Datasource/Loki: Fix issue where annotation queries
    weren't getting their variables interpolated (#20702)
  * Documentation: Add missing blank in docker run command
    (#20705)
  * Server: Defer wg.Done call to ensure it's called (#20700)
  * Fix: Fixes templateSrv is undefined for plugins that do
    not use @@ngInject (#20696)
  * Server: Clean up startup logic/error checking (#20679)
  * CloudWatch: Annotations query editor loading fix (#20687)
  * OAuth: Add missing setting from defaults.ini (#20691)
  * DataLinks: Refactor title state (#20256)
  * Forms: TextArea component (#20484)
  * Explore: Adjust the max-width of the tooltip (#20675)
  * Units: Add currency and energy units (#20428)
  * transform: update to use sdk with frame.labels moved to
    frame.[]field.labels (#20670)
  * dev: fix pre-commit typo in toolkit (#20673)
  * Docs: Update change user password payload in http api
    (#20666)
  * Chore: Sync defaults.ini with sample.ini (#20645)
  * Loki: Fix query error for step parameter (#20607)
  * Fix: Disable draggable panels on small devices (#20629)
  * Chore: Remove several instances of non-strict null usage
    (#20563)
  * StatPanel: Rename singlestat2 to stat (#20651)
  * Panels: Add support for panels with no padding (#20012)
  * CloudWatch: Docs updates after feedback (#20643)
  * Explore: Update docs with updated images (#20633)
  * Build: Update latest.json (#20638)
  * Forms: Introduce form field (#20632)
  * docs: update versions (#20635)
  * Changelog: 6.4.5 (#20625)
  * Changelog: 6.5.0 (#20620)
  * Docs: 6.5 update (#20617)
  * Chore: Improve grafana-server profiling and tracing
    (#20593)
  * grafana/toolkit: Update FAQ (#20592)
  * Forms: Introduce new Switch component (#20470)
  * E2E: Adds tests for QueryVariable CRUD (#20448)
  * Toolkit: Do not continue after compile error (#20590)
  * BarGauge/Gauge: Add back missing title option field
    display options (#20616)
  * VizRepeater/BarGauge: Use common font dimensions across
    repeated visualisations (#19983)
  * Update services.md (#20604)
  * Docs: CloudWatch docs fixes (#20609)
  * Changelog: Add v6.3.7 (#20602)
  * Cloudwatch: Docs improvements (#20100)
  * Fix: Wrong path when sending package build time (#20595)
  * CloudWatch: Fix high CPU load (#20579)
  * Explore: UI changes for split view and live tailing
    (#20516)
  * Explore: Keep logQL filters when selecting labels in log
    row details (#20570)
  * Instrumentation: Edition and license info to usage stats
    (#20589)
  * Metrics: Add metric for each package build time (#20566)
  * grafana/toolkit: Smaller output after successful upload
    (#20580)
  * Table: Use the configured field formatter if it exists
    (#20584)
  * TextPanel: Fixes issue with template variable value not
    properly html escaped  (#20588)
  * Docs: Update Explore docs for 6.5 (time-sync button &amp; log
    details) (#20390)
  * Explore: UI changes for derived fields (#20557)
  * Docker: Custom dockerfiles, docker and image rendering
    docs update (#20492)
  * Tooltip: Fix issue with tooltip throwing an error when
    retrieving values (#20565)
  * Changelog: Reference a few more issues that were fixed
    (#20562)
  * Enable theme context mocking in tests (#20519)
  * Chore: Remove angular dependency from prometheus
    datasource (#20536)
  * Build: Verify checksums when downloading PhantomJS
    (#20558)
  * DevEnv: updates nodejs from 10.x to 12.x and golang to
    1.13 in ci-deploy dockerfile. (#20405)
  * Explore: updates responsive button to pass all the div
    element props
  * Explore: fixes explore responsive button ref
  * Explore: adds a ref to responsive button
  * Explore: updates responsive button to forward ref
  * Explore: UI fixes for log details (#20485)
  * Document required Go version in developer guide (#20546)
  *  UserTableView: Show user name in table view (#18108)
  * CloudWatch: enable min_interval (#20260)
  * CI: fix release script remove filtering (#20552)
  * Update dashboards (#20486)
  * CI: Build all platforms for Enterprise (#20389)
  * Alerting: Propagate failures to delete dashboard alerts
    (#20507)
  * Cloudwatch: Fix LaunchTime attribute tag bug (#20237)
  * Fix: Prevents crash when searchFilter is non string
    (#20526)
  * docs: what's new fixes (#20535)
  * What's new in 6.5 - adding CloudWatch topics (#20497)
  * grafana/ui: Expose Icon component (#20524)
  * Backend plugins: Log wrapper args formatting fix (#20521)
  * Build: Clean up scripts/grunt/options/phantomjs.js
    (#20503)
  * MySql: Fix tls auth settings in config page (#20501)
  * Backend plugins: Log wrapper args formatting (#20514)
  * CloudWatch: Remove HighResolution toggle since it's not
    being used (#20440)
  * API: Optionally list expired keys (#20468)
  * Image-rendering: Cleanup of rendering code (#20496)
  * Build: Reports times and outcomes from CircleCI jobs
    (#20474)
  * Chore: Upgrade prettier for grafana-toolkit (#20476)
  * TimePicker: Fixed update issue after plugin uses
    getLocationSrv().update (#20466)
  * Docs: Add explore images to What's new in v6.5 (#20442)
  * Chore: Bumps prettier version for new typescript syntax
    support (#20463)
  * handle PartialData status (#20459)
  * CloudWatch: Make sure period variable is being interpreted
    correctly (#20447)
  * Forms: New Input component (#20159)
  * UsersPage: Removed icon in external button (#20441)
  * Build: Fix RPM verification (#20460)
  * Dashboard Migrator: persist thresholds param if already
    set (#20458)
  * Docs: Fix developer guide link (#20434)
  * Fix package signing (#20451)
  * Build: Fix signing (#20450)
  * transform: changes to support sdk v0.2.0 (#20426)
  * Reporting: Handle timeouts in rendering (#20415)
  * Build: Upgrade build-container Docker image version
    (#20443)
  * Upgrade build-container image (#20438)
  * Provisioning: Fix unmarshaling nested jsonData values
    (#20399)
  * Fail when server is unable to bind port (#20409)
  * Devenv: Fix integration of postgres and fake-data-gen
    containers (#20329)
  * Util: Modify SplitHostPortDefault not to return an error
    for empty input (#20351)
  * InfluxDB: convert config editor to react (#20282)
  * Packages: stable release tags update (#20417)
  * Chore/Go-dep: change sdk to use new tag (#20422)
  * Chore: Log actual error when oauth pass thru fails
    (#20419)
  * Grafana/Loki: Adds support for new Loki endpoints and
    metrics (#20158)
  * Chore: Fix error caused by typescript upgrade (#20408)
  * Chore: Upgrade typescript to 3.7 (#20375)
  * NavLinks: Make ordering in navigation configurable
    (#20382)
  * Fix flot overriding onselectstart/ondrag events (#20381)
  * Docs: Updates docs for redux framework (#20377)
  * chore: fix 'testing' version is latest.json (#20398)
  * transform_plugin: stop plugin when grafana stops (#20397)
  * Chore: Update latest.json (#20393)
  * Docs: What's new in Grafana v6.5 Draft (#20368)
  * Update changelog for v6.5.0-beta1 (#20350)
  * Chore: Move and wrap Cascader component to @grafana/ui
    (#20246)
  * MySql: Fix password regression in MySQL datasource
    (#20376)
  * CloudWatch: Datasource improvements (#20268)
  * grafana/toolkit: remove aws-sdk and upload to grafana.com
    API endpoint (#20372)
  * LDAP: last org admin can login but wont be removed
    (#20326)
  * Devenv: Replace deprecated SQL Server docker image
    (#20352)
  * DataFrame processing: Require table rows to be array
    (#20357)
  * grafana/ui: Add Icon component (#20353)
  * Telegram: Check error before adding defer close of image
    (#20331)
  * ValueFormats: fix description for dateTimeAsUS (#20355)
  * Fix alert names in dev dashboard (#20306)
  * Docs: Getting started edits (#19915)
  * Bus: Remove unused wildcard handlers and clean up tests
    (#20327)
  * Explore: updates breakpoint used to collapse datasource
    picker
  * Elastic: Fix Elastic template variables interpolation when
    redirecting to Explore (#20314)
  * transform_plugin: pass encoded dataframes through (#20333)
  * Links: Updated links to grafana.com (#20320)
  * Avatar: Don't log failure to add existing item to cache
    (#19947)
  * Devenv: Enable tracing for loki docker block (#20309)
  * Build: adds make target run-frontend (#20227)
  * Devenv: fix kibana in elastic7 docker block (#20308)
  * Build: Fix Docker builds (#20312)
  * Devenv: Add nginx_proxy_mac/nginx_login_only.conf (#20310)
  * Build: Build Ubuntu based Docker images also for ARM
    (#20267)
  * Devenv: fix connection in elastic 5 and 6 blocks (#20304)
  * Prometheus: Adds hint support to dashboard and fixes
    prometheus link in query editor (#20275)
  * Explore: Fix always disabled QueryField for InfluxDB
    (#20299)
  * Docker blocks: Add loki blocks for loki releases (#20172)
  * Explore: Fix interpolation of error message (#20301)
  * PanelLinks: fixed issue with old panel links and grafana
    behind a subpath (#20298)
  *  ColorPicker: Fixes issue with ColorPicker disappearing
     too quickly (#20289)
  * Configuration: Update root_url to reflect the default
    value (#20278)
  * Templating: Made default template variable query editor
    field a text area with dynamic automatic height (#20288)
  * Transformations: filter results by refId (#20261)
  * PanelData: Support showing data and errors in angular
    panels (#20286)
  * Fix: URL Encode Groupd IDs for external team sync (#20280)
  * Build: Collect frontend build time metric (#20254)
  * Datasource: fixes prometheus metrics query query field
    definition (#20273)
  * Update version (#20271)
  * Admin: Adds setting to disable creating initial admin user
    (#19505)
  * Tests: We should not click on default button when there is
    only one ds (#20266)
  * AuthProxy:  additions to ttl config change (#20249)
  * Graphite: add metrictank meta in response (#20138)
  * Docker: Add dependencies to support oracle plugin in
    alpine (#20214)
  * ReactMigration: Migrate Prometheus config page to React
    (#20248)
  * Templating: highlight first item when searching a variable
    dropdown (#20264)
  * e2eTests: Adds cleanup of created datasource and dashboard
    (#20244)
  * Gauge Panel: fix the default value of thresholds cannot be
    modified  (#20190)
  * AuthProxy: Can now login with auth proxy and get a login
    token (#20175)
  * DataFrame: move labels to field (#19926)
  * Add Dockerfiles for Ubuntu (#20196)
  * Graph: Fixed no graph in panel edit mode (#20247)
  * Explore: Configure explore series colours via field config
    (#20239)
  * LDAP: Fixing sync issues (#19446)
  * Docs: Added alias for old reporting page location (#20238)
  * ReactPanels: Adds Explore menu item (#20236)
  * Elasticsearch: Support rendering in logs panel (#20229)
  * Alerting: Add alert_state to the kafka message Fixes
    #11401 (#20099)
  * Graph: introduce Tooltip to React graph  (#20046)
  * @grafana/runtime: Expose datasourceRequest in backendSrv
  * Auth Proxy: replace ini setting ldap_sync_ttl with
    sync_ttl (#20191)
  * DevEnv: updates prometheus random data golang image to
    1.13.0
  * Provisioning: fix for cannot save provisioned dashboard
    (#20218)
  * DisplayProcessor: improve time field support (#20223)
  * Docs: Adding how to use plugin version, through docker env
    variable (#19924)
  * Docs: Add docs abooout time range URL query params
    (#20215)
  * MixedQuery: refactor so other components could also batch
    queries (#20219)
  * SharedQuery: don't explode when missing logo (#20187)
  * LDAP: Interpolate env variable expressions in ldap.toml
    file (#20173)
  * Chore: Update latest.json (#20216)
  * build: Ignore Azure test snapshot for msi build (long file
    name) (#20217)
  * Explore: fixes toolbars datasource selector and date
    picker responsiveness (#19718)
  * Logs Panel: Generate valid logQL for multi-select template
    variable  (#20200)
  * Fix when only icon is present (#20208)
  * TablePanel: Prevents crash when data contains mixed data
    formats (#20202)
  * OAuth: Make the login button display name of custom OAuth
    provider (#20209)
  * Explore: Add custom DataLinks on datasource level for Loki
    (#20060)
  * QueryField: Prevent query runs on blur in Explore (#20180)
  * Azure Monitor: Datasource Config Type (#20183)
  * PluginLoader: export classes on @grafana/ui (#20188)
  * Changelog: 6.4.4 release (#20201)
  * CLI: Reduce memory usage for plugin installation (#19639)
  * DataLinks: fix syntax highlighting not being applied on
    first render (#20199)
  * SafeDynamicImport: Updates so that it does not act as an
    ErrorBoundary (#20170)
  * grafana/data: Make display processor work with time fields
    (#20174)
  * update triggers to use new deployment_tools location
    (#20194)
  * mysql: fix encoding in connection string (#20192)
  * pkg/util: Replace custom pbkdf2 implementation by
    maintained version (#19941)
  * Datasource/Elasticsearch: Fix logs which were displayed
    with incorrect timestamp in Explore logs tab (#20009)
  * Error Handling: support errors and data in a response
    (#20169)
  * OAuth: Generic OAuth role mapping support (#17149)
  * sdk: update to latest (#20182)
  * Docs: Add introduction to time series (#20068)
  * Docs: Simplify headings and make active (#20163)
  * Docs: Add 'the' to license reference in README (#20167)
  * LDAP: All LDAP servers should be tried even if one of them
    returns a connection error (#20077)
  * Dashboards: add panel inspector (#20052)
  * Docker: Reduce layers in build container and modified
    initialization of PATH env in final container (#20132)
  * Docs: Display panels alphabetically (#20130)
  * Docs: Updates getting_started.md for spelling mistake
    'configuered' to 'configured' (#20027)
  * fix: modifying AWS Kafka dimension names to correct ones
    (#19986)
  * Templating: Makes so __searchFilter can be used as part of
    regular expression (#20103)
  * Dashboard Editor: use chevron icon rather than &amp;gt;
    (#19588)
  * Docs: update datasources that support alerting (#20066)
  * Units: Add milli/microSievert, milli/microSievert/h and
    pixels (#20144)
  * Toolkit: copy full directory structure for img,libs,static
    (#20145)
  * Heatmap: Insert div to fix layout (#20056)
  * Build: adds the pkg/errors dependency that was missing
    from go.mod (#20143)
  * Explore: Memory leak fix due to dedup selector (#20107)
  * DataLinks: Fix access to labels when using Prometheus
    instant queries (#20113)
  * PluginLoader: fix imports for react-redux (#19780)
  * LDAP Debug: No longer shows incorrectly matching groups
    based on role (#20018)
  * Licensing service (#19903)
  * Explore: Add titles to query row action buttons (#20128)
  * Graph: Added series override option to have hidden series
    be persisted (#20124)
  * grafana/ui: Drawer component (#20078)
  * Depedency: Bump crewjam/saml to the latest master (#20126)
  * grafana/ui: fix button icon styles (#20084)
  * Explore: UI change for log row details  (#20034)
  * api/dashboard: fix panic on UI save (#20137)
  * grafana/toolkit: Fixup save artifacts in a zip id in the
    folder (#20071) (#20139)
  * Docs: Fix InfluxDB Typos (#20004)
  * Docs: Data Sources subsection naming (#20127)
  * Docs: Update basic_concepts.md (#20102)
  * GEL: include the expression count in the request (#20114)
  * GEL: wrap arrow utils in async load (#20134)
  * grafana/toolkit: save artifacts in a zip id in the folder
    (#20123)
  * remove editor keys and null coalescing (#20115)
  * Emails: Update notification templates (#19662)
  * Docs: Ordering and formatting of datasources in docs
    (#19485)
  * Docs: Improve remote image renderer documentation (#20031)
  * Add devenv block for apache proxy working for Mac (#20119)
  * Allow saving of provisioned dashboards (#19820)
  * Update Azure AD instructions in generic-oauth.md (#20091)
  * Docs: Fixed a broken link to LogQL in the docs (#20106)
  * Explore: Fix deferred rendering of logs (#20110)
  * Templating: Adds typings to Variables (#20117)
  * Chore: Reorg packages (#20111)
  * Chore: Moves QueryField to @grafana/ui (#19678)
  * Docs: Consolidate backend guidelines (#19823)
  * transform: add expressions to query editor (w/ feature
    flag) (#20072)
  * DataSource: don't filter hidden queries automatically
    (#20088)
  * Docker: makes it possible to parse timezones in the docker
    image (#20081)
  * Plugins: Transform plugin support (#20036)
  * Add data link from panel to cloudwatch console (#20061)
  * DataLinks: Fix blur issues (#19883)
  * Explore: Remove datasource testing on selector (#19910)
  * Grafana/ui: Refactor button and add default type = button
    (#20042)
  * Add some typings for react events (#20038)
  * PanelQuerRunnerrremove logging (#20073)
  * Enable errcheck for golangci-lint (#19976)
  * DataLinks: Implement javascript callback (#19851)
  * Chore: correct typo in word Fahrenheit (#20040)
  * ReactMigration: Migrate Loki and Elastic config pages to
    React (#19979)
  * api: new v2 metrics query endpoint
  * Forms: Introduce new Primary, Secondary and Destructive
    buttons (#19973)
  * grafana/ui: Fix modal component (#19987)
  * WIP: Spawn backend plugins v2 (#19835)
  * build: Fix building of Enterprise Docker images (#19992)
  * Docker: Build and use musl-based binaries in alpine images
    to resolve glibc incompatibility issues (#19798)
  * PluginPage: replace plugin absolute url with relative
    (#19956)
  * Add info about static files (#19965)
  * Explore: Change loading state to done after live-tailing
    stops (#19955)
  * pkg/util: Check errors (#19832)
  * Core: Show browser not supported notification (#19904)
  * grafana/toolkit: Support js plugins (#19952)
  * Forms: Introduce typographic form elements (#19879)
  * SingleStat: apply mappings to no data response (#19951)
  * Docs: Clean up contribute docs (#19716)
  * pkg/models: Check errors (#19839)
  * pkg/setting: Check errors (#19838)
  * pkg/tsdb: Check errors (#19837)
  * Docs: Document Makefile (#19720)
  * Explore: Add functionality to show/hide query row results
    (#19794)
  * pkg/services: Check errors (#19712)
  * API: Fix logging of dynamic listening port (#19644)
  * Cloudwatch: Make it clear that role switching is not
    supported  (#19706)
  * Update Apache configuration to work with MPMs as shared
    modules (#19900)
  * Cloudwatch: Lowercase Redshift Dimension entry for service
    class and stage (#19897)
  * Units: Added mega ampere and watt-hour per kg Units
    (#19922)
  * Clarify use of custom.ini on deb/rpm platforms (#19939)
  * Update ISSUE_TRIAGE.md (#19942)
  * docs: improved setup instructions for reporting (#19935)
  * grafana/ui: Enable mdx imports in stories (#19937)
  * Refactor: Suggestion plugin for slate (#19825)
  * grafana/ui: Enable storybook docs (#19930)
  * Fix: Correct color on TagItems (#19933)
  * Dependencies: Update yarn.lock (#19927)
  * Chore: Updates yarn.lock (#19919)
  * pkg/plugins: Only warn if plugins fail to load. Fixes
    #19846 (#19859)
  * Chore: Bump storybook to 5.2.4 (#19895)
  * QueryEditor: move QueryEditorRows to its own component
    (#19756)
  * ReactMigration: Migrate DataSource HTTP Settings to React
    (#19452)
  * TemplateVariables: Introduces $__searchFilter to Query
    Variables (#19858)
  * Forms: Introduce new spacing variables to GrafanaTheme
    (#19875)
  * Forms: Introduce new color variables to GrafanaTheme
    (#19874)
  * Chore: Bump Angularjs 1.6.6 -&gt; 1.6.9 (#19849)
  * Update documentation.md
  * Edited Contribute docs
  * devenv: have bra watch attempt graceful shutdown (#19857)
  * Release: Update latest (#19866)
  * DataFrame: guess number field when on NaN (#19833)
  * Loki: Remove param (#19854)
  * InputDataSource: Fixed issue with config editor (#19818)
  * Fix: Unsubscribe from events in dashboards (#19788)
  * Explore: Add unit test to TimeSyncButton (#19836)
  * build: update scripts go.(mod|sum) (#19834)
  * Loki: Return empty result if no valid targets (#19830)
  * DataLinks: Fix url field not releasing focus (#19804)
  * Alerting: All notification channels should always send
    (#19807)
  * @grafana/toolkit: Check if git user.name config is set
    (#19821)
  * pkg/middleware: Check errors (#19749)
  * Fix: clicking outside of some query editors required 2
    clicks (#19822)
  * pkg/cmd: Check errors (#19700)
  * grafana/toolkit: Add font file loader (#19781)
  * Select: Allow custom value for selects (#19775)
  * Docs: Add database architecture docs (#19800)
  * Call next in azure editor (#19799)
  * grafana/toolkit: Use http rather than ssh for git checkout
    (#19754)
  * DataLinks: Fix context menu not showing in singlestat-ish
    visualisations (#19809)
  * Elasticsearch: Adds support for region annotations
    (#17602)
  * Docs: Add additional capitalization rules (#19805)
  * Docs: Add additional word usage rule (#19812)
  * Update aws-sdk-go (#19138)
  * Dashboard: Allows the d-solo route to be used without slug
    (#19640)
  * pkg/bus: Check errors (#19748)
  * Panels: Fixes default tab for visualizations without
    Queries Tab (#19803)
  * Chore: Refactor grafana-server (#19796)
  * Add missing info about stylesFactory
  * Types: Adds type safety to appEvents (#19418)
  * Docs: Split up Sharing topic (#19680)
  * Update README.md (#19457)
  * Docs: Link to architecture docs from Developer guide
    (#19778)
  * toolkit linter line number off by one (#19782)
  * pkg/plugins: Check errors (#19715)
  * Explore: updates live button to responsive button
  * Explore: fixes live button margin
  * Explore: fixes a responsive fold of live tailing button
  * updated live tailing text
  * updated live tail button - responsive fold
  * updated toolbar - added media query for tail buttons
  * Docs: Add docs on services (#19741)
  * fix: export Bus on search service (#19773)
  * Chore: Refactor GoConvey into stdlib for search service
    (#19765)
  * Quick typo fix (#19759)
  * Docs: Fixes go get command in developer guide (#19766)
  * Datasource: Add custom headers on alerting queries
    (#19508)
  * Docs: Add API style/casing rule (#19627)
  * Explore: updates clear all button to responsive button
    (#19719)
  * pkg/infra: Check errors (#19705)
  * Docs: Update Prometheus Custom Query Parameters docs.
    (#19524)
  * Docs: Fix playlist layout issues (#19739)
  * Docs: Update instructions and flows in Playlist.md
    (#19590)
  * pkg/components: Check errors (#19703)
  * UX: Fix empty space in select (#19713)
  * pkg/login: Check errors (#19714)
  * enforce GO111MODULE=on when running make run (#19724)
  * Docs: Add Troubleshooting section to Developer guide
    (#19721)
  * Update README.md (#19551)
  * Singlestat: Fixed issue with mapping null to text (#19689)
  * Don't truncate IPv6 addresses (#19573)
  * Tests: Fix runRequest test (#19711)
  * Docs: Update pkg\README.md (#19615)
  * Feature: Adds connectWithCleanup HOC (#19629)
  * Docs: Add 'repository' case, and 'open source' to style
    guide
  * React group by segment poc (#19436)
  * Graph: make ContextMenu potitioning aware of the viewport
    width (#19699)
  * pkg/api: Check errors (#19657)
  * Explore: Synchronise time ranges in split mode (#19274)
  * build: use vendored packages for circle backend tests
    (#19708)
  * Docs: Add correct casing for API and ID to style guide
    (#19625)
  * API: added dashboardId and slug in response after import
    (#19692)
  * Docs: Simplify README (#19702)
  * Docs: Move dev guide from README (#19707)
  * Explore: Expand template variables when redirecting from
    dashboard panel (#19582)
  * Alerting: Fix dates stored in local time when pausing
    alerts (#19525)
  * Explore/UI: Removes unnecessary grafana-info-box wrapper
    around InfluxCheatSheet (#19701)
  * Docs: Updating to 6.4.0 (#19698)
  * Chore: Fixes lines that exceeded 150 chars (#19694)
  * Chore: Updates latest.json for 6.4.2 (#19697)
  * Chore: Updates Changelog for 6.4.2 (#19696)
  * Docs: Update folder.md (#19674)
  * build: use vendor folder for building (#19677)
  * Table: Proper handling of json data with dataframes
    (#19596)
  * SharedQuery: Fixed issue when using rows (#19610)
  * SingleStat: Fixes $__name postfix/prefix usage (#19687)
  * Chore: Upgrade Docker images to Go 1.13.1 (#19576)
  * Grafana Image Renderer: Fixes plugin page (#19664)
  * Units: consistent Meter spelling and abbreviations
    (#19648)
  * CloudWatch: Changes incorrect dimension wmlid to wlmid
    (#19679)
  * Loki: Fix lookup for label key token (#19579)
  * Documentation: Fix time range controls formatting (#19589)
  * Docs: Add additional style rules (#19634)
  * De-duplicate `lint-go` step (#19675)
  * Docs: Update keyboard shortcuts formatting (#19637)
  * AzureMonitor: Alerting for Azure Application Insights
    (#19381)
  * ci-build: Improve build-deploy script (#19653)
  * Rename live option in queries (#19658)
  * Docs: Update README.md (#19456)
  * Docs: Update typos, make docs more consistent. (#19633)
  * Docs: Fix operating system names (#19638)
  * Docs: Move issue triage docs to contribute (#19652)
  * DataFormats: When transforming TableModel -&gt; DataFrame -&gt;
    Table preserve the type attribute (#19621)
  * Graph: Updated auto decimals logic and test dashboard
    (#19618)
  * Graph: Switching to series mode should re-render graph
    (#19623)
  * Revert 'Feature: Adds connectWithCleanup HOC (#19392)'
    (#19628)
  * Feature: Adds connectWithCleanup HOC (#19392)
  * Panels: Progress on new singlestat / BigValue (#19374)
  * Units: fixed wrong id for Terabits/sec (#19611)
  * Docs: General improvements to docs, and a fix in oauth
    (#19587)
  * Docs: Replace ampersands with and (#19609)
  * Profile: Fix issue with user profile not showing more than
    sessions some times (#19578)
  * Azure Monitor : Query more than 10 dimensions ( Fixes
    #17230 ) (#18693)
  * Login: Show SAML login button if SAML is enabled (#19591)
  * UI: Adds Modal component (#19369)
  * Prometheus: Fixes so results in Panel always are sorted by
    query order (#19597)
  * Docs: Improve guides for contributing (#19575)
  * Migration: Migrates Admin settings from angular to react
    (#19594)
  * Chore: Converts HelpModal from angular to react (#19474)
  * Fix typo (#19571)
  * Chore: Upgrade to Go 1.13 (#19502)
  * Explore: Move data source loader into the select (#19465)
  * Release: Fix issue with tag script on osx (#19557)
  * Release: Update latest (#19559)
  * Docs: Updates about Loki annotations (#19537)
  * Theme: follow-up fix for snapshot
  * UI: Centers the filter tags in input field (#19546)
  * Update README.md (#19515)
  * Docs: Updated changelog (#19558)
  * Theme: fix theme issue
  * Provisioning: Handle empty nested keys on YAML
    provisioning datasources (#19547)
  * Docs: updates to what's new in 6.4 (#19539)
  * Loki: remove live option for logs panel (#19533)
  * Chore: Updates to 6.4.0 stable (#19528)
  * CloudWatch: Add ap-east-1 to hard-coded region lists
    (#19523)
  * ChangeLog: Release 6.4.0 Stable (#19526)
  * Docs: Add notice about plugins that need updating (#19519)
  * Panels: Skip re-rendering panel/visualisation in loading
    state   (#19518)
  * Docs: LDAP Debug View documentation (#19513)
  * Docs: reports feature (#19472)
  * SeriesOverrides: Fixed issue with color picker
  * Build: Fix building when $LDFLAGS is set (#19509)
  * API: Add `createdAt` and `updatedAt` to api/users/lookup
    (#19496)
  * Fix logs panel image path
  * Logs: Publish logs panel (#19504)
  * Explore: Update broken link to logql docs (#19510)
  * Chore: Remove console.log (#19412)
  * Refactor: Split LogRow component (#19471)
  * Build: Upgrade go to 1.12.10 (#19499)
  * CLI: Fix version selection for plugin install (#19498)
  * Upgrade grafana-plugin-model (#19438)
  * grafana-ui: Moves slate types from devDependencies to
    dependencies (#19470)
  * Docs: Improve guide descriptions on docs start page #19109
    (#19479)
  * Explore: Generate log row uid (#18994)
  * Editor: Brings up suggestions menu after clicking
    suggestion (#19359)
  * Docs: Add Live tail section in Explore (#19321)
  * Docs: Add guide for developing on macOS (#19464)
  * API: Add createdAt field to /api/users/:id (#19475)
  * Docs: Updated heading to sentence case (#19450)
  * grafana/toolkit: Remove hack to expose plugin/e2e exports
    &amp; types (#19467)
  * Testdata: Rename package to circumvent convention in go
    (#19409)
  * Docs: Update package's manual release guide (#19469)
  * Users: revert LDAP admin user page (#19463)
  * Explore: Take root_url setting into account when
    redirecting from dashboard to explore (#19447)
  * Refactor: RefreshPicker export things as statics on class
    (#19443)
  * grafana/ui: Fix value time zone names to be capitalized
    (#19417)
  * Release: Make sure packages are released from clean git
    state (#19402)
  * Docs: Add styling.md with guide to Emotion at Grafana
    (#19411)
  * Docs: Update SECURITY.md (#19385)
  * Debt: Simplifies actionCreatorFactory (#19433)
  * Update PLUGIN_DEV.md (#19387)
  * Release: Create cherrypick task work for enterprise repo
    (#19424)
  * Theme: Generate colors SASS
  * DisplayFormat: use toLocaleString for infinity
  * Docs: Update Loki docs with new syntax and features
    (#19370)
  * UI: Add orangeDark color to theme (#19407)
  * grafana/toolkit: Improve contribution readme (#19400)
  * Docs: Remove hard wrap (#19413)
  * Tests: Adds throwUnhandledRejections to jest setup
    (#19398)
  * DataLinks: suggestions menu improvements (#19396)
  * Dev: Sets `preserveSymlinks` to `false` in top-level
    tsconfig (#19395)
  * Build: fixed signing script issue with circle-ci (#19397)
  * Docs: Update readme with info about ongoing migration
    (#19362)
  * PanelData: Adds timeRange prop to PanelData  (#19361)
  * Docs: Update Playlist.md (#19382)
  * Update documentation-style-guide.md (#19389)
  * Build: Fix correct sort order of merged pr's in cherrypick
    task (#19379)
  * dependencies: Update yarn.lock (#19377)
  * ValueFormats: check for inf (#19376)
  * Update UPGRADING_DEPENDENCIES.md (#19386)
  * Update ROADMAP.md (#19384)
  * Update SUPPORT.md (#19383)
  * Update ISSUE_TRIAGE.md (#19280)
  * Update datasource_permissions.md (#19336)
  * MySQL: Limit datasource error details returned from the
    backend (#19373)
  * MySQL, Postgres: Update raw sql when query builder updates
    (#19209)
  * MySQL, Postgres, MSSQL: Fix validating query with template
    variables in alert  (#19237)
  * Explore: Do not send explicit maxDataPoints for logs.
    (#19235)
  * grafana/ui: Add Timezone picker (#19364)
  * Heatmap: use DataFrame rather than LegacyResponseData
    (#19026)
  * Explore: Refactor mode selection (#19356)
  * Dashboard: Fix export for sharing when panels use default
    data source (#19315)
  * Azure Monitor: Revert support for cross resource queries
    (#19115)' (#19346)
  * grafana/ui: Add electrical units mAh and kAh (#19314)
  * grafana/ui: Add Indian Rupee (INR) to currencies (#19201)
  * Chore: Bump typescript to version 3.6.3 (#19308)
  * Explore: Refactor live tail controls (#19328)
  * Docs: Documentation for return-to-dashboard feature
    (#19198)
  * Select: Set placeholder color (#19309)
  * Keybindings: Improve esc / exit / blur logic (#19320)
  * Plugins: Skips existence of module.js for renderer plugins
    (#19318)
  * Explore: Fix unsubscribing from Loki websocket (#19263)
  * Release: update latest.json (#19312)
  * Docs: Uppercase HTTP acronyms (#19317)
  * Multi-LDAP: Do not fail-fast on invalid credentials
    (#19261)
  * DataLinks: Small UX improvements to DataLinksInput
    (#19313)
  * Alerting: Prevents creating alerts from unsupported
    queries (#19250)
  * Chore: Update Slate to 0.47.8 (#19197)
  * Chore: Upgrades react-redux to version 7.1.1 (#19272)
  * Docs: Update documentation-style-guide.md (#19292)
  * Admin/user: fix textarea postion in 'Pending Invites' to
    avoid page scrolling (#19288)
  * Changelog update for 6.3.6
  * Revert 'Changelog update for 6.3.6'
  * Changelog update for 6.3.6
  * Build: Split up task in the CI pipeline to ease running
    outside circleci (#18861)
  * Build: Scanning grafana master docker image with trivy in
    ci (#19195)
  * Dashboard: Hides alpha icon for visualization that is not
    in alpha/beta stage #19300
  * Update changelog task to generate toolkit changelog too
    (#19262)
  * QueryEditor: Clean-up interface to only have one PanelData
    (#19249)
  * Docs: Add style rule for Git (#19277)
  * Docs: Update CONTRIBUTING.md (#19273)
  * Docs: Add glossary (#19148)
  * Docs: Add style guide for docs (#19190)
  * Vector: remove toJSON() from interface (#19254)
  * MySQL, Postgres, MSSQL: Only debug log when in development
    (#19239)
  * Graphite: Changed range expansion from 1m to 1s (#19246)
  * AlertBox: Merged Alertbox into Alert (#19212)
  * Explore: live tail UI fixes and improvements (#19187)
  * Docs: Update theming docs (#19248)
  * grafana/toolkit: Fix toolkit not building @grafana/toolkit
    (#19253)
  * CloudWatch: ContainerInsights metrics support (#18971)
  * Alerting: Truncate PagerDuty summary when greater than
    1024 characters (#18730)
  * grafana/toolkit: Add plugin scaffolding (#19207)
  * Snapshots: store DataFrameDTO instead of MutableDataFrame
    in snapshot data (#19247)
  * Revert 'Graphite: Changed range expansion from 1m to 1s,
    #11472'
  * Graphite: Changed range expansion from 1m to 1s, #11472
  * Fix docs issues (#19240)
  * Docs: Minor edits to the README and several md files
    (#19238)
  * LDAP: Show non-matched groups returned from LDAP (#19208)
  * plugins: expose whole rxjs to plugins (#19226)
  * SQL: Rewrite statistics query (#19178)
  * CI: Update frontend ci metrics for strict null checks
  * grafana/ui: Add disabled prop on LinkButton (#19192)
  * Cloudwatch: Fix autocomplete for Gamelift dimensions
    (#19145) (#19146)
  * Backend: Remove redundant condition of `ROLE_VIEWER`
    (#19211)
  * FieldDisplay: Update title variable syntax (#19217)
  * Docs: Note when using For and No Data in alert rule
    (#19185)
  * Docker: Upgrade packages to resolve reported
    vulnerabilities (#19188)
  * MSSQL: Revert usage of new connectionstring format
    (#19203)
  * Prometheus: datasource config with custom parameters
    string (#19121)
  * Contributing: Add guidelines for contributing docs
    (#19108)
  * LDAP debug page: deduplicate errors (#19168)
  * Menu: fix menu button in the mobile view (#19191)
  * Dashboard: Fixes back button styles in kiosk mode (#19165)
  * API: adds redirect helper to simplify http redirects
    (#19180)
  * docs: image rendering (#19183)
  * Chore: Update latest.json (#19177)
  * Chore: Update version to next (#19169)
  * Docs: What's new in 6.4 update (#19175)
  * Devenv: create slow_proxy_mac (#19174)
  * Chore: Changelog for v6.4.0-beta1 (#19171)
  * Revert 'Chore: Update Slate to 0.47.8 (#18412)' (#19167)
  * Chore: Update Slate to 0.47.8 (#18412)
  * Changelog: Breaking changes and deprecation notes for v6.4
    (#19164)
  * Docs: What's new 6.4 draft (#19144)
  * Docs: Add docs around feature toggles config (#19162)
  * Azure Monitor: Add support for cross resource queries
    (#19115)
  * Api: Readonly datasources should not be created via the
    API (#19006)
  * Explore: Update live tail buttons (#19143)
  * LDAP: only show tab if LDAP is enabled (#19156)
  * TimePicker: Fixes onBlur issue with FireFox on MacOS
    (#19154)
  * Feature: Encapsulated dynamic imports with error boundary
    and suspense (#19128)
  * Metrics: Adds setting for turning off total stats metrics
    (#19142)
  * Add directions for more details provided when not anymore
    on issue triage (#19116)
  * grafana/data: Reorganise code (#19136)
  * Login: fix Footer to be visible (#19147)
  * Chore: fix prettier error after github suggestions commit
    (#19150)
  * Alerts: show a warning/error if transformations are
    configured (#19027)
  * Explore: No logs should show an empty graph (#19132)
  * Ldap: Add LDAP debug page (#18759)
  * Elasticsearch: allow templating queries to order by
    doc_count (#18870)
  * Chore: cross-package security bumps (#19131)
  * Close the connection only if we establish it. (#18897)
  * Fix: Fixes crash using back button with zoomed graph
    (#19122)
  * Routing: Update routing to require sign in on every route
    (#19118)
  * Graph: constant series as override (#19102)
  * Login: fix login page failing when navigating from reset
    password views (#19124)
  * DataFrame: Fixes to dealing with empty results (#19119)
  * Explore: calculate intervals when building data source
    request (#19107)
  * Graph: Adds onHorizontalRegionSelected (#19083)
  * Loki: Updated cheat sheet with new filter syntax (#18947)
  * grafana/toolkit: Find module files correctly and add basic
    error tracing (#19089)
  * Templating: Clicking Selected should deselect all if 1 or
    more are already selected (#19104)
  * NotificationChannels: Add delete button to edit page
    (#19103)
  * Dashboard: Fix arrow positioning in button while in panel
    edit mode (#19084)
  * Update _index.md (#19045)
  * CLI: Fix installing plugins on windows (#19061)
  * LDAP: Allow an user to be synchronised against LDAP
    (#18976)
  * Docs: Adds a requirements page (#18917)
  * DataLinks: enable access to labels &amp; field names (#18918)
  * Singlestat: fix format messes up on negative values if
    select duratio… (#19044)
  * Explore: Move throttling before processing (#19095)
  * Prometheus: Fix response states (#19092)
  * Explore: Fix how log bars in graph are stacking (#19015)
  * Explore: Add throttling when doing live queries (#19085)
  * Stackdriver: Add extra alignment period options (#18909)
  * QueryProcessing: Added missing error event for angular
    editors (#19059)
  * Explore: Fixes issue with lastResult being null (#19081)
  * GraphPanel: don't listen to legacy onDataReceived events
    (#19054)
  * QueryProcessing: Fixes showing last result in initial
    loading state  (#19057)
  * toolkit: fix master build, avoid null check (#19055)
  * Auth: Allow inviting existing users when login form is
    disabled (#19048)
  * MSSQL: Fix memory leak when debug enabled (#19049)
  * Update CONTRIBUTING.md (#19051)
  * Update README.md (#19047)
  * toolkit: pipe execa output to console.stdout (#19052)
  * QueryProcessing: Observable query interface and RxJS for
    query &amp; stream processing   (#18899)
  * Fix exit live mode icon: change back to Stop. (#19043)
  * Loki: Fix vertical alignment issue in label selector
    (#18943)
  * Fix: Align buttons and label in ToggleButtonGroup (#19036)
  * toolkit: run make for backend plugins (#19029)
  * Explore: Fix auto completion on label values for Loki
    (#18988)
  * TimeSeries: Replace fieldName with fieldIndex  (#19030)
  * DataLinksInput - change the way enter key is handled
    (#18985)
  * TimeSeries: Add data frame index and field name (#19005)
  * Packages: update versioning and release process (#18195)
  * API: Add `updatedAt` to api/users/:id (#19004)
  * PageContent: fix logic in Page.Contents (#19002)
  * Calcs: Fixed calc reducer (#18998)
  * AlphaNotice: replaced big popover tooltip with native
    tooltip (#18997)
  * grafana/ui: Add Time of day picker (#18894)
  * QueryOptions: update maxDataPoints text and show any value
    that is configured (#18761)
  * Piechart: fix unit selector when scrolling is required
    (#18932)
  * Refactor: Move sql_engine to sub package of tsdb (#18991)
  * Refactor: move ScopedVars to grafana/data (#18992)
  * Units: Adding T,P,E,Z,and Y bytes (#18706)
  * Image rendering: Add deprecation warning when PhantomJS is
    used for rendering images (#18933)
  * Singlestat: render lines on the panel when sparklines are
    enabled (#18984)
  * Explore: Unify background color for fresh logs (#18973)
  * Annotations: Add annotations support to Loki (#18949)
  * TimeSeries: datasources with labels should export tags
    (not labels) (#18977)
  * Explore: UX/UI improvements for pausing and resuming of
    live tailing (#18931)
  * Annotations: Fix query editor rendering on datasource
    change (#18945)
  * Bump lodash-es from 4.17.11 to 4.17.15 (#18963)
  * Bump fstream from 1.0.11 to 1.0.12 (#18962)
  * Bump mixin-deep from 1.3.1 to 1.3.2 (#18960)
  * Bump lodash.template from 4.4.0 to 4.5.0 (#18961)
  * Alerting: fix response popover prompt when add
    notification channels (#18967)
  * Build: Fix potential case-insensitive import collision for
    github.com/Unknwon/com (#18915)
  * MixedDataSource: refactor, cleanup, and add tests (#18948)
  * Bump lodash.mergewith from 4.6.1 to 4.6.2 (#18959)
  * Units: Add electrical charge - ampere-hour unit
  * Transformers: configure result transformations after
    query(alpha) (#18740)
  * grafana/toolkit: Add default mock for stylesheet imports
    for Jest (#18955)
  * grafana/toolkit: Improve readme (#18747)
  * Docs: Add PR review practices link (#18937)
  * Build: Allow extending of LDFLAGS in build.go (#18954)
  * Build: Support SOURCE_DATE_EPOCH for reproducible builds
    (#18953)
  * LDAP: Fetch teams in debug view (#18951)
  * Dashboard: Fixes dashboard overwriting behavior (#18944)
  * Grafana: Create new playlist/dashboard/channel card is not
    visible when there are no items in the list (#18890)
  * Storybook: fix type error (#18934)
  * Sass: changed color in gradient in template files to lower
    case (#18921)
  * Notification is sent when state changes from no_data to ok
    (#18920)
  * SASS: Add pointer events none to  .disabled class (#18919)
  * Explore: Adds ability to save a panel's query from Explore
    (#17982)
  * Loki: support loki with streaming in dashboards (#18709)
  * UserProfile: convert user organizations section to react
    (#18707)
  * Annotations: Check that timeEnd if defined before
    comparing to avoid false truthiness (#18903)
  * Sass: Align generated file with tmpl (#18896)
  * LDAP: Add API endpoint to query the LDAP server(s) status
    (#18868)
  * Add South African Rand (ZAR) to currencies (#18893)
  * Annotations: check if the name exists before creating a
    new annotation (#18880)
  * ErrorHandling: Error boundary for every container (#18845)
  * Precommit: Fixed precommit task issue (#18883)
  * Docs: Quick typo fix in readme (#18874)
  * CI: no longer using grafana-master... package. (#18884)
  * Styles: fixed gradient in logo so it doesn't go outside
    the logo and get a defined start and end color, changed
    brand gradient to be the same as in logo, created new
    variable for vertical gradient (#18882)
  * Webpack: Fix accidental double typechecking (#18881)
  * Explore: elastic small fixes (#18879)
  * Explore: Add typings for queryTransaction.request (#18847)
  * LDAP: Add API endpoint to debug user mapping from LDAP
    (#18833)
  * PanelQueryState: restore comment
  * grafana/toolkit: fix common webpack config (#18862)
  * Explore: Use DataFrame to derive graph/table/logs (#18859)
  * Updated is time series test
  * Fixed unit test
  * alerting: add lock on job to prevent a race condition
    (#18218)
  * Reworked ResultProcessor tests
  * Explore: everything seems to be working again
  * WIP: Use data frames in explore
  * Explore: Allow pausing and resuming of live tailing
    (#18836)
  * CI: stop deployment to s3 (#18831)
  * Performance/Webpack: Introduces more aggressive
    code-splitting and other perf improvements (#18544)
  * Explore: Introduces PanelData to ExploreItemState (#18804)
  * Core: Adding DashboardPicker component (#18811)
  * Git: Precomit hook slimmed down
  * DataSourceSettings: Fixed issue changing data source name,
    fixes #18660 (#18826)
  * Prometheus: Fixed Prometheus query editor error (plus new
    ErrorBoundaryAlert component) (#18838)
  * Explore: Style panel containers (#18834)
  * Snapshot: Fix http api (#18830)
  * Open new window when exploring panel metrics (#18802)
  * Release: update latest.json
  * Docs: Update changelog with v6.3.5 issues (#18827)
  * Build: Update ua-parser/uap-go (#18788)
  * Build: Use the latest build container which has go 1.12.9
    (#18807)
  * DataFrame:  split DataFrameHelper into MutableDataFrame
    and FieldCache (#18795)
  * MixedDatasource: don't filter hidden queries before
    sending to datasources (#18814)
  * Enterprise: add dependencies for upcoming features
    (#18793)
  * Editor: Fixes issue where only entire lines were being
    copied (#18806)
  * Explore: Fixed query status issue (#18791)
  * DashboardMigrator: Fixed issue migrating incomplete panel
    link models (#18786)
  * Explore: Fixes query hint issues (#18803)
  * Build: Optional skipping of typescript checking in dev
    bundler (#18772)
  * Docs: Improve API tutorial intro content and readability
    (#18762)
  * Panels: Destroy panel model when recreating repeated
    panels (#18799)
  * Singlestat: Various fixes to singlestat and DataFrame
    (#18783)
  * Explore: Fixed issue in PanelQuery state arround
    cancellation (#18771)
  * Going to Explore from a panel with mixed data sources now
    works (#18784)
  * Changelog update (#18780)
  * Explore: Add memoization and remove unused props (#18775)
  * Prometheus: Changes brace-insertion behavior to be less
    annoying (#18698)
  * Datasource: Support min time interval input in ms (#18719)
  * Explore: Use PanelQueryState to handle querying (#18694)
  * Chore: Improve err message for notifications (#18757)
  * @grafana/toolkit: add package versions to the ci report
    (#18751)
  * @grafana/data: Matchers and Transforms (#16756)
  * Docs: Document LDAP config reload in admin http api
    (#18739)
  * center NoDataSourceCallToActionCard in Explore (#18752)
  * DataLinks: enable data links in Gauge, BarGauge and
    SingleStat2 panel (#18605)
  * DashboardDatasource: reuse query results within a
    dashboard (#16660)
  * Plugins: show a clear error on the plugin page when it
    failed to load (#18733)
  * Chore: Use ruleId instead of alertId as log keyword
    (#18738)
  * @grafana/data: improve the CircularVector api (#18716)
  * QueryEditor: check if optional func toggleEditorMode is
    provided (#18705)
  * Emails: remove the yarn.lock (#18724)
  * OAuth: Support JMES path lookup when retrieving user email
    (#14683)
  * Emails: resurrect template notification (#18686)
  * Email: add reply-to and direct attachment (#18715)
  * Dashboard: Adds Logs Panel (alpha) as visualization option
    for Dashboards (#18641)
  * Heatmap: Add Cividis and Turbo color schemes (#18710)
  * Units: add counts/sec (cps) and counts/min (cpm) in
    Throughput (#18702)
  * Dev Docker: Use golang:1.12.9-alpine to prevent glibc
    mismatch. (#18701)
  * Docs: Fix broken link for the Grafana on RHEL or Ubuntu
    tutorial (#18697)
  * Fixes several usability issues with QueryField component
    (#18681)
  * convert teams section of user profile to react (#18633)
  * Singlestat/Gauge/BarGauge: Improvements to decimals logic
    and added test dashboard (#18676)
  * Emails: Change text (#18683)
  * Streaming: improve JSDocs for DataSourceAPI streaming
    support (#18672)
  * TimeSrv: Enable value time windowing in TimeSrv (#18636)
  * Explore: Fixes so Show context shows results again
    (#18675)
  * Graph: Updated y-axis ticks test dashboard (#18677)
  * Add typings to package.json in packages (#18640)
  * Plugins: better warning when plugins fail to load (#18671)
  * SingleStat2: save options to defaults not override
    (#18666)
  * Packages: Fix path import from grafana/data (#18667)
  * SingleStat: use DataFrame results rather than
    TimeSeries/TableData (#18580)
  * TestData: attach labels to series results (#18653)
  * Singlestat: Disable new singlestat gauge usage (#18610)
  * Explore: Fixes query field layout in splitted view for
    Safari browsers (#18654)
  * MSI: new long file names are causing error building MSI
    (#18646)
  * Auth: change the error HTTP status codes (#18584)
  * Refactor: EmptyListCTA (#18516)
  * Build: Upgrade to go 1.12.9 (#18638)
  * Chore: Revert React 16.9.0 bump (#18634)
  * Azure Monitor and Log Analytics converted and separated
    into components (#18259)
  * Rewrite user profile edit to react (#17917)
  * Docs: remove codecov badge (#18623)
  * Prometheus: Prevents panel editor crash when switching to
    Prometheus datasource (#18616)
  * Chore: Rename Popper to Popover (#18543)
  * SingleStat: add a gauge migration call to action button in
    the editor (#18604)
  * Build: update revive dependency (#18585)
  * LDAP: multildap + ldap integration (#18588)
  * Docker: switch docker image to alpine base with phantomjs
    support (#18468)
  * Backend: Adds support for HTTP/2 (#18358)
  * Explore: Fixes error when switching from prometheus to
    loki data sources (#18599)
  * TimePicker: Set time to to 23:59:59 when setting To time
    using calendar (#18595)
  * Prometheus: Return labels in query results (#18535)
  * Docs: Update changelog and docs for annotation region
    change (#18593)
  * Refactor: move KeyValue and deprecation warning to
    @grafana/data (#18582)
  * Annotations: use a single row to represent a region
    (#17673)
  * Docs: Update upgrading guide (#18547)
  * Docs: Adds tests requirement to bugs checklist (#18576)
  * DataFrame: convert from row based to a columnar value
    format (#18391)
  * Packages: Temporarily skip canary releases if packages
    build fail (#18577)
  * Update latest.json to latest stable version (#18575)
  * Docs: Update changelog for v6.3.3 (#18569)
  * Graph: Fixed issue clicking on series line icon (#18563)
  * grafana/toolkit: Unpublish previous 'next' version when
    releasing a new one (#18552)
  * Toolkit: write PR report to a folder with the circle build
    number (#18560)
  * CI: Fail build if yarn.lock is not up to date (#18555)
  * Chore: Updates react-dependant packages to address react
    warnings (#18549)
  * Prometheus: Fix regression of rerunning query on
    legend/interval change (#18147)
  * Explore/Prometheus: More consistently allows for
    multi-line queries (#18362)
  * Login: Fixes undefined redirect (#18545)
  * Plugins: expose react-redux, redux (#18501)
  * TimeSeries: assume values are all numbers (#18540)
  * Login: Angular to React (#18116)
  * InfoTooltip: Info icon with tooltip (#18478)
  * Annotations: Fix failing annotation query when time series
    query is cancelled (#18532)
  * remotecache: support SSL with redis (#18511)
  * QueryData: Handle that response data must be array
    (#18504)
  * React: Rename deprecated UNSAFE_componentWillReceiveProps
    (#18526)
  * Explore: Replaces TimeSeries with GraphSeriesXY (#18475)
  * API: Restrict anonymous user information access (#18422)
  * Fix: failing build after React bump (#18514)
  *  strictNullChecks: First batch (#18390)
  * Chore: bump React to 16.9.0 (#18502)
  * Docs: Adds a new security section (#18508)
  * Docs: Update issue triage doc with external PRs section
    (#18464)
  * Typo: fix typo in processDataFrame.ts comment (#18492)
  * Explore: Fix loading error for empty queries (#18488)
  * Fix: Fixes stripping of $d in Explore urls (#18480)
  * grafana/ui: fix toTimeTicks error (#18448)
  * Docs: Adds details to Pull Request Checklist (#18471)
  * DataLinks: respect timezone when displaying datapoint's
    timestamp in graph context menu (#18461)
  * Chore: strictNullChecks, ColoringEditor and
    time_region_manager (#18442)
  * Backend: Do not set SameSite cookie attribute if
    cookie_samesite is none (#18462)
  * DataLinks: Apply scoped variables correctly (#18454)
  * DataLinks: Use datapoint timestamp correctly when
    interpolating variables (#18459)
  * API: Minor fix for team creation endpoint when using API
    key (#18252)
  * Login: Adjust space between skip and its icon (#18407)
  * Docs: Update Auth Proxy documentation (#18444)
  * Docs: Minor Readme update (#18438)
  * OAuth: return GitLab groups as a part of user info (enable
    team sync) (#18388)
  * Fix: Avoid glob of single-value array variables  (#18420)
  * DataLinks: Enable multiple data links per panel (#18434)
  * Markdown: Handle undefined/null strings (#18433)
  * Docs: Update changelog and latest with 6.3.1 and 6.3.2
    releases (#18437)
  * Explore: Fixes Legend overflow in splitted view (#18396)
  * Docs: changelog for docker 6.3 (#18429)
  * Panels: Fixed crashing dashboards with panel links
    (#18430)
  * DataFrame: remove dateFormat (#18424)
  * backend: null.Float NaN -&gt; null for json marshal (#18284)
  * Frontend: adds folder name in home dash choose menu
    (#18346)
  * TestData: Query variable support (nested + glob queries)
    (#18413)
  * Update latest.json (#18417)
  * Changelog 6.3.0 (#18414)
  * PanelLinks: Fix render issue when there is no panel
    description (#18408)
  * e2e tests: Make pageObjects mandatory (#18406)
  * Documentation: document the 'Mixed' Data Source (#18398)
  * Explore: Moves GraphSeriesXY and DisplayValue to
    grafana/data (#18400)
  * Explore: Fixes incorrect handling of utc in timeEpic
    (#18386)
  * Postgres: Add support for scram sha 256 authentication
    (#18397)
  * Update behind_proxy.md with linkback to nginx.com (#18150)
  * Do not set SameSite for OAuth cookie if cookie_samesite is
    None (#18392)
  * Gauge/BarGauge: Rewrite of how migrations are applied
    (#18375)
  * MSSQL: Change connectionstring to URL format to fix using
    passwords with semicolon (#18384)
  * CloudWatch: Fix alerting for queries with Id (using
    GetMetricData) (#17899)
  * Chore: Update strictNullChecks error limit (#18387)
  * Chore: Fixes some strict errors (#18381)
  * Graph: Improved graph tick decimals logic arround
    significant digits (#18370)
  * CI: Added metric to track strict null erros (#18379)
  * Auth: Do not search for the user twice (#18366)
  * grafana/toolkit: improve CI task (#18189)
  * Alerting: Also include configured AlertRuleTags in
    Webhooks  (#18233)
  * Loki: Apply start parameter to speed up test query
    (#18266)
  * Docs: Changelog 6.3.0 beta4 (#18359)
  * Select: Fixes issue where ToggleButtonGroup overlapped
    DataSourcePicker in Firefox (#18361)
  * SignIn: Update redirect on reroute (#18360)
  * Gauge/BarGauge: Support decimals for min/max
    toFloatOrUndefined (#18368)
  * FieldDisplay: Return field defaults when there are no data
    (#18357)
  * Auth: introduce more tests for middleware module (#18365)
  * Docs: updated latest.json (#18363)
  * LDAP: nitpicks (#18309)
  * Docs: mention unsupported versions of PostgreSQL (#18307)
  * Navigation: Fixed double settings menus (#18349)
  * Build: allow bash to expand the wildcard (#18354)
  * Gauges: Fixes error when mappings array was undefined
    (#18353)
  * Frontend: Fixes progress tracker close button to use
    `$link-hover-color` (#18352)
  * Frontend: Fixes hard-coded font-weight properties to use
    variables (#18350)
  * LDAP: Align ldap example with the devenv testdata (#18343)
  * Auth: consistently return same basic auth errors (#18310)
  * cli: fix for recognizing when in dev mode. (#18334)
  * QueryEditors: Fixes flakey text edit mode toggle (#18335)
  * Refactor: use data rather than series in stream
    callback(#18126)
  * Keybindings: Disable on login url (#18331)
  * Fix failing end to end tests job for release (#18323)
  * Fix OAuth error due to SameSite cookie policy (#18332)
  * Chore: noImplictAny no errors left (#18303)
  * [Shortcuts] Fixes shortcuts for moving time range
    backwards and forwards (#18305)
  * TablePanel: Remove scroll option on TablePanel (#18318)
  * Keyboard Shortcuts: Sign in to enable them (#18271)
  * GitHub Templates: Pull Request Template update (#18300)
  * Auth Proxy: Include additional headers as part of the
    cache key (#18298)
  * grafana/toolkit: support windows paths (#18306)
  * Chore: noImplicitAny Sub 500 errors (#18287)
  * Plugins: return a promise for loadPluginCss (#18273)
  * Utils: avoid calling console.warn() too often for
    deprecation warnings (#18269)
  * CLI: Allow installing custom binary plugins (#17551)
  * Docs: Update link to example app (#18253)
  * GettingStarted: Skip Query for getting started (#18268)
  * v6.3.0-beta2 is latest testing (#18283)
  * Release: Changelog update with v6.3.0-beta2 (#18281)
  * Chore: Upgrades typescript to version 3.5 (#18263)
  * docs: team sync (#18239)
  * SAML: Only show SAML login button on Enterprise version
    (#18270)
  * Permissions: Show plugins in nav for non admin users but
    hide plugin configuration (#18234)
  * CI: Change target branch in CI task trigger-docs-update
    (#18255)
  * Plugins: Include build number and PR in metadata (#18260)
  * Run End-to-End tests for release builds (#18211)
  * DataLinks: Fixed interpolation of series name, fixes
    #18250 (#18251)
  * Timerange: Fixes a bug where custom time ranges didn't
    respect UTC (#18248)
  * Loki: Remove prefetching of default label values (#18213)
  * Build: fix use of env vars in parentheses execs (#18249)
  * TimePicker: Increase max height of quick range dropdown
    (#18247)
  * TimePicker: Fixed css issue casued by CSS Optimizer
    (#18244)
  * Revert 'Timerange: Fixes a bug where custom time ranges
    didn't respect UTC (#18217)' (#18246)
  * Timerange: Fixes a bug where custom time ranges didn't
    respect UTC (#18217)
  * LDAP: improve POSIX support (#18235)
  * Instrumentation: Add failed notifications metric (#18089)
  * Docs: update links to sample plugins (#18240)
  * Build: Removed webpack from default grunt task, fixes
    #18232 (#18242)
  * Packages: update package.json files  (#18173)
  * Replaced ubuntu:latest with ubuntu:18.04; specific image
    version to make grafana build images consistent (#18224)
  * Build: correct verify script (#18236)
  * remote_cache: Fix redis connstr parsing (#18204)
  * Auth: do not expose disabled user disabled status (#18229)
  * Build: Introduce shellcheck (#18081)
  * Docs: Update documentation with new SAML features (#18163)
  * Typo: fix threshodsWithoutKey (#18228)
  * alerting: more specific error when missing threshold
    (#18221)
  * Graph: fix time label description for datalink suggestions
    (#18214)
  * Explore: Reduce default time range to last hour (#18212)
  * alerting: return err when SetAlertState fails to save to
    sql (#18216)
  * PhantomJS: Fixes rendering on Debian Buster (#18162)
  * Docs: sudo is required on the apt-key add not on wget
    (#18180)
  * Build: watch and dev mode webpack improvements (#18153)
  * Plugin: AzureMonitor - Reapply MetricNamespace support
    (#17282)
  * Refactor: move end-to-end test infrastructure to
    @grafana/toolkit (#18012)
  * SAML: add auth provider label (#18197)
  * Plugins: avoid app importDashboards() NPE (#18128)
  * Plugins: fix previous commit, output 'build' property in
    json
  * SAML: add metrics (#18194)
  * Plugins: add build info to plugin metadata (#18164)
  * datasource: testdata - add predicatable csv wave scenario
    (#18183)
  * Docs: SAML idp_metadata_url option (#18181)
  * Panel: Show error in edit mode (#18175)
  * E2E: saving a dashboard should wait for success (#18171)
  * @grafana/toolkit: integrate latest improvements (#18168)
  * Build: change definition of the vars in makefile (#18151)
  * noImplicitAny: Down approx 200 errors (#18143)
  *  datasource: testdata - add predictable pulse scenario
     (#18142)
  * Minor 6.3.0 beta1 changes (#18048)
  * Docs: SAML (#18069)
  * Docs: prioritize use of `make run` to `bra` (#18154)
  * Fix provision alerts generation script (#18145)
  * SQLStore: use bool pointer instead of string (#18111)
  * Registry: add a reusable function registry (#17047)
  * grafana/toolkit: test improvements and show stats (#18137,
    #18138)
  * Metrics: use consistent naming for exported variables
    (#18134)
  * Build: copy .browserslistrc to node build container
    (#18141)
  * @grafana/toolkit: HtmlWebpackPlugin when in watch mode
    (#18130)
  * update yarn.lock (#18125)
  * grafana/toolkit: prettier and lint fix in dev mode
    (#18131)
  * Chore: Fix about 200 noImplicitAny errors (#18067)
  * Build: allow dynamically change docker image (#18112)
  * grafana/toolkit: update the way config is being passed to
    jest cli (#18115)
  * Build: detect changes to packages based on the git diff
    (#18118)
  * Build: Release packages under next tag when changes
    detected on master (#18062)
  * SQLStore: allow to look for `is_disabled` flag (#18032)
  * Metrics: add LDAP active sync summary metric (#18079)
  * Docs: correct issue_triage.md texts
  * ValuMapping: start with some values (#18092)
  * Docs: Simplify download links &amp; instructions and make
    download link clearer (#18090)
  * FieldDisplay: move threshold and mapping to Field (#17043)
  * InfluxDB: Enable interpolation within ad-hoc filter values
    for InfluxDB data source (#18077)
  * Docs: Move data links down (#18072)
  * grafana/toolkit: improve CircleCI integration (#18071)
  * Build: consistently reference go binary (#18059)
  * devenv: Fix typo in nginix docker for mac (#18068)
  * noImplicitAny: 1670 errors (#18035)
  * Add missing pull requests to Changelog (#18061)
  * provisioning: escape literal '$' with '$$' to avoid
    interpolation (#18045)
  * grafana/toolkit: improve CircleCI stubs (#17995)
  * Docs: clarify the ttl units (#18039)
  * Update docs readme for running MySQL/Postgres tests
  * Auth: Duplicate API Key Name Handle With Useful HTTP Code
    (#17905)
  * Chore: upgrade node-sass to 4.12.0 (#18052)
  * API: Minor fix for nil pointer when trying to log error
    during creating new dashboard via the API (#18003)
  * Chore: update lodash (#18055)
  * Update latest.json (#18043)
  * Update Changelog (#18042)
  * Chore: bump master version number to 6.4.0-pre
  * Explore/Loki: Display live tailed logs in correct order
    (#18031)
  * Fix unused variable errors (#18030)
  * Docs: First draft of whats new in 6.3 (#17962)
  * Packages: create shared tsconfig.json (#18010)
  * CLI: Fix encrypt-datasource-passwords fails with sql error
    (#18014)
  * LDAP: Adds bind before searching LDAP for non-login cases.
    (#18023)
  * Users: show badges for each auth provider (#17869)
  * Loki: Don't use _ numerical separator (#18016)
  * grafana-cli: allow installing plugins from a local zip
    file (#18021)
  * grafana/toolkit: Copy or extract static files (#18006)
  * Packages: Use lerna for release orchestration (#17985)
  * AnnoList: add alpha annotations list plugin (#17187)
  * grafana/toolkit: Use babel-plugin-angularjs-annotate
    (#18005)
  * CSV Export: Timezone based on dashboard setting (#18002)
  * LDAP: Adds back support for single bind. (#17999)
  * Reducers: consistent result for first/last reducer
    shortcut (#17911)
  * SAML: Show SAML login button even if OAuth is disabled
    (#17993)
  * Fix: Break redirect loop if oauth_auto_login = true and
    OAuth login fails (#17974)
  * Refactor: fix range util imports (#17988)
  * Refactor: move dom utils to @grafana/ui (#17976)
  * Docs: Documents new features available with Loki data
    source in Explore (#17984)
  * Prometheus: added time range filter to series labels query
    (#16851)
  * Explore: Adds support for new loki 'start' and 'end'
    params for labels endpoint (#17512)
  * Chore: Removes custom debounce utility in favor of
    lodash/debounce (#17977)
  * Api: Fix auth tokens returning wrong seenAt value (#17980)
  * Refactor: move more files to @grafana/data (#17972)
  * @grafana/data: export dateMath and rangeUtil (#17971)
  * Refactor: move some files to @grafana/data (#17952)
  * noImplicitAny: Azure Monitor (#17966)
  * grafana/toolkit: initial CI task and various small
    improvements (#17914)
  * First version of prettier checks in toolkit (#17964)
  * LDAP: finishing touches (#17945)
  * Graphite: Refactor lexer and parser (#17958)
  * noImplicitAny: Datasource files, under 2500 (#17959)
  * Auth: saml enabled check. (#17960)
  * Auth: SAML login button. (#17932)
  * grafana/toolkit: Add support for extensions styling
    (#17938)
  * Datasource: Refactor Graphite to class (#17942)
  * SAML: Configuration defaults, examples and dependencies
    (#17954)
  * OAuth: deny login for disabled users (#17957)
  * Build: Adds pre-commit check that fails if node versions
    are not synced (#17820)
  * Docs: minor ha-setup edit (#17950)
  * Docs: Added very basic docs about revoking user sessions
    (#17931)
  * Docs: Updates documentation regarding logs integration in
    Explore (#17896)
  * noImplicitAnys: Fix InfluxDB type issues #17937)
  * TimePicker: align position between dashboard and explore
    (#17940)
  * AzureMonitor: remove duplicate query logic on the frontend
    (#17198)
  * UserProfilePage: Fix team avatar urls #17866 (#17930)
  * Explore: Introduces storage keys for last used data source
    on per-orgId basis (#17934)
  * Docs: added version notice to new ldap feature docs
    (#17929)
  * Explore: Restricts query text edit toggle to metrics mode
    (#17921)
  * grafana/runtime: Expose SystemJS from @grafana/runtime
    (#17927)
  * Templating: Correctly display __text in multi-values
    variable after refresh (#17918)
  * grafana/toolkit: bundle plugins with webpack (#17850)
  * Explore: Adds orgId to URL for sharing purposes (#17895)
  * grafana/toolkit: copy sass files (#17888)
  * ChangePassword: Rewrite change password page to react
    (#17811)
  * AngularPanels: Fixed loading state indication for angular
    panels (#17900)
  * Explore: Adds support for toggling text edit mode in
    explore (#17870)
  * LDAP: Divide the requests (#17885)
  * Build: fixes missing shebang in release tagging script.
    (#17894)
  * Teams: show proper label for each auth provider (#17860)
  * Logging: Login and Logout logging actions (#17760)
    (#17883)
  * Loki: Adds comment explaining usage of RFC3339Nano string
    (#17872)
  * Explore: Query rows are now reset when changing data
    sources (#17865)
  * Codestyle: add guidelines for removing the m alias for
    models (#17890)
  * Docs: How to work with themes (#17876)
  * Docs: Fix developing plugins index page (#17877)
  * StatsPicker: Fix multiple value input layout etc. (#17827)
  * Chore: Build grafana-cli when running bra run (#17788)
  * Build: use golangci-lint as a make command (#17739)
  * Explore:?Log highlights only update when user stops typing
    (#17845)
  * Loki: getHighlighterExpressionsFromQuery Returns null if
    filter term is not quoted (#17852)
  * Docs upgrading deps (#17657)
  * Testing: Include BatchRevoke for all tokens in the fake.
    (#17728)
  * Refactor: rename SeriesData to DataFrame (#17854)
  * devenv: switch OpenTSDB docker block (#17849)
  * Devenv:LDAP: couple simplifications for LDAP (#17807)
  * Login: divide login errors by pkg and service (#17835)
  * Auth Proxy: Respect auto_sign_up setting (#17843)
  * OAuth: return github teams as a part of user info (enable
    team sync) (#17797)
  * noImplicitAny: Sub 3000 errors (#17821)
  * TimePicker: Style and responsive fixes, restored dashboard
    settings (#17822)
  * Templating: Correctly display __text in multi-values
    variable (#17840)
  * Elasticsearch: Fix default max concurrent shard requests
    (#17770)
  * Explore: Fix filter by series level in logs graph (#17798)
  * Docs: Add v6.3 version notes and encryption format
    information (#17825)
  * Graphite: use POST for /metrics/find requests (#17814)
  * Dashboard: Force update after dashboard resize (#17808)
  * Toolkit: moved front end cli scripts to separate package
    and introduced very early version of plugin tools
  * Explore: Uses new TimePicker from Grafana/UI (#17793)
  * Explore: Uses RFC3339Nano string to retrieve LogRow
    contexts from Loki API (#17813)
  * noImplicitAny: Lower count to about 3450 (#17799)
  * Graphite: Fixes issue with seriesByTag &amp; function with
    variable param (#17795)
  * noImplicitAny: Reduce errors to 3800-ish (#17781)
  * Graphite: remove feature that moves alias function last
    (#17791)
  * Explore: Adds URL support for select mode (#17755)
  * TestData: add option to increase the number of test
    streams (#17789)
  * Usage Stats: Update known datasource plugins (#17787)
  * Docs: Adds section on Querying Logs for Elasticsearch
    (#17730)
  * Docs: Adds section on Querying Logs for InfluxDB (#17726)
  * Devenv: makes the grafana users default for saml. (#17782)
  * Explore: Displays only one Time column as configured in
    TimeZone settings (#17775)
  * Markdown: Replace rendering library (#17686)
  * ApiKeys: Fix check for UTC timezone (#17776)
  * Prometheus: Minor style fix (#17773)
  * Docs: fixed notifications table
  * Auth: Allow expiration of API keys (#17678)
  * 17278 prometheus step align utc (#17477)
  * Docs: Update release guide  (#17759)
  * release: update latest.json to v6.2.5 (#17767)
  * release: 6.2.5 changelog (#17766)
  * Fix typo s/Applicaiton/Application/ in error messages
    (#17765)
  * UserAdmin: UI for disabling users (#17333)
  * API: get list of users with additional auth info (#17305)
  * TimePicker: fixed minor issues with new timepicker
    (#17756)
  * Explore: Parses and updates TimeSrv in one place in
    Explore (#17677)
  * @grafana/ui: release (#17754)
  * Password: Remove PasswordStrength (#17750)
  * Devenv:SAML: devenv block with saml test app (#17733)
  * LDAP:Docs: add information on LDAP sync feature and update
    LDAP sync default (#17689)
  * Graph: Add data links feature (click on graph) (#17267)
  * Explore: Changes LogsContainer from a PureComponent to a
    Component (#17741)
  * Chore: Remove tether and tether drop dependency in
    grafana/ui (#17745)
  * noImplicitAny: time region manager etc. (#17729)
  * Panel: Fully escape html in drilldown links (was only
    sanitized before)  (#17731)
  * Alerting: Improve alert rule testing (#16286)
  * Elasticsearch: Visualize logs in Explore (#17605)
  * Grafana-CLI: Wrapper for `grafana-cli` within RPM/DEB
    packages and config/homepath are now global flags (#17695)
  * Add guidelines for SQL date comparisons (#17732)
  * Docs: clarified usage of go get and go mod (#17637)
  * Project: Issue triage doc improvement (#17709)
  * Improvement: Grafana release process minor improvements
    (#17661)
  * TimePicker: New time picker dropdown &amp; custom range UI
    (#16811)
  * RemoteCache: redis connection string parsing test (#17702)
  * Fix link in pkg/README (#17714)
  * Dashboard: Use Explore's Prometheus editor in dashboard
    panel edit (#15364)
  * Settings: Fix typo in defaults.ini (#17707)
  * Project: Adds a security policy (#17698)
  * Project: Adds support resource docs (#17699)
  * Document issue triage process (#17669)
  * noImplicitAny: slate (#17681)
  * config: fix connstr for remote_cache (#17675)
  * Explore: Improves performance of Logs element by limiting
    re-rendering (#17685)
  * Docs: Flag serve_from_sub_path as available in 6.3
    (#17674)
  * @grafana/runtime: expose config and loadPluginCss (#17655)
  * noImplicitAny: Fix basic errors (#17668)
  * Docs: Update readme to reference correct repo (#17666)
  * LDAP: small improvements to various LDAP parts (#17662)
  * Chore: Fix noImplicitAny issues (#17636)
  * AddPanel: Fix issue when removing moved add panel widget
    (#17659)
  * TablePanel: fix annotations display (#17646)
  * middleware: fix Strict-Transport-Security header (#17644)
  * Build: add @grafana/data package (#17436)
  * Update latest.json for 6.2.4
  * Update latest.json for 6.2.3
  * Update the changelog with v6.2.4 information
  * Build: Updates node image for e2e job (#17632)
  * Explore: Prometheus query errors now show (#17470)
  * Chore: Lowered implicit anys limit to 4599 (#17631)
  * noImplicitAny: SingleStat panel (#17616)
  * Build: Update node image for test-frontend job step
    (#17628)
  * grafana-cli: Fix receiving flags via command line (#17617)
  * Typescript: Removes implicit anys (#17625)
  * Explore: Removes minus button in adhoc query field
    (#17573)
  * Correct 6.2.3 release date (#17624)
  * codestyle: styleguide and arch for grafanas backend
    (#17545)
  * JsonTree: fix jsonTree angular binding  (#17608)
  * HTTPServer: Fix X-XSS-Protection header formatting
    (#17620)
  * Changelog: Add known issues for v6.2.3 (#17615)
  * Update the changelog with v6.2.3 information (#17612)
  * Refactor buttons (#17611)
  * Tests: Replaces e2e tests truth screenshot (#17609)
  * cli: grafana-cli should receive flags from the command
    line (#17606)
  * AppPlugin: Fix load legacy plugin app (#17574)
  * Typescript: A batch of implicit any fixes (#17590)
  * RefreshPicker: Handle empty intervals (#17585)
  * Docker: Switch base to ubuntu:latest (#17066)
  * SQLStore: extend `user.SearchUsers` method (#17514)
  * Explore: Tag and Values for Influx are filtered by the
    selected measurement (#17539)
  * ldap: makes mocks available for testing. (#17576)
  * Devenv: Add nginx proxy for mac (#17572)
  * Graph: Added new fill gradient option (#17528)
  * Typescript: Reduce implicit any errors (#17550)
  * SinglestatPanel: Manages when getColorForValue() function
    returns null value. Closes #9747 (#17552)
  * LDAP: refactoring  (#17479)
  * Elasticsearch: Fix empty query request to send properly
    (#17488)
  * SinglestatPanel: fix min/max config in singlestat
    sparklines (#17543)
  * AuthProxy: Optimistic lock pattern for remote cache Set
    (#17485)
  * Explore: Includes context parameter when invoking
    getExploreState() from Prometheus datasource (#17569)
  * Tests: Replaces truth image (#17570)
  * Fix: Fixes merge conflict (#17568)
  * Build: Fix failing e2e tests and implicit any check
    (#17567)
  * Explore: Fixes implicit any error in
    AdHocFilterField.test.tsx (#17565)
  * Fix so that correct cache is provided to di registry
    (#17566)
  * Build: Upgrades to golang 1.12.6 (#17542)
  * Explore: Adds ability to remove filter from
    &lt;AdHocFilterField /&gt; key dropdown (#17553)
  * codestyle: moves cache to infra (#17519)
  * Docs feedback: installation/debian.md (#17563)
  * Chore: Lowered implicit anys limit to 5131 (#17562)
  * Influx: Reset logs query field on clear all and clear row
    in explore (#17549)
  * Devenv: Add telegraf with log parsing to influxdb docker
    block (#17546)
  * Explore: Runs query when measurement/field and pairs are
    selected in logs mode for influx (#17523)
  * Influx: Adds start page for logs in Explore (#17521)
  * OAuth: Fix for wrong user token updated on OAuth refresh
    in DS proxy (#17541)
  *  middleware: add security related HTTP(S) response headers
     (#17522)
  * Docs: Clarifies from which version the Patch VERB is
    available (#17532)
  * Chore: Hugo upgrade (#17494)
  * Codestyle: Fix some goconst issues (#17530)
  * Docs: Adds clarification to the provider name for
    provisioned dashboards (#17524)
  * Singlestat: Add y min/max config to singlestat sparklines
    (#17527)
  * Explore: Clear queries when switching between metrics and
    logs (#17505)
  * 16223 user auth token list and revoke (#17434)
  * Feature: Parse user agent string in user auth token api
    response (#16… (#17504)
  * Tests: Adds better logging to e2e tests (#17511)
  * Codestyle: Add typecheck and unused linters (#17491)
  * Docs: Add CircleCI step trigger-docs-update (#17481)
  * remote_cache: Fix redis (#17483)
  * auth_proxy: non-negative cache TTL (#17495)
  * Explore: Adds LogQueryField for InfluxDb (#17450)
  * sqlstore: clean quota and user_auth_tokens when removing
    users (#17487)
  * Prometheus: Preallocate data for Prometheus backend
    response parsing (#17490)
  * Docs: Fix a typo in Elasticsearch docs (#17492)
  * gtime: some code style refactoring (#17369)
  * Build: make bra a local dependency (#17414)
  * Add tests for multildap (#17358)
  * RefreshPicker: SetInterval comments to rxjs code added
    (#17404)
  * metrics: expose stats about roles as metrics (#17469)
  * Explore: Handle newlines in LogRow Highlighter (#17425)
  * Alerting: Add tags to alert rules (#10989)
  * Config: Add comment before log_queries in sample ini file
    (#17462)
  * CLI: Search perf test data (#17422)
  * Prometheus: Use overridden panel range as $_range instead
    of dashboard range (#17352)
  * Update latest (#17456)
  * NavModel: Fixed page header ui tabs issues for some admin
    pages (#17444)
  * Update changelog for 6.2.2 (#17452)
  * PluginConfig: Fixed plugin config page navigation when
    using subpath (#17364)
  * Tracing: allow propagation with Zipkin headers (#17009)
  * Perf: Fix slow dashboards ACL query (#17427)
  * Explore: Fixes crash when parsing date math string with
    whitespace (#17446)
  * Cloudwatch: Add AWS DocDB metrics (#17241)
  * Provisioning: Support folder that doesn't exist yet in
    dashboard provisioning (#17407)
  * Codestyle: Fix govet issues (#17178)
  * @grafana/runtime: expose location update (#17428)
  * Fix: Adds context to list of keys that are not part of
    query (#17423)
  * Prometheus: Correctly escape '|' literals in interpolated
    PromQL variables (#16932)
  * Explore: Makes it possible to use a different query field
    per mode (#17395)
  * DataSourceApi: remove ExploreDataSourceApi (#17424)
  * Fix: change angular loader paths (#17421)
  * Build: specify build flag for `docker-compose up` (#17411)
  * Add a @grafana/runtime package with backendSrv interface
    (#16533)
  * Database: Initialize xorm with an empty schema for
    postgres (#17357)
  * docs: configuring custom headers in the dataproxy (#17367)
  * Explore: Queries the datasource once per run query and
    uses DataStreamObserver (#17263)
  * Feature: Adds redux action logging toggle from url params
    (#17368)
  * Build: Adds e2e tests back to master workflow with better
    error messages and with artifacts (#17374)
  * Explore: Handle datasources with long names better in ds
    picker (#17393)
  * Annotations: Improve annotation option tooltips (#17384)
  * InfluxDB: Fixes single quotes are not escaped (#17398)
  * Chore: Bump axios to 0.19.0 (#17403)
  * Alerting: golint fixes for alerting (#17246)
  * Batch disable users (#17254)
  * Chore: Remove unused properties in explore (#17359)
  * MySQL/Postgres/MSSQL: Add parsing for day, weeks and year
    intervals in macros (#13086)
  *  Security: Prevent csv formula injection attack  (#17363)
  * LDAP: remove unused function (#17351)
  * Enterprise: remove gofakeit dep (#17344)
  * Explore: Update time range before running queries (#17349)
  * Build(package.json): improve npm commands (#17022)
  * Chore: upgrade webpack analyser (#17340)
  * NewDataSourcePage: Add Grafana Cloud link (#17324)
  * CloudWatch: Avoid exception while accessing results
    (#17283)
  * Build: ignore absence of docker-compose (#17331)
  * Build(makefile): improve error handling (#17281)
  * adds auth example for the cli cherrypick task (#17307)
  * docs: remove my email from docs examples (#17325)
  * 16365 change clashing variable names (#17140)
  * Frontend/SeriesData: Fix for convert SeriesData to Table
    format (#17314)
  * Frontend/utils: Import has only from lodash (#17311)
  * Frontend/utils: Add missing type  (#17312)
  * update v6.2-beta1 changelog with missing pr (#17308)
  * explore: don't parse log levels if provided by field or
    label (#17180)
  * HTTP Server: Serve Grafana with a custom URL path prefix
    (#17048)
  * update latest.json to latest stable version (#17306)
  * release: v6.2.1 changelog update (#17303)
  * Build: Removes e2e-tests from Grafana master workflow
    (#17301)
  * Build(devenv): correct the context issue (#17291)
  * Build: Enables end-to-end tests in build-master workflow
    (#17268)
  * Gauge/BarGauge: font size improvements (#17292)
  * Chore: Update jquery to 3.4.1 in grafana ui (#17295)
  * CLI: Add command to migrate all datasources to use
    encrypted password fields  (#17118)
  * Auth Proxy: Log any error in middleware (#17275)
  * devenv: metricbeat and kibana for elasticsearch 7 block
    (#17262)
  * LDAP: reduce API and allow its extension (#17209)
  * database: retry transaction if sqlite returns database is
    locked error (#17276)
  * Tech: Update jQuery to 3.4.1 (#17290)
  * fix typo in basic_concepts.md (#17285)
  * Feature: do dev environment via makefile (#17136)
  * devenv: adds auth proxy load test (#17271)
  * Table: various minor fixes (alpha panel) (#17258)
  * Singlestat: fixes issue with value placement and line
    wraps (#17249)
  * Devenv: Update Graphite port in dev datasources (#17255)
  * Chore: bump grafana-ui version (#17256)
  * Release: Updated latest.json
  * Auth: Logout disabled user (#17166)
  * docs: fixes typo in provisioning docs (#17248)
  * CloudWatch: Made region visible for AWS Cloudwatch
    Expressions (#17243)
  * Panel: Pass transparency prop down to React panels.
    (#17235)
  * Build: Fix filter for building msi during release (#17236)
  * DataSourcePlugin: Avoid anuglar injector if only one
    parameter (#17239)
  * Alerting: Support for configuring content field for
    Discord alert notifier (#17017)
  * Explore: Update the way Loki retrieve log context (#17204)
  * Docs: Fix grammar in docs (#17233)
  * LDAP: consistently name the LDAP entities (#17203)
  * Panels: Show Drilldown links in top-left corner of custom
    React panels (#17142)
  * Build: Fix final prompt for @grafana/ui npm publish
    confirmation
  * Docs: Updated versions selector
  * Docs: Example for multiple LDAP servers (#17216)
  * Release: Updated changelog
  * Release: updated changelog with v6.2 entries (#17201)
  * Search: removed old not working search shortcuts (#17226)
  * azuremonitor: revert to clearing chained dropdowns
    (#17212)
  * Search: changed how search filter on current folder works
    (#17219)
  * AzureMonitor: docs for multiple subscriptions (#17194)
  * Defer closing of files (#17213)
  * Docs: Add guidelines for PR/commit messages (#17190)
  * Users: Disable users removed from LDAP (#16820)
  * docs: what's new in v6.2 fixes (#17193)
  * DataSourceMeta: add an option to get hidden queries
    (#17124)
  * Panel: Apply option defaults on panel init and on save
    model retrieval (#17174)
  * BarGauge: Fix for negative min values (#17192)
  * Azuremonitor: multiple subscription support for alerting
    (#17195)
  * AppPlugin: add types for jsonData (#17177)
  * MSI: Generate sha256sum during MSI build process in
    circleci (#17120)
  * explore: fix null checks (#17191)
  * Fix: Fixes so new data is pushed during live tailing
    (#17189)
  * testdata: logs scenario (#17182)
  * testdata: scenarios returned are now sorted in a
    consistent way (#17181)
  * TablePanel: Check for table using keys (#17185)
  * Fix gosimple issues (#17179)
  * AppPlugin: add an init function (#17150)
  * Fix: Changes WebSocket protocol to wss:// for https
    (#17173)
  * alerting: golint fixes for alert notifiers.  (#17167)
  * LDAP: add tests for initialBind (#17132)
  * Explore: Adds Live option for supported datasources
    (#17062)
  * alerting: fix a bunch of lint issues. (#17128)
  * chore: mocks plugin loader for DataSourceSettingsPage
    tests (#17157)
  * Release: Improved cherry pick task (#17087)
  * Explore: Fix selection/copy of log lines (#17121)
  * Explore: Fix empty space in toolbar on smaller devices
    (#17110)
  * Explore: display log line context  (#17097)
  * Plugins: expose rxjs matching 6.4.0 (#17148)
  * Chore: fix codespell issue with build (#17144)
  * Feature: LDAP refactoring (#16950)
  * explore: fix issues when loading and both graph/table are
    collapsed  (#17113)
  * explore: make sure datasource is added to target (#17116)
  * Fix: tighten revive exit code &amp; make it happy (#17127)
  * GraphPanel: Don't sort series when legend table &amp; sort
    column is not visible  (#17095)
  * Chore: Update grafana-ui version to 6.2.0-alpha.0 (#17109)
  * add support for periodically reloading mysql client certs
    (#14892)
  * Chore: Deduplicate sqlstore transaction code (#17069)
  * Alertmanager: Replace illegal chars with underscore in
    label names (#17002)
  * Adjusted documentation for gcs to reflect the code
    (#16947)
  * fix: Initial url update in Explore should replace existing
    url history #17030 (#17061)
  * Explore: Allow switching between metrics and logs
    (#16959)
  * Chore: explore possibilities of using makefile (#17039)
  * Chore: Bump jest to 24.8.0 (#17094)
  * Chore: Bump ts-node to 8.1.0 (#17093)
  * Release: Updated changelog
  * backend: replace /pkg/errors with errutil (#17065)
  * Explore: Fixes filtering in Prometheus queries when
    clicking in Table (#17083)
  * Remotecache: Avoid race condition in Set causing error on
    insert.  (#17082)
  * Build: Support publishing MSI to grafana.com (#17073)
  * InputDataSource: better empty value support (#17075)
  * Panels: Fixed alert icon position in panel header (#17070)
  * GraphPanel: use SeriesData directly (skip legacy
    transformation) (#17037)
  * Streaming: support streaming in MetricsPanelCtrl (#17034)
  * Gauge: Fix switching orientation issue when switching from
    BarGauge to Gauge (#17064)
  * serverlock: run tests async should be more linear time
    wise (#17059)
  * InfoPopover: Fixes transclude undefined error (#17063)
  * Dashboard: Fixes lazy loading &amp; expanding collapsed rows
    on mobile (#17055)
  * fix: Azure Monitor adds missing closing div tag to query
    editor (#17057)
  * Chore: Use executable dir instead of pwd in CLI for isDev
    check (#16974)
  * Search: Set element height to 100% to avoid Chrome 74's
    overflow (#17054)
  * Docs: adds note about removing session storage (#17003)
  * Chore: remove use of `== false` (#17036)
  * Explore: use @grafana/ui legend (#17027)
  * tech: avoid alias for importing models in alerting
    (#17041)
  * DataSourcePlugin: support custom tabs (#16859)
  * Dashboard: Fixes scrolling issues for Edge browser
    (#17033)
  * SeriesData: remove color from Field (#17044)
  * chore: remove x character in explore
  * Dashboard: show refresh button in kiosk mode (#17032)
  * Devenv: Updated gauge test dashboard
  * Chore: reintroduce gosec (#17021)
  * Gauge: tweaks to background color and height usage
    (#17019)
  * Feature: provide multildap server configuration (#16914)
  * (feat/explore): Support for new LogQL filtering syntax
    (#16674)
  * fix(explore): Prevent double querying for Prometheus and
    Loki (#17004)
  * Chore: No implict any fixes (#17020)
  * move log package to /infra (#17023)
  * Chore: Lowered implicit anys limit to 5386
  * Chore: Updated snapshot
  * Select: Fixed isOpen issue
  * Chore: Typescript no-implicit any fixes progress (#17018)
  * GraphPanel: show results for all SeriesData (#16966)
  * Fix: Wrap value of multi variable in array when coming
    from URL (#16992)
  * GettingStarted: add key and remove ng-class (#17007)
  * explore: add some extra time for angular query editors to
    update query (#16955)
  * Explore: Align Explore with Dashboards and Panels (#16823)
  * Explore: Fix empty result from datasource should render
    logs container (#16999)
  * Explore: Fixes zoom exception in Loki/Graph (#16991)
  * PanelEditor: Fix queries tab now showing, wrong
    skipDataQuery logic (#16994)
  * DataSourceApi:  convert interface to abstract class
    (#16979)
  * Panels: Fixed error panel tooltip (#16993)
  * Docker: Prevent a permission denied error when writing
    files to the default provisioning directory (#16831)
  * Notification: attempt to send notifications to all given
    email addresses (#16881)
  * GettingStarted: convert to react panel plugin (#16985)
  * Plugins: Remove dataFormats key and add skipDataQuery
    (#16984)
  * AlertList: removed icon
  * MetricsPanelCtrl: use shared queryRunner to support query
    execution (#16659)
  * TableData: support name (#16983)
  * Changelog: Typo guage -&gt; gauge (#16982)
  * TestData: stream via fetch (#16963)
  * plugins: fix how datemath utils are exposed to plugins
    (#16976)
  * NewDataSource: Updated page header title
  * fix(prometheus): issue with click label to filter for
    recording rules in Explore
  * Explore: Removes Promise.All from runQueries thunk
    (#16957)
  * Chore: Add prometheus basic auth proxy (#16882)
  * Snapshot: use given key and deleteKey (#16876)
  * DataSourcePlugins: more generics improvements (#16965)
  * AddDataSource: Updated page design &amp; categories (#16971)
  * Templating: Support selecting all filtered values of
    multi-value variable (#16873)
  * Chore: Add Input stories (#16897)
  * FieldDisplay: Don't use group ui elements in field editors
    (#16953)
  * GettingStarted: Fixes layout issues, fixes #16926 (#16941)
  * PanelModel: Fix crash after window resize, fixes #16933
    (#16942)
  * Singlestat: fixed centering issue for very small panels
    (#16944)
  * Tests: Adds end-to-end tests skeleton and basic smoke test
    scenario (#16901)
  * Chore: Replaces moment with Grafanas DateTime (#16919)
  * InfluxDB: Fix HTTP method should default to GET (#16949)
  * Chore:  Skip unnecessary checks on pre commit (#16946)
  * http: remove dualstack since its deprecated (#16940)
  * devenv: add slow reverse proxy (#16943)
  * AppPlugin: Menu Edit Url Fix (#16934)
  * DataSource Plugins: consistent generics order
    &lt;TQuery,TOptions&gt; (#16936)
  * Plugins: update beta notice style (#16928)
  * Chore: update version number for 6.3 (#16927)
  * Plugins: Support templated urls in routes (#16599)
  * changelog: add 5.4.4 release
  * docs: add download link to what's new in v6.2
  * update changelog
  * Update changelog for 6.2.0-beta1
  * AzureMonitor: adds support for multiple subscriptions per
    datasource (#16922)
  * docs: what's new in v6.2 (#16909)
  * Chore: ban importing from @grafana/ui in grafana ui files
    (#16920)
  * BarGauge: New multi series enabled gauge like panel with
    horizontal and vertical layouts and 3 display modes
    (#16918)
  * alerting: no notification when going from nodata -&gt;
    pending (#16905)
  * rpm: start grafana after mysqld process (#16917)
  * Build: fix failing grafana/ui build (#16913)
  * BarGauge: Updated test dashboards and threshold fix
    (#16911)
  * PanelModel: Clear queryRunner on destroy (#16906)
  * Panels: No title will no longer make panel header take up
    space (#16884)
  * Elasticsearch: Fix pre-v7.0 and alerting error (#16904)
  * Gauge: Better handling of gauge repeat title (#16886)
  * Refactor: move datemath to grafana/ui (#16890)
  * PanelQueryState: check for existing running query (#16894)
  * devenv: add alert list panel (#16896)
  * Security: Add new setting allow_embedding (#16853)
  * build: fix integer overflow in pkg/tsdb tests on 32bit
    platforms (#16818)
  * Security: Responses from backend should not be cached
    (#16848)
  * Alert: Support variables in Alert List filters (#12583)
    (#16892)
  * Chore: Lowered implicit anys limit to 5617
  * FieldDisplay: shared options model for singlestat panels
    (#16703)
  * Refactor: rename statsCalculator to fieldReducer (#16867)
  * PanelModel: expose isInView property to PanelModel
    (#16877)
  * CSV: escape quotes in toCSV  (#16874)
  * Dashboard: Lazy load out of view panels (#15554)
  * LDAP: Added reload endpoint for LDAP config (#15470)
  * PluginsList: Removed icons and updated snapshots (#16872)
  * Panels: Fixed issue with panel type change and data
    updates (#16871)
  * Chore: fix modes for non-executable files (#16864)
  * DataSourceSettings: Minor fix for uncontrolled input
    (#16863)
  * Chore: Lowered implicit anys limit to 5623
  * TestData: Add dashboards to testdata (#16855)
  * Input Datasource: convert from angular config to react
    ConfigEditor (#16856)
  * DataSources: minor typescript cleanups and comments
    (#16860)
  * TestDataDatasource: Add config editor (#16861)
  * App Plugins: support react pages and tabs (#16586)
  * Add Windows MSI generation to build process (#16502)
  * Datasources: add support for POST HTTP verb for InfluxDB
    (#16690)
  * Add pattern validation in configs (#16837)
  * Search: Enable filtering dashboards in search by current
    folder (#16790)
  * FormLabel: allow any rather than just a string for tooltip
    (#16841)
  * prometheus: fix regression after adding support for
    tracing headers (#16829)
  * area/circleci: Speed up circleci build process for
    branches and pr (#16778)
  * DataProxy: Restore Set-Cookie header after proxy request
    (#16838)
  * docs: clarify page parameter version support for
    folder/dashboard search (#16836)
  * Chore: revise some of the gosec rules (#16713)
  * Refactor: consistant plugin/meta usage (#16834)
  * Explore: Use SeriesData format for loki/logs (#16793)
  * Refactor: move NavModel to @grafana/ui (#16813)
  * Auth: Enable retries and transaction for some db calls for
    auth tokens  (#16785)
  * Provisioning: Show file path of provisioning file in
    save/delete dialogs (#16706)
  * Add tracing headers for prometheus datasource (#16724)
  * Config: Fixes bug where timeouts for alerting was not
    parsed correctly (#16784)
  * build: removes gopkg files from dev docker file (#16817)
  * Provisioning: Trying to fix failing test (#16800)
  * Table: React table fix rotate support in storybook
    (#16816)
  * TestData: add log level in dummy message (#16815)
  * removes gopkg.lock from root folder
  * Explore: Support user timezone (#16469)
  * Plugins: rename vizPlugin to panelPlugin (#16802)
  * Plugins: move app/feature/plugin properties into
    PluginMeta (#16809)
  * Plugins: move PanelPluginMeta to grafana/ui (#16804)
  * Plugins: move datasource specific meta out of the main
    meta type (#16803)
  * updates changelog for 6.1.6
  * Fix: Fetch histogram series from other api route (#16768)
  * phantomjs: set web-security to true
  * Chore: Lowered implicit anys limit to 5668
  * build: restore postgres integration tests (#16801)
  * docs: explain correct access control model of GCS buckets
    (#16792)
  * Chore: Fixed no implicit any Typescript errors (#16799)
  * Feature: introduce LdapActiveSyncEnabled setting (#16787)
  * Plugins: ReactPanelPlugin to VizPanelPlugin (#16779)
  * UX: Improve Grafana usage for smaller screens  (#16783)
  * ThresholdEditor: Minor style fix for smaller screens
    (#16791)
  * Build: Use isolated modules for ts-jest (#16786)
  * LDAP Refactoring to support syncronizing more than one
    user at a time. (#16705)
  * build: removes unused vendored files
  * (fix/explore): remove vertical-align looks better for long
    logs (#16736)
  * Chore: bump jQuery to 3.4.0 in grafana/ui (#16781)
  * Devenv: Updated home dashboard and added new influxdb test
    dashboard
  * Chore: Lowered implicit anys limit to 5946
  * RefreshPicker: minor design update (#16774)
  * Streaming: support streaming and a javascript test
    datasource (#16729)
  * GraphLegendEditor: use stats picker rather than switches
    (#16759)
  * Feature: add cron setting for the ldap settings (#16673)
  * Build: Disables gosec until identified performance
    problems (#16764)
  * Chore: bump jQuery to 3.4.0 including prototype pollution
    vulnerability fix (#16761)
  * elasticsearch: add 7.x version support (#16646)
  * Provisioning: Add API endpoint to reload provisioning
    configs (#16579)
  * Config: Show user-friendly error message instead of stack
    trace (#16564)
  * Chore: Lowered implicit anys limit to 5954
  * Feature: Enable React based options editors for Datasource
    plugins (#16748)
  * sqlstore: use column name in order by (#16583)
  * user friendly guide (#16743)
  * Provisioning: Interpolate env vars in provisioning files
    (#16499)
  * admin: add more stats about roles (#16667)
  * Feature: Migrate Legend components to grafana/ui (#16468)
  * playlist: fix loading dashboards by tag (#16727)
  * CloudWatch: Use default alias if there is no alias for
    metrics (#16732)
  * Provisioning: Support FolderUid in Dashboard Provisioning
    Config (#16559)
  * Refactor: Make SelectOptionItem a generic type to enable
    select value typing (#16718)
  * docs: fix upgrade instructions
  * Chore: Small improvements to grafana-cli (#16670)
  * Chore: Use x/xerrors instead of pkg/errors (#16668)
  * Chore: a bit of spring cleaning (#16710)
  * Fixes #15863 (#16684)
  * Docs: Update notification services (#16657)
  * PanelQueryRunner: add datasource name to queries (#16712)
  * Chore: remove session storage references (#16445)
  * Dashboard: Minor settings UI Update (#16669)
  * Templating: Do not copy hide option (#16696)
  * Docs: Fix advanced variable formatting examples (#16691)
  * QueryEditors: pass PanelData and filtered PanelData to
    each editor (#16692)
  * Chore: remove extra logging (#16688)
  * DashboardSrv: export getDashboardSrv to react (#16687)
  * Refactor: split PanelQueryRunner into runner and state
    (#16685)
  * Docs: Googlechat provisioning config example (#16682)
  * TestDataDatasource: add the query refId to each result
  * AppPlugin: avoid app plugin navigation slowness (#16675)
  * Refactor: improvements to PanelQueryRunner (#16678)
  * Refactor: move getQueryRunner() to PanelModel (#16679)
  * Docs: initial backend plugins development guide (#16631)
  * build: remove dep config files since they are not used
    anymore
  * Fix typo in PULL_REQUEST_TEMPLATE.md
  * refactor: move timeInfo to DataRequestInfo (#16664)
  * QueryRunner: Move queryRunner to panelModel (#16656)
  * PanelQueryRunner: move error handling to
    QueryRunnerOptions (#16654)
  * refactor: Merge PanelChrome and DataPanel, do query
    execution in PanelQueryRunner (#16632)
  * Search: Fixed search issue introduced in recent PR
    (#16652)
  * Cloudwatch: fix for flaky tests (#16649)
  * UI: Remove old icons (#16335)
  * Search: Fixes search limits and adds a page parameter
    (#16458)
  * Chore: Upgrade lodash to v4.17.11 (#16645)
  * Chore: Lock dependencies (#16644)
  * tech: replace bmizerany/assert with stretchr/testify
    (#16625)
  * Chore: update yarn.lock (#16637)
  * Panel Plugins: pass query request/response to react panel
    plugins (#16577)
  * Explore: Adds logs highlighting in Explore on keypress
    (#16596)
  * Build: adding dependency used by extensions (#16622)
  * TimePicker: Re-add apply button in time picker (#16619)
  * Chore: refactor auth proxy (#16504)
  * Docs: updated help for changelog cli task (#16615)
  * replace dep with go modules (#16017)
  * Docs: Updated changelog for 6.1.4
  * Heatmap: Fixed auto decimals when bucket name is not
    number but contains dots, fixes #13019 (#16609)
  * build: partially replace gometalinter with golangci-lint
    (#16610)
  * Explore &amp; Dashboard: New Refresh picker (#16505)
  * Build: Fix missing icon typing (#16601)
  * Plugins: added missing prop to type
  * CloudWatch: GetMetricData refactoring &amp; fix label handling
    (#16383)
  * Chore: prepare our SQL for cockroach db (#16471)
  * AppPlugins: fix app support and add an alpha example
    (#16528)
  * Switch: made minor styling tweaks to switch to align to
    4px grid (#16593)
  * Docs: minor docs update for old urls
  * Chore: Add more explicit typing (#16594)
  * Chore: Lowered implicit anys limit to 5977
  * Chore: Adds typings to lodash (#16590)
  * PanelEditor: Change Queries heading to Query (#16536)
  * Security: Store datasource passwords encrypted in
    secureJsonData (#16175)
  * More development dashboards (#16550)
  * build: upgrades to golang 1.12.4 (#16545)
  * Use package libfontconfig1, instead of libfontconfig
    (#16548)
  * Adjust Send on all alerts to default label (#16554)
  * Chore: Lower limit of implicit anys to 6676
  * DirectInput: new alpha datasource that lets you enter data
    via CSV
  * Plugins: expose getBackendSrv() to plugins (#15268)
  * DataPanel: Added built-in interval variables to scopedVars
    (#16556)
  * TestData: Add minInterval query option
  * Chore: Remove implicit anys for DashboardModel and tests
    (#16553)
  * Pushover alert, support for different sound for OK
    (#16525)
  * Chore: Lowered implicit anys limit to 6816
  * CloudWatch: Fix template variable expand bug (#16405)
  * CloudWatch: fix color order (#16408)
  * Plugins: Unifying alpha state &amp; options for all plugins
    (#16530)
  * Revert 'Build: Upgrades to go 1.12.3 (#16491)' (#16544)
  * Annotations: Annotation list style improvements   (#16541)
  * QueryInspector: Now shows error responses (#16514)
  * Build: Upgrades to go 1.12.3 (#16491)
  * Build: Update master version number (#16532)
  * Elasticsearch: Format elasticsearch test dashboard json
    (#16537)
  * Update jwt regexp to include = (#16521)
  * Chore: docs fixes underscore formatting (#16516)
  * Fix: Pass missing maxDataPoints to query in Explore
    (#16513)
  * Fix: Recalculate intervals in Explore on run queries
    (#16510)
  * devenv: add elasticsearch v6 filebeat integration (#16493)
  * devenv: add worldmap panel panels for elasticsearch
    (#16313)
  * Plugins: Optionally preload some plugins during frontend
    app boot (#15266)
  * Panels: Add types for DataList and range (#16500)
  * Chore: Lowered implicit anys limit to 6818
  * PanelData: Rename ColumnStats type to FieldStats (#16494)
  * DataSourceApi: add getCollapsedText(query) to
    DataSourceApi (#16482)
  * Graph: Add some typescript types for data (#16484)
  * Build: Updates goconvey to work on go1.12 (#16483)
  * Provisioning: Do not allow deletion of provisioned
    dashboards (#16211)
  * Chore: lower limit for implicit anys to 6829
  * Singlestat-v2/Gauge: Show title when repeating (#16477)
  * Docs: fix grammar in query hint, tests, and documentation
    (#16444)
  * Heatmap: Fix empty graph if panel is too narrow (#16460)
  * Release: updated latest.json
  * Docs: Updated changelog
  * docs: fixes and update current version
  * Docs: Updated changelog for v6.1.3
  * Graph: fixed png rendering with legend to the right
    (#16463)
  * Fix: Disables auto open datasource picker on focus
    (#16398)
  * add some mock/stub guidelines to testing guideline
    (#16466)
  * Feat: Suggestion list in Explore is virtualized (#16342)
  * Docs: Updated roadmap issue to link to the pinned roadmap
    issues
  * Graph: Fixed auto decimals in legend values (#16455)
  * Styling: Aligned heading (#16456)
  * add PromQL keyword for adhoc filter (#16426)
  * Singlestat: Use decimal override when manually specified
    (#16451)
  * Graph: follow-up graph decimals fix, #16414 (#16450)
  * Chore: use remote cache instead of session storage
    (#16114)
  * Docs: Minor changelog tweak
  * Docs: Updated changelog with v6.1.2 release issues
  * datasource: fix disable query when using mixed datasource
    (#16409)
  * Graph: Fixed series legend color for hidden series
    (#16438)
  * Templating: Fixed loading React variable query editor
    (#16439)
  * Styles: Fixed left menu highlight (#16431)
  * Fix: remove test artefact (#16411)
  * Theme: Reworking button styling (#16362)
  * Graph: Fixed tooltip highlight on white theme (#16429)
  * BarGauge: Round sizing to avoid float widths
  * Graph: Allow override decimals to fully override (#16414)
  * Units: Correctly use the override decimals (#16413)
  * Docs: Remove broken youtube link in timerange reference
    (#16415)
  * BarGauge: Fixed minor margin issue (#16419)
  * Docs: Updated GitHub PR Template
  * Bar Gauge: Show tile (series name) &amp; refactorings &amp; tests
    (#16397)
  * Fix: align panel padding between sass &amp; js theme (#16404)
  * Fix: playlist now preserve the correct url query params
    (#16403)
  * Fix: Graphite query rendering fix (#16390)
  * Fix: Query editor toggle edit mode fix (#16394)
  * Refactor: Plugin exports &amp; data source / panel types
    (#16364)
  * Chore: Update lockfile (#16380)
  * Alerting: Notification channel http api fixes (#16379)
  * Chore: Add task to find FocusConvey tests (#16381)
  * CloudWatch: Update AWS/IoT metric and dimensions (#16337)
  * Fix: Table Panel fix to re-render panel when options are
    updated (#16376)
  * Docs: Fix typo in Prometheus documentation (#16369)
  * build: Fixed incorrect permissions for repo folders in
    ci-deploy. (#16360)
  * Docs: remove embedd info about samesite cookie from app,
    docs only is better
  * Chore: Lowered error count limit
  * build: fixes bug in verification script.
  * Tech: Bump typescript and jest (#16354)
  * Automation: Updates to yarn cli cherrypick &amp; changelog
    tasks (#16357)
  * Feat: Improve embed panel info text (#16344)
  * Fix: Cloudwatch fix for dimension value (#16356)
  * build: Script to check that our repos work and what the
    latest package version is (#16350)
  * Fix: Autoprefixer is now working (#16351)
  * Chore: docs updates to what's new for 6.1 (#16346)
  * build: Fix for renamed package for armv6.
  * Chore: bump storybook and add build script (#16340)
  * Refactor: React Panels to only use SeriesData[] (#16306)
  * Docs: Suggest add-apt-repository to install APT repos
    (#16333)
  * Units: Add angle units, Arc Minutes and Seconds (#16271)
  * Chore: Lowered implicit any limit to 6850
  * Feat: Adds reconnect for failing datasource in Explore
    (#16226)
  * docs: improve alert notification channel provisioning
    (#16262)
  * Build: Moved the failing appveyor file so we can get green
    builds in master
  * Fix: Build report the correct directives before failing
    (#16312)
  * Fix: input elements autofill background (#16295)
  * Fix: Bring back styles on Switch components when checked
  * Chore: breaks build if certain FrontEnd limits are
    exceeded (#16301)
  * Fix: Graphite query ast to string fix (#16297)
  * Fix: Template query editor this bind exception fix
    (#16299)
  * Fix: Alerting Notification channel http api fixes (#16288)
  * Refactor: Move LogLevel and Labels utils to @grafana/ui
    (#16285)
  * Refactor: Rename Tags to Labels in SeriesData (simple)
    (#16284)
  * Elasticsearch: Fix view percentiles metric in table
    without date histogram (#15686)
  * Configuration: Improve session_lifetime comments (#16238)
  * Alerting: Makes timeouts and retries configurable (#16259)
  * Fix: Correct SnapshotData typing (#16279)
  * Feat: Angular panels &amp; SeriesData to Table/TimeSeries
    (#16266)
  * Fix: React Graph &amp; Show message on no data (#16278)
  * Feature: added actionable message in Explore when no
    datasource configured (#16252)
  * Feature: Case insensitive Loki search (#15948)
  * Feat: Singlestat panel react progress &amp; refactorings
    (#16039)
  * Chore: Implement gosec (#16261)
  * Fix: Updated snapshot unit test that was failing
  * Refactor: Theme &amp; Removed the last rems (#16245)
  * Refactor: Theme input padding variables (#16048)
  * Feat: More robust csv support (#16170)
  * Docs: Fix rpm dependencies example (#16272)
  * Fix: HTML meta tags fix for iOS (#16269)
  * Feature: Introduced CallToActionCard to @grafana/ui
    (#16237)
  * Refactor: Rename TimeSeriesVM to GraphSeriesXY (#16216)
  * Chore: Implement revive (#16200)
  * InfluxDB: Fix tag names with periods in alerting (#16255)
  * Fix: Table Panel and string values &amp; numeric formatting
    (#16249)
  * Tech: Patch lib updates, update yarn.lock (#16250)
  * Chore: docs whats new article for the 6.1 release (#16251)
  * Chore: Storybook improvements (#16239)
  * Feat: Introduce Button and LinkButton components to
    @grafana/ui (#16228)
  * Chore: changelog adds note for #16234
  * Fix: Prometheus regex ad-hoc filters w/ wildcards (#16234)
  * Chore: changelog notes for #13825,#15205,#14877,#16227
  * Fix: Alert email variable name typo fixed (#16232)
  * Fix: scripts changelog cli per page set to 100
  * Fix: Dashboard history diff &amp; white theme fix (#16231)
  * Merge pull request #16241 from
    grafana/hugoh/no-implicit-any
  * Chore: Theme consistency, rems =&gt; pixels or variables
    (#16235)
  * Chore: Theme consistency, rems =&gt; pixels (#16145)
  * changelog: adds notes for #16229 and #16227
  * Fix: Elasticsearch fix template variables in the alias
    field (#16629)
  * Fix: TablePanel column color style now works even after
    removeing styles, fixes #16162 (#16227)
  * Docs: Updated changelog for 6.1 release (#16224)
  * Alerting: Notification channel http api enhancements
    (#16219)
  * Upgrades: Patch updates to yarn lock (#16215)
  * Fix: DatasourceApi query response typing fix (#16214)
  * chore(influx): no point of reading response when bad
    status (#16212)
  * docs: loki provisioning
  * docs(dev): Update docs about devenv dir (#16208)
  * fix(dashboard): time regions spanning across midnight
    (#16201)
  * fix(InfluxDB): Reads body and close request body even for
    error status codes (#16207)
  * chore: more TableData to SeriesData renaming (#16206)
  * fix(panels/graph): Default option name for spaceLength was
    accidentally changed (#16205)
  * fix(explore): only show split close button when split is
    active (#16203)
  * fix(react2angular): Fixed react to angular wrapper
    watching function expressions causing infinte digest loop,
    fixes #16194 (#16196)
  * fix(Alerting): Fixed alert rules with eval in day units,
    fixes #16174 (#16182)
  * fix(panel/table): Fix for white text on white background
    when value is null
  * refactor(grafana/ui): Replace &lt;input /&gt;with Input
    component from grafana/ui  (#16085)
  * fix(loki): Hide empty labels column
  * build: fixes publishing version.
  * refactor(data models): Renamed TableData to SeriesData
    (#16185)
  * chore(core/utils): Add typings to datemath.ts (#16195)
  * only call onPanelMigration when the version actually
    changes (#16186)
  * feat(explore): make it possible to close left pane of
    split view (#16155)
  * feat(Explore): make sure Loki labels are up to date
    (#16131)
  * build: makes sure grafana.version is available when
    deploying.
  * fix: added missing event to function signature Fixes:
    #16055
  * build: refactoring
  * build: updated build container with support for rpi1.
  * build: support for publishing armv6.
  * build: builds armv6 with rpi1 compat gcc.
  * fix: added target and datasource as isMetric property
    Fixes: #15862
  * chore: Removed implicit anys in react container and test
    helpers
  * Pamels: Options are always there
  * Panels: Support angular -&gt; react migration via
    PanelMigrationHandler
  * Panels: Added more tests for change panel plugin
  * Panels: Refactoring how panel plugins sets hooks and
    components, #16166
  * clarify notifications API docs
  * remove processTimeSeries
  * merge master
  * don't use process timeseries
  * rename stat to show in UI
  * use display value in pie chart
  * keep plugin versions
  * remove panel plugin setters
  * renamed float to flot
  * prevOptions should be optional
  * moved migration hook to its own function
  * Minor refactoring of stats picker / shared singlestat code
  * Makes it possible to navigate back/forward with browser
    buttons in Explore  (#16150)
  * Moved DisplayValueOptions type back, #16134
  * adding check for decimals
  * add one more test
  * Graphite: fixed variable quoting when variable value is
    nummeric, fixes #2078
  * Minor refactoring of #16127
  * Update provisioning.md
  * Graphite: Fixed issue with using series ref and series by
    tag, fixes #15237
  * move typings to types,
  * Link license corrections
  * remove logging
  * add stat picker to single stat
  * removed option to not check strings
  * drop one level of nesting
  * cleanup and guess all columns
  * Small license correction
  * update cloudwatch metrics/dimensions list
  * Enable sass theme change in Storybook
  * replaced rems with pixels or variables
  * adding test
  * updating usages in singlestat
  * Sorting imports
  * adding function
  * Use grafana's logger implementation
  * another change that didn't come with earlier commit
  * change that didn't come with in last commit
  * reversed dashboard-padding
  * Update CloudWatch metrics/dimension list (#16102)
  * brought back dashboard-padding and panel-padding
    variables, made dashboard-padding more specific
  * replaced rem with pixels or variables
  *  fix(prometheus): Change aligment of range queries
     (#16110)
  * fix, assign by event.time
  * Minor refactoring of testdata query order PR #16122
  * simplify
  * deduplicate same value annotation
  * cleaner version
  * maintain query order
  * Remove sleeps in test code by overriding time.Now()
  * Update PLUGIN_DEV.md
  * Abstract encrypt/encode and decode/decrypt into their own
    functions
  * Rename dispatched commands to make them easy to grok
  * show all colums in graph
  * Use structured logging instead of printf
  * Make all http auth setting labels the same width
  * Merge with master, and updated logo and name
  * Rewrote creation of images tag
  * Added missing commas
  * Don't include non-existing image in MS Teams alert
  * cast to column
  * update table data model
  * show all columns in singlestats
  * fix(graphite): nonNegativeDerivative argument hidden if 0,
    fixes #12488
  * Correct table names of sql storage for remotecache
  * more fixes to snapshot
  * more fixes to snapshot
  * Fixed gofmt issue in PR #16093
  * removed empty space in snapshot
  * fix: Update snapshot related to new jest version
  * fixed snapshot for test
  * Regenerate lockfile due to the amount of merge conflicts.
  * removed dashboard variables, removed headings-font-family
    variable, created theme variables for links and z-index,
    removed unused class in _panel_editor and _dashboard
  * Remove commented code
  * flot pairs
  * add more functions and tests
  * Update org_user.go
  * Minor progress on fixing no-implicit any issues
  * refactor: merged types and updated references
  * Remove leftover from first iteration
  * Only keep certain query params when going to next playlist
  * Snapshot update
  * fix: ts issue on SelectOption test
  * chore: Bump react and react-dom to 16.8.4
  * Update latest.json
  * Update templating.md
  * chore: cleaning up noimplicit anys in search_srv and tests
    progress: #14714
  * Fix threshold editor color picker not working for custom
    colors
  * Updated comments
  * Updated threshold editor test
  * Re-render gauge / singlestat panels when changing options
  * fix: refactored so members are loaded by TeamPages and use
    hideFromTabs instead of filtering out children in navModel
  * teams: explains the external property of a team
    membership.
  * fix: fixed snapshots and permission select not beeing able
    to click
  * fix: new team link goes nowhere for viewers
  * teams: refactor so that you can only delete teams if you
    are team admin
  * permissions: removes global access to bus from
    MakeUserAdmin.
  * teams: local access to bus, moving away from dep on
    global.
  * teams: better names for api permissions.
  * teams: refactor.
  * permissions: refactor.
  * teams: refactor.
  * teams: hide tabs settings and groupsync for non team
    admins
  * teams: refactored db code.
  * teams: disable new team button if user is viewer
  * refactor: moved test from TeamMembers to TeamMemberRow
  * refactor: splitted TeamMembers to TeamMemberRow
  * teams: comment explaining input validation
  * teams: cleanup.
  * teams: cleanup.
  * dashboards: simplified code.
  * teams: disable buttons for team members
  * teams: moved logic for searchteams to backend
  * teams: viewers and editors can view teams
  * teams: editor/viewer team admin cant remove the last
    admin.
  * teams: changed permission to permission type instead of
    int
  * teams: defaulting invalid permission level to member
    permission level
  * team: uses PermissionType instead of int64 for
    permissions.
  * teams: editors can't remove the last admin from a team.
  * teams: tests use the new message for modifying team
    members.
  * team: renames teams.CanUpdate teamguardian.CanAdmin
  * teams: remov permission select for non admin users
  * docs: First take on describing feature toggle
  * config: updated feature toggle name
  * teams: cleanup.
  * dashboard: only admin permission added to dashboard in
    folder.
  * dashboards: better error handling
  * teams: team listing shows only your teams (editors).
  * teams: teams guard on all teams update methods.
  * teams: added delete team guard
  * teams: removed feature toggle as it is already in
    middleware
  * teams: added feature toggle and refactor tests
  * teams: cleanup.
  * teams: test refactorings.
  * teams: bugfix, user pointer.
  * teams: start of team update guardian for editors
  * teams: team update test
  * teams: change back to permissionlevel for Member to 0
  * teams: make sure we use TeamPermissionLevel enum
  * teams: update only the selected user
  * teams: only write error message if error
  * teams: enabled so that user can update permission for team
    members
  * teams: feature toggle component
  * teams: test for update team member.
  * teams: can update team members permission.
  * teams: basic ui for permission in team members view
  * teams: editor added as admin for created teams.
  * teams: editors can work with teams.
  * teams: show teams and plugins for editors that can own
  * teams: make test cases pass again
  * folder: uses service to make user admin of created folder.
  * permissions: broken out func for making creator admin.
  * folders: admin for created folders
  * dashboards: user automatically becomes admin for created
    dashboards
  * fix(ci): frontend tests was accidentially commented out
  * Use SecretFormField in MSSql and Postgres datasources
  * Add SecretFormField component
  * Add possibility to pass custom input component to
    FormField
  * Allow angular react bridge to use kebab case attribute
    names
  * adding story and fixing tests
  * build: migrates the build container into the main repo.
  * build: updated deploy container with crcmod.
  * build: crcmod speedups rsync to gcp for deploy.
  * Update style_guides/backend.md
  * remove the error collector
  * Copied from new timepicker and unified component branch
  * docs: renamed file and added redux framework file
  * docs: moved examples to frontend.md
  * docs: intial draft for frontend review doc
  * Use ora#fail instead of console.log
  * reorder imports
  * test
  * rename to char
  * sorting imports
  * moving
  * Remove .only function
  * Add more patterns to no-only-test task
  * chore: Cleaning up implicit anys in DashboardExporter and
    tests progress: #14714
  * rename reducer to statsCalculator
  * Great progress on bar gauge look
  * Explore: Fix log stats for long labels
  * calculate the column width
  * disable react table cell measure
  * dont test exists in the test... it will fail if not found
  * add random_walk_table scenario
  * adds backend code style guide
  * add test file
  * add startAt to random walk scenario
  * get values from base options
  * use singlestat base where appropriate
  * feature(explore/table): Add tooltips to explore table
    (#16007)
  * Update changelog
  * Bar gauge gradient mode
  * Bar gauge auto lcd cell count
  * Add check for Env before log
  * Update index.md
  * chore: Cleaning up implicit anys in manage_dashboard.ts
    and manage_dashboard.test.ts progress: #14714
  * chore: Cleaning up implicit anys in app.ts progress:
    #14714
  * panels: fix loading panels with non-array targets (add
    tests)
  * changelog: adds note about closing #15836
  * set correct return type
  * panels: fix loading panels with non-array targets
    (refactor)
  * Bar gauge styling tweaks
  * panels: fix loading panels with non-array targets
  * changelog: adds note about closing #6359 and #15931
  * add partial
  * no inheratance
  * improve single stat display
  * revert most options sharing
  * Refactoring the bar gauge and the orientation modes
  * add migration tests
  * renaming function
  * using refId from panel model
  * Tooltip: show percent instead of value
  * Add check so that header is not sent for anonymous users
  * Update config docs
  * Add custom header with grafana user and a config switch
    for it
  * changelog: adds note about closing #10816
  * Right tooltip position
  * Add 'No data points' message
  * use constants for cache type
  * makes variables template prettier complient
  * Make recently used auth_module test more robust by adding
    another 'log in'
  * changelog: adds note about #15744
  * updates old distcache names
  * dont allow inifinite expiration
  * chore: Upgrade all babel related packages that is lagging
    behind
  * return error if cache type is invalid
  * Add more info to victorOps alert notifications
  * fix: papaparse must have gone missing during rebase
  * chore: Bump jest to 24
  * fix: describe() should not be async
  * fix: Use proper syntax for plugin-syntax-dynamic-import
  * fix: Downgrade ts-node to 8.0.2 due to broken theme
    generation
  * chore: Bump ora
  * chore: Bump tslint (again)
  * chore: Bump axios
  * chore: Bump npm
  * chore: Bump glob
  * fix: Invalid css
  * chore: Bump clean-webpack-plugin,
    html-webpack-harddisk-plugin, postcss-reporter
  * chore: Bump file-loader and css optimizer webpack plugin
  * chore: Bump css-loader and remove minimize option since
    its removed in css-loader
  * chore: Bump npm packages and lock down some versions
  * chore: Bump mini-css-extract-plugin
  * chore: Lock down versions of expose-loader and html-loader
  * chore: Bump fork-ts-checker-webpack-plugin
  * chore: Prod builds should not cache
  * chore: Replace Uglify with Terser
  * chore: Bump webpack, webpack-bundle-analyzer, webpack-cli
    and webpack-dev-server to latest
  * reuse more gauge settings in bargauge
  * set the unit on time data
  * add error when not found
  * Added metric math docs
  * check types better
  * check types better
  * docs: Change type of 'tags' in annotationQuery result
    example to list
  * single hook
  * Change import path for social in the tests
  * Change import path for social since it has moved
  * generic repeater
  * generic repeater
  * Remove todo about index on user_id in user_auth because it
    exists
  * Add function in ds_proxy to handle oauthPassThru headers
  * Remove auth_module settings from oauthPassThru ui
  * Remove auth module from ds_proxy oauth test
  * Get most recent oauth token from db, rather than lookup by
    auth_module
  * Improve tooltip look
  * explore/logs: Hide empty duplicates column
  * merge master
  * fix for firefox checkboxes not appearing properly, added
    appearance as none
  * Always return most recently used auth_module from
    GetAuthInfo
  * used regex instead of string replacing
  * Fixed issue with alert links in alert list panel causing
    panel not found errors, fixes #15680
  * Add comments
  * Add simple test for the ColorPicker
  * Use render props pattern in color picker
  * Move ColorPicker trigger to separate component and cleanup
    css
  * Improved error handling when rendering dashboard panels,
    fixes #15913
  * fix return type
  * Only send ci metrics to hosted metrics instance
  * adding types
  * Added back branch guard
  * moved delete button from sidebar to general tab and
    renamed it
  * Refactoring the ci metrics a bit more making it easier to
    re-use
  * removed unused and very specific variables, also variables
    with same value as general variable
  * reduce loglevel to debug
  * Updated bar gauge snapshot
  * added some comments about state of components things
  * better comments
  * comment cleanup
  * force circleci to try again
  * format
  * touch
  * touch
  * make sure the validator is called before setState
  * API to fix/update properties before load
  * more tests
  * more options in storybook
  * adding simple widget to pick the reducer
  * heatmap: fix for negative values
  * Fixed more typescript no implicit any issues
  * Also push to ci metrics to new shared HM instance
  * move sort to table processing
  * Fixed type issues introduced by adding angular types
  * Typescript noAny fixes, start of a long journey
  * Updated code stats collection
  * Updated path to new script
  * POC on collecting metrics in ci process
  * changelog: add notes about heatmap issues #15683 #14019
  * added two new variables in default theme for panel
    padding, replaced panelhorizontalpadding and
    variables.panelverticalpadding with new variables
  * renamed default variables: s -&gt; sm, m -&gt; md, l -&gt; lg
  * removed gf-form-margin variable and replaced with space-
    variables where it was used
  * add table reducer
  * heatmap: able to hide buckets with zero value #12080
  * s -&gt; sm, m -&gt; md, l -&gt; lg
  * heatmap: fix prometheus buckets sorting, closes #15637
  * s -&gt; sm, m -&gt; md, l -&gt; lg
  * removed headings-margin-bottom variable
  * rename to displayValues
  * remove kbn test
  * more tests
  * use new settings
  * fix tests
  * make value processing reusable
  * Call ora instead of instantiating it
  * Added scopedVars argument in datasourceSrv.get in
    DataPanel
  * MutableColumn
  * cleanup after review
  * rename handleXXX to onXX events
  * torkel feedback
  * onCellClick
  * heatmap: able to reverse Y buckets order, #15683
  * fix(explore/logs) not collapsing whitespace (#15737)
  * Refactoring of multi-value datasource PR #15812
  * fixed minor misstake with dashboard padding
  * removed -margin, replaced with new general variables
  * Move oauth token migrations in user_auth_mig
  * heatmap: fix middle bucket bound for prometheus
  * Refactoring / fixing password hint PR #15868
  * chore: Move sidemenu out of context service and use the
    logic we have in the router already for hiding the
    sidemenu
  * Fix deduplication results displaying wrong data (#15755)
  * added new space variables to margins in AddPanelWidget,
    add_data_source, dashboard_settings and sidemenu
  * use `Get` instead of `Find`
  * avoid exposing cache client directly
  * add docs about remote cache settings
  * renames distcache -&gt; remotecache
  * renames key to cache_key
  * build steps for cache servers
  * code layouts and comments
  * rename put -&gt; set
  * reverts package.json I made during the flight &gt;.&gt;
  * `memcache` -&gt; `memcached`
  * removes memory as distcache option
  * test redis and memcached during integration tests
  * adds config to default settings
  * avoid exporting test helpers
  * uses set instead of add for memcache
  * adds memory as dist storage alt
  * extract tests into seperate files
  * avoid exposing internal structs and functions
  * heatmap: don't display cut cards
  * heatmap: fix error when series empty
  * heatmap: middle bucket bound option, #15683
  * rotate!
  * added new variables for spacing, set margins in _cards
    with new variables
  * better css
  * Revert 'Fix Datasource Update to no User/Password'
  * rotate!
  * fix imageurl in notification test
  * add comment
  * attach themes to table story
  * reuse deprecationWarning
  * move to string.ts
  * move stringToJsRegex
  * get field mapping to actually work
  * add variable size storybook
  * cell builder cleanup
  * minor storybook cleanup
  * fix typos
  * autofill space rather than force with/height values
  * return table directly, not the debug info
  * Minor fix in values to histogram conversion
  * Fix histogram x-axis min/max
  * moved utillities to util
  * Change xaxis min and max form input types to number
  * Fix histogram xaxis min/max tests
  * Optionally set histogram x-axis min/max
  * table using MultiGrid
  * cleanup
  * cleanup
  * adding toolbar
  * adding stub table input CSV
  * docs: Fix indentation level for OAuth2 config
  * docs: update CONTRIBUTING.md
  * merge master
  * docs: update slack alert notification settings
  * docs: update admin and user http api documentation
  * feat(api): support list/revoke auth token in admin/current
    user api
  * support get user tokens/revoke all user tokens in
    UserTokenService
  * @grafana/ui - release docs v1 (#15835)
  * Minor refactoring of copy tags when saving feature, #15446
  * Simple implementation for preserve tags, closes #11627
  * Updated prettierignore
  * Refactoring of PR #14772
  * Simple storybook
  * fix typo in pr template
  * add nil/length check when delete old login attempts
  * Minor refactoring of new react text panel
  * Improve rendering
  * fix allow anonymous server bind for ldap search
  * changed all rems to pixels in defaults and template,
    changed back root font size
  * piechart -&gt; pieChart
  * Rename: Piechart -&gt; PieChart
  * Import only what is used from d3
  * less nesting and add test
  * remove type field and add helper functions to check if
    data isTableData
  * add storybook
  * fixes typo in redis devenv
  * add support for memcached
  * add support for redis storage
  * add garbage collector for database cache
  * test at interface level instead impl
  * cache: initial version of db cache
  * don't include stuff from app/...
  * fix scss
  * rename to Table
  * rename to Table
  * fix type errors
  * move to grafana/ui
  * better sort function
  * use TableData, not interface
  * Make password hint configurable from settings/defaults.ini
  * move toTableData to grafana/ui
  * don't require x &amp; y columns for timeSeries
  * use TableData for timeseries in react
  * Update README.md
  * heatmap: reduce number of legend segments to reasonable
    value and round x values to prevent gaps
  * heatmap: fix legend padding
  * heatmap: fix legend for small values, #14019 #15683
  * status: alpha
  * changed root font to 100%(default 16px), changed font-size
    from px to rem, updated rem sizes in template and
    default.ts files, removed display classes and variables
    since not used, removed lead class and variables since not
    usedremoved serif font since not used and probably never
    should be used
  * Update core:start cli command to watch theme changes again
    (#15856)
  * Updated pull request template
  * Updated pull request rtemplate
  * Removed title case from issue template title
  * Updated issue template titles
  * Updated issue templates
  * Updated templates
  * fix: Update error message and replace npm with yarn #15851
  * fix: Make sure we dont add &amp;autofitpanels to the url if it
    already exists #15849
  * fix: Update test snapshot
  * fix: Logo goes Home instead of toggling side menu #15482
  * Update upgrading.md for wrong spell
  * remove _
  * cleanup
  * use pure component
  * return the same panelData unless it changes
  * sortable class
  * Map dataSourceTypeSearchQuery state from redux to search
    input.
  * move rendering to its own file
  * try virtualized
  * Initial tooltip
  * Minor refactoring of PR #15770
  * Revert 'Fix for leaving playlist mode'
  * Alternative fix to detecting when to stop a playlist,
    fixes #15701 and #15702
  * fix discord notifier so it doesn't crash when there are no
    image generated
  * fix: Consistency in unit labels #15709
  * Update latest.json
  * Run prettier
  * position from add panel, dimensions from copied panel
  * Fix donut rendering
  * Run prettier
  * Fix pieType change
  * changelog: add notes about closing #14509 #15179
  * Render svg instead of canvas
  * fix: Add class for input fields with help icon to avoid
    icon hiding the text #15771
  * restore to current folder when restoring old dashboard
    version
  * fix(renderer): Vendor ansicolor as typescript
  * log phantomjs output even if it timeout and include orgId
    when render alert
  * keep size from copied panel and not from add panel widget
  * Added basic cherry pick helping task
  * Prevent search in VizPicker from stealing focus (#15802)
  * fix only users that can edit a dashboard should be able to
    update panel json
  * Updated changelog task
  * Fixed image rendering issue for dashboards with auto
    refresh, casued by missing reloadOnSearch flag on route,
    fixes #15631
  * use props.replaceVariables rather than templateSrv
  * Updated to add PR author, skip PR issue references
  * Added first iteration/poc of changelog task
  * Enable @grafana/ui version bump based on package.json
    contents
  * Fixed styling of gicon's in dropdown menus
  * cleanup plugin versions
  * use explore icon
  * fix comments
  * typescript functions on replace
  * remove console.log
  * add ScopedVars to replace function
  * Make datasource variables multiselect and dashboard
    repeatable
  * set height
  * add test file (ignored)
  * fix variable name
  * use typescrit in angular table
  * use react-table
  * add a basic alpha react table
  * Ensure clean master only when publishing package to npm
  * Remove log
  * Ensuring master branch when performing release
  * upgrade xorm packages to latest versions
  * Expose onQueryChange to angular plugins
  * docker: update prometheus2 block to version 2.7.2
  * use replaceVariables
  * Add a keybinding that toggles all legends in a dashboard
  * fix allow anonymous initial bind for ldap search
  * changelog: adds note for #8253
  * prettier
  * Aftermerge fixes
  * use default min interval of 1m for sql datasources
  * changelog: adds note about closing #15608
  * Fixed scrollbar not visible due to content being added a
    bit after mount, fixes #15711
  * Added comment to Docker file
  * moving
  * style: add gicon-shield to sidemenu class Closes #15591
  * remove `UseBool` since we use `AllCols`
  * fix: Move chunk splitting from prod to common so we get
    the same files in dev as prod
  * fix: update datasource in componentDidUpdate Closes #15751
  * changelog: add notes about closing #15739
  * Moved Server Admin and children to separate menu item on
    Side Menu (#15592)
  * update version to 6.1.0-pre
  * Viewers with viewers_can_edit should be able to access
    /explore (#15787)
  * Fixed scrolling issue that caused scroll to be locked to
    the bottom of a long dashboard, fixes #15712
  * reordered import
  * Wrapperd playlist controls in clickoutsidewrapper
  * Turn off verbose output from tar extraction when building
    docker files, fixes #15528
  * Hide time info switch when no time options are specified
  * Made sure that DataSourceOption displays value and fires
    onChange/onBlur events (#15757)
  * Updated react select fork to 2.4.1
  * utils: show string errors. Fixes #15782
  * Update frontend.md
  * Update frontend.md
  * Minor refactor of cli tasks (core start, gui publishing)
  * Fixed url of back button in datasource edit page, when
    root_url configured (#15759)
  * use onOptionsChange
  * use replaceVariables rather than onInterpolate
  * use updateOptions rather than onChange
  * changelog: add notes about closing #15650
  * changelog: add notes about closing #15765
  * fix: Kiosk mode should have &amp;kiosk appended to the url
    #15765
  * changelog: add notes about closing #15077
  * org admins should only be able to access org admin pages
  * only editor/admin should have access to alert
    list/notifications pages
  * Added MaximumUsedTransactionIDs metric to list of AWS RDS
    metrics.
  * fix: When in tv-mode, autofitpanel should not take space
    from the navbar #15650
  * devenv: fixes incorrect influxdb config.
  * Fixes #15739
  * Don't mutate seriesList parameter in mergeSeriesByTime
    (#15619)
  * new stable docs version
  * Fix: #14706 Incorrect index pattern padding in alerting
    queries
  * fix
  * changelog: adds note about closing #14239
  * fix: prevent datasource json data stored as nil (#15508)
  * changelog: adds note about closing #10506
  * changelog: adds note about closing #15651
  * Return 404 on user not found (#15606)
  * Catch bad regex exception at controller level
  * Prettier fix
  * Add PiechartOptionsBox
  * docs: missing field added to example
  * 11780: invalid reg value can cause unexpected behaviour
  * Fixed right side scrollbar margin on dashboard page
  * fix: Return url when query dashboards by tag
  * Fix prettier
  * Initial rendering
  * Add PiechartType enum
  * Install d3
  * Remove extra props
  * Removed commented code
  * Fixed alias in Cloudwatch Expressions
  * Explore: Enable click on name label
  * Bumping grafana ui version (#15669)
  * Style and grammar fixes
  * big text option
  * Need this to be available for plugins
  * service: fix for disabled internal metrics.
  * docs: 6.0 whats new
  * Toggle stack should trigger a render, not a refresh
  * Updated latest.json with 6.0
  * docs: grafana 6.0 has been released.
  * moves social package to /login
  * moves tracing packge into /infra
  * changelog: adds notes for #14509 and #15179
  * graph: fixes click after scroll in series override menu
  * moves metric package to /infra
  * Explore: Make sure line graphs get different colors
  * stackdriver: change reducer mapping for distribution
    metrics
  * stackdriver: fix for float64 bounds for distribution
    metrics
  * update
  * style tweaks
  * Refactoring orientation stuff
  * Refactoring bar gauge
  * Refactoring bar gauge
  * Added missing file
  * refactoring repeater and code in gauge and bar gauge to
    reuse more code
  * docs: link to azure monitor from what's new in v6.0
  * Fixed value dropdown not updating when it's current value
    updates, fixes #15566
  * docs: tweaks to AzureMonitor docs
  * Added feature toggle to defaults.ini and sample.ini after
    PR comments
  * Moved variable to config struct after PR comments
  * Added feature toggle editors_can_own
  * updates all cols except created so user and password of
    the database can be chaned to no user and password
  * Fixed bug with getting teams for user
  * Improve Loki logs render with ANSI colors (#15558)
  * grafana/ui 6.0.0-alpha.0 release version bump
  * removed color in color variables names
  * changelog: add notes about closing #15303
  * changelog: add notes about closing #1441
  * update changelog
  * grafana/ui 1.0.0-alpha.0 release
  * Update grafana/ui readme
  * docs: landing page update
  * Bring back plugins page styles
  * docs: layout fixes
  * prettier fix
  * Make published package public by default
  * docs: fix link
  * docs: fix order of datasources in menu/index and update
    alert support
  * Fixed prettier issue in color picker
  * Update docs to match current npm scripts
  * Added keywords and description go grafana/ui package
  * Fixed failing tests because of circular dependency
  * Fix version and name in grafana/ui package.json
  * Imports updates
  * Implemented scripts for building and releasing grafana/ui
  * changed some more color variables to use variables
  * fixed tests
  * panel: defensive coding that fixes #15563
  * Minor fix/polish to gauge panel and threshold editor
  * copying options between visualizations
  * fixed issue in dark sass template
  * Updated body &amp; page variables to use variables from code
    theme
  * updated building from source docs
  * fixed snapshots failing in master
  * Synced variable template files
  * fix: mysql query using __interval_ms variable throws error
  * Fixed scrollbar issue introduced in theme changes
  * Fix build
  * minor touch ups
  * Fix heading levels in generic-oauth.md
  * updated colors in light, dark and theme files, in template
    file basic colors uses variables from dark/light files,
    also changed  to -basic in some files
  * ValueOptions -&gt; PiechartValueEditor
  * Make it build
  * fixes
  * added orientation option
  * export PiechartDataPoint from @grafana/ui
  * change valueOptions
  * get label and color from series
  * prettier fix
  * PieChartDataPoint -&gt; PiechartDataPoint
  * Rename PieChartPanelEditor to PiechartPanelEditor
  * docs: adds Azure Monitor docs
  * Fix blue in dark theme
  * Readme update
  * Minor fixes
  * Review fixes
  * Fixes after merging #15468
  * Pass dashboardModel to PanelCtrl class. Fixes #15541
  * Add piechart to builtInPlugins
  * logo: svg -&gt; png
  * Remove old overwritten sass vars
  * first draft of repeater component
  * docs: howto for recreating our debian repositories.
  * fix: Filter out values not supported by Explore yet #15281
  * Bump Prettier version (#15532)
  * updated theme variables to master
  * updated theme template files variables to master
  * add new issue templates
  * Fixes #15506
  * chore: graph2 panel plugin should use the new
    ReactPanelPlugin from @grafana/ui
  * fix: Have the tab param removed from the url when leaving
    edit mode #15485
  * reduce loglevel to debug
  * Fixes #15505
  * fix native annotation filtered by template variable with
    pipe
  * Fixed navbar backbutton padding
  * Updated explore icon and style tweaks Lowered icon size
    and improved paddings, tried to align placement between
    dashboard and explore
  * Display graphite function name editor in a tooltip
  * Fixing array direction, adding simple render test, fixes
    #15478 Fixed unit test and updated gauge Added migration
    for threshold order
  * changelog: adds note for #15500
  * fixed page-header-bg
  * cli: chmod 755 for backend plugin binaries
  * reversed most of grays in dark theme
  * Fixes #15477
  * Changed how react panels store their options (#15468)
  * Remove maxDataPoints and interval props from props to
    remember in panel model
  * Fix typo in view mode cykle button
  * Variables regenerated
  * Make clear that variable scss files are generated from
    templates
  * Fixed spelling issue in templating docs
  * Removed primary class from Add Query button, and changed
    name of Panel Options tab o General Options
  * improved formatting of variable docs
  * Datasource docs for Loki
  * Replace require with import in start task
  * Added enable_gzip documentation (#15322)
  * Add Lux to units
  * Fixed issue with PanelHeader and grid-drag-handle class
    still being applied in fullscreen, fixes #15480
  * Began work on handling panel type switching and keep
    setting
  * Fixed unit tests
  * Fixed gauge issue that will require migration later and
    also value options editor did not handle null decimals or
    0 decimals
  * Added missing Gauge props
  * Bar gauge icon updated
  * Added bar gauge icon
  * Began work on adding options
  * Added basic tests
  * bar-gauge storybook
  * Began experimenting with a bar gauge
  * Also remove nested options prop that was there due to bug
  * Moved gauge value options into a sub oject and made editor
    more generic, will be moved out of gauge pane later and
    shared between singlestat, gauge, bargauge, honecomb
  * Added a ReactPanelPlugin as the interface that react
    panels export, this way react panels have clearer api, and
    gives us hooks to handle migrations and a way for panel to
    handle panel changes in the future
  * Changed how react panels store their options
  * Fixed prettier issue (#15471)
  * Initial commit
  * Added bar gauge icon
  * Began work on adding options
  * Added basic tests
  * run db tests in all packages
  * bar-gauge storybook
  * new dark-3 became new dark-2, created new lighter dark-3,
    changed panel-bg, empty-cta etc to dark-2
  * Began experimenting with a bar gauge
  * docs: suggested changes
  * docs: fix header
  * fixed handling of alert urls with true flags, fixes #15454
  * Fixed dashboard navbar buttons being visible in
    fullscreen, fixes #15450
  * Added missing strict type checking options to grafana/ui
    and fixed type errors
  * Extracted common code for diff calculation
  * fix spelling error
  * whats new: rename security section
  * Fix percent_diff calculation when points are nulls
  * Restored loading spinner to DataPanel
  * rearrange bullet points in PR template
  * added another error message scenario
  * link to contributing guidelines in pr template
  * Fixes to error handling and clearing, also publishing of
    legacy events so old query editors work with react panels
    fully
  * contributing: adds link to help wanted label
  * contributing: adds link to our CLA
  * removes testing instruction from contributing doc
  * docs: move alerting above session
  * docs: mention samesite setting
  * increased blue in dark-1-5, dark-3 and dark-4
  * docs: adds note about new login cookie name
  * changed color for blue light in light theme + small
    changes in naming etc
  * Add missing nodemon dependency
  * make bug/feature titles more verbose
  * mentioned closes/fixes for new features
  * docs: improve removal of session storage for what's new in
    v6.0
  * docs: add upgrade notes for v6.0
  * docs: add note regarding auth proxy and user session
    requirement
  * docs: fix typo
  * removed more unused variables, restyled scrollbar
  * allow 90 percent of alertTimeout for rendering to complete
    vs 50 percent
  * Fixed issue with sass variables used from typescript, the
    prettier lowercases export variables
  * using error callback from datapanel instead
  * docs: add availability note regarding non-compliant
    providers
  * Fixed sass vars template files
  * Added deprecation warning to npm watch script - use start
    script instead
  * added new dark variable to dark theme(the color used for
    page-bg), changed some backgroud colors that doesn't use
    variables to use variables, made some slight tweaks to
    dark variables, fixed so item hover is the same as card
    hover
  * Simple CLI for running grafana in dev env
  * Added common theme variabless generation, created
    GrafanaThemeCommons interface
  * contributing: improve guide for bug fixes
  * Changed devenv default data source to testdata
  * added support for influxdb non_negative_difference
    function in tsdb
  * added support for influxdb non_negative_difference
    function in tsdb for alerting
  * Remove precommit from npm scrips
  * More files that has fixed with prettier
  * Added prettierignore and check script
  * devenv: use grafana:dev image in ha test per default
  * devenv: send nginx logs to loki in ha test
  * devenv: proper fluentd conf for grafana and loki
  * devenv: use grafana/fluent-plugin-loki
  * devenv: trying to make fluentd with inoffical
    fluent-plugin-loki work
  * fixed issue with updatePopperPosition
  * Prettier had not been running as a precommit hook for some
    time so had to run in on all files again
  * removed _plugins.scss and _settings_permissions.scc,
    removed unused classes in _login.scss, reduced dark
    variabels in light theme and alignied light theme a bit
    with dark theme, turned blue-gray, dark-3 and panel-bg
    variables into one variable and removed gray-7 in dark
    theme
  * feat: Add EmptySearchResult ui component and use it in
    VizTypePicker
  * Revert 'feat: Add css-support for invalid form input
    elements'
  * Revert 'feat: Highlight vizpicker input when there are no
    panels matching the search query'
  * Regenerating variabless sas on theme edit v1
  * Fixed a minor plugin json lingering issue
  * Removed some icons in action button Trying to align some
    title case issues
  * implement show error in panelcorner
  * Forgot about the snapshots
  * Renamed to FilterInput and added label and search icon
  * feat: Highlight vizpicker input when there are no panels
    matching the search query
  * Updated a few plugin json files with dataFormats
  * feat: Add css-support for invalid form input elements
  * remove comments
  * bubble error from datapanel to panelchrome
  * Changed noQueries to a dataFormats array that will allow a
    panel to define supported formats and prefered (first in
    array)
  * use authtoken for session quota restrictions
  * Fixed issues with double page body and husky pre-commit
    hook
  * fix: No need to have edit permissions to be able to 'Save
    as' a dashboard
  * Revert 'chore: wip: Replace brace with ace-builds to get
    latest version of ace'
  * chore: wip: Replace brace with ace-builds to get latest
    version of ace
  * fix: Error tooltip should have white text on red
    background. Not red text on red background
  * Move explore selectors to a separate file
  * removes unused session code
  * chore: Rename renderPanel to renderPanelBody
  * chore: Rename renderDataPanel to renderPanel
  * chore: Rename renderHelper &gt; renderDataPanel and move
    logic to smaller functions
  * chore: PR feedback, shorten boolean check
  * chore: Rename isDataPanel to noQueries
  * chore: Only show Queries tab for panel plugins with
    isDataPanel set to true
  * feat: Only use the DataPanel component when panel plugin
    has isDataPanel set to true in plugin.json. And fix
    PanelData when using snapshots
  * feat: Add util to convert snapshotData to PanelData
  * feat: Introduce IsDataPanel attribute to plugin.json
  * fix: Add missing typing
  * Fixes #15372 with number input and parseFloat
  * Revert 'hard move'
  * chore: PR feedback, shorten boolean check
  * chore: Rename isDataPanel to noQueries
  * Merge with master
  * Found another input that was tied to a regexp
  * Fixes bug #12972 with a new type of input that escapes and
    unescapes special regexp characters
  * enable testing provsioned datasources
  * Fixed elastic5 docker compose block
  * Added one more test case for color resolving helper
  * Fix error caused by named colors that are not part of
    named colors palette
  * Fixed issue with gauge requests being cancelled
  * Update package.json
  * changelog: adds note for #15363
  * Move deduplication calculation from Logs component to
    redux selector
  * style tweak to alert
  * Removed plus icons
  * hard move
  * restoring green CTA
  * Removed double page container
  * chore: Only show Queries tab for panel plugins with
    isDataPanel set to true
  * Removing default thresholds values.
  * adds edition to build_info metric
  * Updated lint-staged
  * changelog: adds note for #14623
  * Fixed double page class on api keys and org details page
  * Color tweaks
  * azuremonitor: don't use make for maps and array
  * changed back to old green in light theme
  * changelog: add notes about closing #15258
  * changelog: add notes about closing #15223
  * changelog: add notes about closing #15222
  * changelog: add notes about closing #15122
  * changelog: add notes about closing #15219
  * changelog: add notes about closing #14432
  * update changelog
  * changelog: adds note for #15131
  * changelog: add notes about closing #15284
  * Fixed issue with light theme introduced by #15333
  * devenv test dashboard
  * minor style update
  * revert ds_proxy timeout and implement dataproxy timeout
    correctly
  * changelog: adds note about closing #15295
  * azuremonitor: fix auto interval calculation on backend
  * Minor style fixes
  * Remove not related code
  * make sure opentsdb takes dashboard timezone into
    consideration
  * make sure influx takes dashboard timezone into
    consideration
  * Do not read store state from toggle panelaction creator
  * make sure graphite takes dashboard timezone into
    consideration
  * Review changes
  * return series label if selected stat is name
  * Fix plugin loading failure message not being displayed
  * fixes invalid folder check
  * extract notifiers folder creation to new if statement
  * interval: make the FormatDuration function public
  * Fixed missing time axis on graph due to width not being
    passed
  * make sure notifiers dir exists for provisioning in docker
  * should be able to navigate to folder with only uid
  * renames usage state name for auth token
  * Clear visualization picker search on picker close
  * Update README.md
  * changelog: adds note about closing #15288
  * v1
  * removed extra semi-colon
  * Commented out the Loki dashboard query editor
  * added old green to dark-theme
  * Fixed issue with logs graph not showing level names
  * set secondary to new blue
  * removed unused directive
  * Fixed issue where double clicking on back button closes
    sidemenu
  * changelog: add notes about closing #8570
  * update changelog
  * changelog: add notes about closing #14233
  * changelog: add notes about closing #15189
  * changelog: add notes about closing #13324
  * azuremonitor: small refactoring
  * azuremonitor: handles timegrain set to auto on backend
  * Navbar back button, no title edit this time
  * provide time range to angular query controllers
  * azuremonitor: add test for dimension filter
  * azuremonitor: refactor azure monitor api code into own
    file
  * azuremonitor: handle multi-dimensions on backend
  * use timeSrv in metricFindQuery as timeRange
  * remove unnecessary spy
  * azuremonitor: add support for aggregations on backend
  * Fix formatting
  * Add aws ec2 api metrics for cloudwatch
  * Improve usability showing disabled lines in forms
  * Fixed issues with plus button in threshold and panel
    option header, and current state in viz picker, fixes
    #15329
  * support three letter hex color strings
  * azuremonitor: simple alerting for Azure Monitor API
  * use unique datasource id when registering mysql tls config
  * azuremonitor: builds a query and sends it to Azure on the
    backend
  * mark packages as Apache license
  * Minor refactoring around theme access
  * Use TS instead of JS to store theme variables@next
  * Do not use js theme variables in sass (poor dev experience
    for now)
  * Update config mock in metrics panel controller test
  * ldap: refactoring.
  * ldap: fixes #14432. Fix for IPA v4.6.4
  * ldap: adds docker block for freeipa
  * feat: Only use the DataPanel component when panel plugin
    has isDataPanel set to true in plugin.json. And fix
    PanelData when using snapshots
  * feat: Add util to convert snapshotData to PanelData
  * feat: Introduce IsDataPanel attribute to plugin.json
  * fix: Add missing typing
  * slight tweaks
  * fixed explore width-0 issue, fixes #15304
  * Persis deduplication strategy in url
  * Support ANSI colors codes in Loki logs
  * adds usage stats for sessions
  * Panel edit navbar poc
  * make sure to create provisioning/notifiers directory for
    deb and rpm packages
  * log root cause error when reading from provisioning
    directories
  * moves usage stats sender to new package
  * changelog: add notes about closing #15291
  * Removed unnecessary code from ColorPicker and extended
    theme type
  * Selecting theme variable variant helper function
  * added reducers tests
  * update docs
  * added way to test action called from react component
  * Added annother initDashboard test
  * removes cleanup setting from docs
  * make hourly cleanup the default behavior
  * fix single gauge
  * removed direction and series mode options, cleaned up the
    code somewhat
  * Simplified condition
  * support json format templating
  * support /api/v1/labels
  * devenv: update ha test and load test
  * run token cleanup job when grafana starts, then each hour
  * Added another error object message detection
  * Fixed some remaining issues
  * Improved dashboard page test
  * Improved dashboard page test
  * Big refactoring for dashboard init redux actions
  * Fix SemVersion.isGtOrEq
  * making changes suggested in review and improving typings
  * fix
  * show timeseries label under gauge
  * Minor cleanup
  * Added test for SASS variable retrieval function from JS
    definition
  * Updated stories to use new theming
  * move authtoken package into auth package
  * vertical and horizontal, removed mode option
  * move UserToken and UserTokenService to models package
  * Add failing test
  * Rename version_test to version.test
  * change UserToken from interface to struct
  * replaced some hex values with variables
  * some changes i forgot to save in first push in
    variables.dark
  * removed trailing whitespace
  * removed unused theme variables, removed empty sections,
    aligned the order of sections in the files
  * combine mode with avg value
  * Fix issue with graph legend color picker disapearing on
    color selection
  * changelog: add notes about closing #12546
  * Added a basic test for initDashboard thunk
  * docs: update annotaions http api
  * azuremonitor: improve autocomplete UX
  * Added DashboardPage tests that tests view mode transition
    logic
  * azuremonitor: fix autocomplete menu height
  * Revert 'chore: Replace sizeMe with AutoSizer in
    DashboardGrid'
  * Revert 'chore: Remove react-sizeme'
  * fix spelling
  * wip: tests
  * middleware fix
  * enhanced expiration logic for lookup token
  * changelog: add notes about closing #15265
  * Address review comments
  * auth token clean up job now runs on schedule and deletes
    all expired tokens
  * changes needed for api/middleware due to configuration
    settings
  * change configuration settings in auth package
  * document login, short-lived tokens and secure cookie
    configurations
  * refactor login/auth token configuration settings
  * remove unused code
  * Added ServerlessDatabaseCapacity metric to list of AWS RDS
    metrics.
  * changelog: add notes about closing #8207
  * Minor code simplification
  * Delete template.html
  * cloudwatch: Add tests for resource_arn template query
  * cloudwatch: Add resource_arns template query function
    Implements feature request #8207
  * update to aws-sdk-go v1.16.15
  * Updated add panel related flows
  * Update types and themes usage in components
  * Implemented theme context and renamed/moved theme related
    types
  * refactor panel
  * changelog: adds note for #15182
  * Breaking init dashboard up in to fetch &amp; init
  * stackdriver: fixes #15182
  * Closing timepicker when clicking outside the picker
  * Optimized so we only do checks when dropdown is opened
  * stackdriver: add some more typings
  * Fixed so that we close angular TimePicker when user clicks
    outside the dropdown
  * Moved remove panel logic to dashboard srv
  * first working draft
  * Removed unused controllers and services
  * Improved error handling
  * fix: Update snapshot
  * chore: Explore: Remove inner AutoSizer, spread the
    size-object to width/height, change height type to number
  * chore: Remove react-sizeme
  * fix: Calculation issue with AutoSizer in explore
  * chore: Replace withSize with AutoSizer in
    explore/Graph.tsx
  * chore: Replace sizeMe with AutoSizer in DashboardGrid
  * Prevent viewers from going into edit mode
  * Expand rows for panels in collapsed rows
  * Basic loading state for slow dashboards
  * Fixes #15223 by handling onPaste event because of bug in
    Slate
  * Fixed add panel should scroll to top
  * minor layout change, simple render test
  * azuremonitor: improve autocomplete experence
  * docs: fixes #14940
  * Added custom scrollbar and remember scroll pos to jump
    back to same scroll pos when going back to dashboard from
    edit mode
  * created new color variables, changed primary to blue,
    changed success-btns to primary-btns.
  * azuremonitor: more autocomplete suggestions for built-in
    functions
  * Updated playlist test
  * added missing typing to explore props
  * added comment to initDashboard
  * improve the stackdriver logo
  * Fixed so onBlur event trigger an QueryChange and
    QueryExecute if values differ
  * Renamed initialQueries to queries
  * Added PATCH verb end point for annotation op
  * move auth token middleware/hooks to middleware package
  * auth package refactoring
  * render after leaving fullscreen
  * added flags to vizpicker from query param
  * Added playlist controls to new react DashNav
  * Fixed lots of loading flow issues and updated solo route
    page
  * Set page title on dashboard load
  * now /api/login/ping returns Response
  * Added handling of kiosk mode
  * WIP Enable js defined theme to be used in SASS
  * fix: Explore: Query wrapping on long queries #15222
  * azuremonitor: fix where suggestions
  * prepping go to visualization
  * azuremonitor: use kusto editor for App Insights
  * basic layout
  * fixed unit test
  * Made dashboard view state srv panel view state obsolete
  * fix: Set ace editor min height to avoid problem with
    scrollbar overlapping ace content #15122
  * Missed to save
  * fix: Data source picker in panel queries options should
    overlap content below, including ace scrollbar #15122
  * Fixed handling of orgId
  * Fixed template variable value changed handling
  * Fixed bug with removing a QueryRow thats not part of
    nextQueries
  * Now handles all dashbord routes
  * Replaced intialQueris with queryKeys
  * fix util for splitting host and port
  * azuremonitor: where clause autocomplete
  * azuremonitor: don't go back to dashboard if escape pressed
    in the editor
  * azuremonitor: suggest tables initially
  * azuremonitor: add more builtin functions and operators
  * Reverted redux-logger
  * Added more typings
  * added submenu, made sure submenu visibility is always up
    to date
  * changelog: add notes about closing #14231
  * Removed modifiedQueries from state
  * fixing logging action
  * devenv: switching back using loki master plus various
    fixes
  * Fix save provisioned dashboard modal
  * Merge with master
  * Refactor of action, actionTypes and reducer
  * More types and some refactoring
  * Alignment of interfaces and components
  * Removed the on every key change event
  * Add AWS/Neptune to metricsMap and dimensionsMap
  * added time picker
  * refactorings and cleanup
  * mssql: pass timerange for template variable queries
  * improving dash nav react comp
  * fixed panel removal
  * Added more buttons in dashboard nav
  * wip: progress
  * Url state -&gt; dashboard model state sync starting to work
  * Dashboard settings starting to work
  * wip: dashboard in react starting to work
  * wip: minor progress
  * wip: dashboard react
  * base64 encode encrypted oauth token fields
  * Add string quote func
  * Remove option used to control within browser
  * Remove length from text columns
  * Add oauth pass-thru option for datasources
  * did not add file, removing centerered
  * Legend toggle should only trigger a re-render, not a
    refresh
  * first stuff
  * updated snapshot
  * Adding pointer to colorpicker
  * Minor post review changes
  * More style tweaks to panel option group add button
  * Made some style tweaks
  * setting margin on label
  * Make runQueries action independent from datasource loading
  * fixing test
  * add button in header
  * minor fix
  * Made really good progress on loki support in dashboards
  * Temporarily run queries independently from UI state of
    explore panels
  * Remove extra newline
  * Clearify the Run from master instructions
  * Use slate-plugins from app/features/explore
  * Remove newline &amp;&amp; runner plugins
  * Move prism to app/features/explore
  * Restoring explore panels state from URL
  * Remove version.ts
  * introduce samesite setting for login cookie
  * sending paneldata to component, gauge can handle table
    data
  * always delete session cookie even if db delete fails
  * New solo panel route working in all scenarios I can test
  * Removed unused factory and fixed index based mapper lookup
  * Fixed dashboard row title not updating when variable
    changed, fixes #15133
  * Removed comment from panel editor
  * signout user if /api/login/ping returns 401 unauthorized
  * must return json response from /api/login/ping
  * adds more tests signing out session
  * changes some info logging to debug
  * wip
  * tailing grafana logs and temporaily using an older build
  * add missing ngInject annotation
  * renames signout function
  * delete auth token on signout
  * typing data
  * changelog: adds note about closing #10780
  * Do not render time region line or fill if colors not
    provided
  * Fixed row options html template location, fixes #15157
  * creating table data type
  * wip: New react container route for solo panels that
    supports both angular and react panels
  * build: enterprise release co project.
  * Fixed another type of fluent reducerFactory
  * Moved dashboard state components to state folder
  * Moved time_srv to services folder, this should not belong
    to dashboard feature but it is too dependant on dashboard
    to move it out now, needs a bigger refactoring to isolate
    from dashboard
  * Moved a few things around
  * Removed then clauses, no need to test the test within the
    test
  * Updated what's new article
  * Added reducerTester, reducer tests and tests
  * Removed ActionTypes and fixed a
    noPayloadActionCreatorFactory
  * Replace usages of kbn.valueFormats with ui/getValueFormat
  * Refactored Datasources as POC
  * Fix anchor
  * Added download links to docs
  * Updated docs
  * Updated version again
  * Updated version and made some changes to changelog and
    what's new article
  * docs: Added version notice for time range variables
  * Added loki video
  * spell fixes
  * chore: Add typings for react-grid-layout and
    react-virtualized
  * fix: Don't open panel menu when dragging (react-)panel in
    dashboard #14946
  * chore: Add missing typings in PanelResizer
  * chore: Fix typings and remove bindings for arrow functions
    in DashboardGrid
  * Updated explore section again
  * Updated explore section
  * fixe merge issue
  * updated what's new article
  * adjusting types to match
  * Add storybook script to run it from root dir
  * Minor change to Action interfaces
  * Simplified inteface for reducerFactory
  * Fixed a small bug and added case sensitivity
  * docs: whats new tweaks
  * Added reducerFactory and tests
  * Minor updates to text and image placements
  * docs: add video link to what's new
  * whats new: note about session storage
  * first implementation
  * Added actionCreatorFactory and tests
  * whats new: provisioning for alert notifiers
  * Rename SetInitialQueries action to QueriesImported
  * Add missing code
  * changelog: adds note for #15129
  * docs: update to what's new
  * docs: wip - what's new for 6.0
  * Minor style fix to button group
  * Fixed failing unit test
  * Added basic docs
  * Minor refactoring and adding some typing
  * changelog: add notes about closing #14709
  * fixed sqlite issue introduced by #14709
  * Change primaryAggregation to crossSeriesReducer in
    Stackdriver
  * update changelog
  * changelog: add notes about closing #12764
  * fix: Remove legacy title-prop and update document.title
    when navModel is changed #15108
  * Explore: query field should not propagate non-text change
  * Wait for queries to be imported before proceeding with
    datasource change
  * removing alpha
  * Remove commented code
  * Tweaked panel option group styles
  * Import queries before datasource is changed
  * fixed prettier on switch component
  * adding from and to built in variables
  * azuremonitor: adds macros to slate intellisense
  * Fixed issue with explore changeTime redux action not being
    hooked up, fixes #15115
  * Fixed explore query editor styling issues
  * azuremonitor: remove wrong completions
  * azuremonitor: autocomplete on enter
  * Progress on tooltip style update
  * azuremonitor: fix tests
  * devenv: loki provisioned datasource
  * azuremonitor: revert 'memory for webpack build'
  * Azure Monitor: replace monaco by slate with initial Kusto
    syntax
  * docker: block for loki
  * Make language provider cancelable in Loki and Prometheus
    QueryField, to avoid setting state on unmounted component
  * Add util for handling promise cancelation to avoid setting
    state on unmounted components
  * stackdriver: remove beta notice from config page
  * increasing font size on longer strings
  * magic number solution
  * Propagate event to onChange prop in Switch component
  * two minor bug fixes introduced in recent refactorings
  * Minor progress on react query editor support, solving
    updating query persisted state
  * did some styling changes
  * Updated Explore query styles to align them to other query
    editor to make them fit in better
  * chore: Fix typings and add Page-component to
    FolderPermissions #14762
  * chore: Fix typings and add Page-component to ServerStats
    #14762
  * chore: Fix typings and add Page-component to AlertRuleList
    #14762
  * chore: Fix typings and add Page-component to
    DataSourceDashboards #14762
  * fix: Add plugins to StoreState interface
  * chore: Fix typings and add Page-component to
    NewDataSourcePage #14762
  * chore: Fix typings and add Page-component to
    DataSourceSettingsPage #14762
  * chore: Fix typings and add Page-component to
    FolderSettingsPage #14762
  * test: Updated snapshot
  * chore: Fix typings and add Page-component to TeamPages
    #14762
  * fix: Add pageName default to avoid 'Loading undefined...'
  * changelog: adds note about closing #10487
  * pkg/util/{filepath.go,shortid_generator.go}: Fix golint
    issues
  * pkg/util/{ip.go,url.go}: Fix some golint issues
  * pkg/util/*: Add missing function comments.
  * docs: updates docs to refer to using uid
  * azuremonitor: increase memory for webpack build
  * gofmt issue
  * moves test files into testdata folder
  * renames alert_notifications -&gt; notifiers
  * changelog: add notes about closing #14711
  * update inline documentation
  * extract parsing of datasource tls config to method
  * extract tls auth settings directive from datasource http
    settings directive
  * changelog: add notes about closing #13711
  * changelog: add notes about closing #5699
  * Fix for annotations not clearing when switching
    dashboards, fixes #15063
  * Import fix
  * build: ignore latest
  * Spelling/grammar fixes in top level markdown files
  * build: publishes armv6 to grafana.com.
  * Removed the initial data source as I could not see it
    being used anywhere
  * Initialize named colors palete lazily
  * Fix thresholds default colors not being applied
  * removes unnessecary db request
  * Making sure we do not pass a long invalid queries and save
    to state
  * single import for types from @grafana/ui
  * tab/spaces formatting
  * Revert 'Updated home dashboard, removed home dashboard
    header'
  * Fixed wrong line in test
  * Made sure we only resetTypeahead if mounted
  * Delayed explore query loading indicator and implemented
    minor ux improvements to it
  * fixing test
  * support both uid and id for showing/removing notifiers
  * Revert 'Use the same panel loading indicator in explore as
    on dashboard's panel'
  * Firing off an action instead of listening to location
    changes
  * Handle undefined graph and table results
  * enable explore by default
  * Use the same panel loading indicator in explore as on
    dashboard's panel
  * Prevents query result cleaning when new query trransaction
    starts
  * Changes after PR Comments
  * Made ExplorerToolbar connected and refactored away
    responsabilities from Explore
  * Removed some split complexity
  * Fixed some more styling
  * Fixed close split look and feel
  * Fixed position of Closesplit
  * Fixed small issue with TimePicker dropdown position
  * Simplified some styles and dom elements
  * Fixed some more with the sidemenu open and smaller screens
  * Fixed so heading looks good with closed sidemenu
  * Restructure of component and styling
  * Refactored out ExploreToolbar from Explore
  * updating state if no panel
  * updated the color palette
  * Fixed reinitialise of Explore
  * changelog: add notes about closing #13929
  * changelog: add notes about closing #14558
  * changelog: add notes about closing #14484
  * changelog: add notes about closing #13765
  * changelog: add notes about closing #11503
  * changelog: add notes about closing #4075
  * changelog: add notes about closing #14722
  * update changelog
  * changelog: add notes about closing #10322
  * changelog: add notes about closing #12991
  * update changelog
  * Update datasource before the loading has started
  * Add cursor pointer to color swatches
  * Fixed import path
  * changelog: adds note about closing #14701
  * upgrade golang to 1.11.5
  * moves timeout tests to an integration test
  * Moving a few things from dashboard folder
  * Correct formatting of sqlstore_test.go
  * pkg/services/dashboards/dashboard_service.go: simplify
    return
  * Updated url query param encoding to exctly match angular
    encoding
  * Updated snapshot
  * Added missing props not being passed to scrollbar
    component, fixes #15058
  * Parse database host correctly when using IPv6
  * Document /api/health
  * some working solution, needs refactor
  * changelog: adds note for #15062
  * Do not update color picker popover position on tab change
  * change default rotate_token_minutes to 10 minutes
  * Rename deprecation warning helper
  * Implemented tests for ColorPickerPopover and
    NamedColorsPalette
  * fix
  * load test/ha fixes
  * set low login cookie rotate time in ha mode
  * Fix light theme issues with named colors disabled
  * Stories cleanup
  * fix multiple piechart instances bug
  * scripts/build/*: Fix some golint issues
  * scripts/build/*: Fix golint issues Url =&gt; URL
  * build: fixes building grafana completely within docker.
  * dont specify domain for auth cookies
  * monaco-kusto: fix imports
  * use @alexanderzobnin/monaco-kusto package for kusto syntax
    highlight
  * New snapshot reflecting changes
  * Makes the clickable side menu header look great in light
    theme again
  * org id fix for load test
  * user auth token load tests using k6.io
  * add global datasource proxy timeout setting
  * moves cookie https setting to [security]
  * Azure Monitor: build monaco with webpack WIP
  * Use Switch to control y-axis in series color picker
  * Move Switch component to grafana-ui
  * improves readability of loginping handler
  * Bug Fix #14961
  * minor styling changes to gaps, font-size and width
  * makes sure rotation is always higher than urgent rotation
  * use defer to make sure we always release session data
  * Enable custom picers on color color picker popovers (for
    y-axis support in legend picker)
  * feat: Use CustomScrollbar in explore #14752
  * chore: Better comment
  * chore: Remove comment and unneeded export
  * fix: Enable -webkit-scrollbar related css when there's no
    overlay scrollbar #14807
  * fixes broken test
  * Make series overrides color picker display correctly
  * removes unused/commented code
  * removes old cookie auth configuration
  * makes auth token rotation time configurable
  * Update story for NamedColorsPalette
  * Update imports of NamedColorsPalette
  * Restore missing styles
  * Fixed issue with color name retrieval not being aware of
    current theme
  * Fixed dashboard import issue after move
  * Moved add panel panel and renamed it to add panel widget
  * Fixed react key warning for loki start page
  * Moved row options to it's own component folder
  * Removed old query inspector (that was opened by clickin
    error in panel title) think the new query insector from
    Queries tab can replace this old one.
  * Moving files to better locations
  * Disable query should trigger refresh
  * added docs entry for check_for_updates config flag, fixes
    ##14940
  * Loki query editor is starting to work, had to make changes
    to explore query field in order to update query from the
    outside without unmount between
  * store oauth login error messages in an encrypted cookie
  * Removed sass import of spectrum.scss
  * replaced palette colors with current palette adjusted for
    dark and light theme
  * Remove spectrum.js vendor dependency from grafana/ui
  * changed light-theme tool-tip to be a bit lighter, trying
    different paddings
  * Fix hide timeout for color picker
  * Rename colorsPalette util to namedColorsPalette
  * Make small swatches react to theme changes
  * redirect logged in users from /login to home
  * Explore: Fix scanning for logs
  * Update styles of selected named color swatch
  * restrict session usage to auth_proxy
  * Implement pointer component for spectrum palette sliders
  * minor updates
  * Make default color picker close on trigger mouse leave
  * Moved ad hoc filters and upload directive
  * Added deprecation warning to old color picker API props.
    Moved named color support handling to color popovers
  * changed color for label tooltips from blue/red-yellow
    gradient to black/white
  * Moved dashboard srv and snapshot ctrl
  * Moved share modal
  * Moved dashboard save modals to components folder
  * Moved unsaved changes service and modal
  * Removed unused alertingSrv
  * Moved view state srv to services
  * Moved timepicker to components
  * Moved submenu into components dir
  * Moved dashboard settings to components
  * Moved dashboard permissions into components dir
  * Moved history component, added start draft of frontend
    code style guide
  * fix: Use custom whitelist for XSS sanitizer to allow class
    and style attributes
  * Reduce padding in color picker popover
  * Began work on improving structure and organization of
    components under features/dashboard, #14062
  * Fix a typo in changelog
  * Implemented new spectrum palette
  * Update ROADMAP.md
  * use resetfolder instead so it shows current folder
  * Updated home dashboard, removed home dashboard header
  * fixes nil ref in tests
  * add setting for how to long we should keep expired tokens
  * stores hashed state code in cookie
  * creates new config section for login settings
  * based on encodeURIComponent() using strict RFC 3986
    sub-delims
  * fix: Dispatch the correct action (#14985)
  * passing middleware tests
  * Stories update for color picker
  * Make named colors optional in color picker, enable named
    colors in graph legend series picker
  * Storybook - add actions addon
  * fixes:#14282 - Do not change folder for persisted
    dashboards
  * extract auth token interface and remove auth token from
    context
  * Fixed issues with the sanitizie input in text panels,
    added docs, renamed config option
  * build: removes arm32v6 docker image.
  * Updated version in package.json to 6.0.0-pre1
  * build: armv6 docker image.
  * build: skips building rpm for armv6.
  * build: builds for armv6.
  * CustomScrollbar - expose underlying's
    react-custom-scrollbars API to allow scroll tracks config.
  * Explore: mini styling fix for angular query editors
  * Removed unused props &amp; state in PromQueryField
  * chore: Remove logging and use the updated config param
  * chore: Reverse sanitize variable so it defaults to false
  * feat: wip: Sanitize user input on text panel
  * fix: Text panel should re-render when panel mode is
    changed #14922
  * Minor rename of LogsProps and LogsState
  * Splitted up LogLabels into LogLabelStats and LogLabel
  * Make popover hide delay configurable to enable better UX
  * Stories - fix import
  * Enable new color picker in Gauge and Thresholds editor,
    use ThemeProvider instead of ContextSrv
  * Updated table tests to new behavior for colors (values are
    always rendered as hex/rgb)
  * Make named colors usable in angular code pt 1
  * Story updates
  * Update grafana/ui exports
  * Refactor color picker to remove code duplicartion
    (introduced colorPickerFactory). Allow popver position
    update on content change
  * Fix lint
  * Updated stories
  * Rendering arrows for color picker, applying color changes
    to time series
  * Fix TS errors
  * Stories updates
  * Unified color picker API, allowed for color specified for
    theme selection, updated code to changes in
    PopperController API
  * Get rid of unused renderContent prop on PopperController
  * Enabled knobs for storybook and implemented some stories
  * Lint fix
  * Render series color picker with correct theme
  * Added config provider to be able to access config easily
    from   react components
  * Migrating color pickers to Popper from drop.js pt1
  * Updates to Popper to be positions correctly within window
  * Move tooltip themes to Tooltip component making
    Popper/PopperController theme agnostic
  * WIP Basics of named color picker
  * Refactored out LogRow to a separate file
  * Removed strange edit
  * Added link to side menu header and fixed styling
  * Moved ValueMapping logic and tests to separate files
  * more auth token tests
  * Fixed data source selection in explore
  * Added refId to missing queries on panel model init
  * adds cleanup job for old session tokens
  * Fixed loading of default query editor
  * Changed null logic for range value mappings after PR
    comments
  * fix tests after renaming now
  * Added check for null value in ValueMappings and added
    tests
  * s/print/log
  * avoid calling now() multiple times
  * passing auth token tests
  * fixed trailing whitespace
  * handle expired tokens
  * fixed circleci script run path for gometalinter
  * Fixed circleci name for gometalinter exec step
  * moved script and added exit_if_fail
  * Moved gometalinter to a script instead of seperate
    commands in circleci file, removed megacheck and added
    staticcheck
  * set userToken on request when logging in
  * moves initWithToken to auth package
  * set cookie name from configuration
  * Added function hasAccessToExplore in ContextSrv and
    refactored tests
  * change rotate time
  * mixor fixes
  * dead code
  * fix ip address parsing of loopback address
  * removes commented code
  * moves rotation into auth since both happens before
    c.Next()
  * fix: Viewers can edit means that viewers have acces to
    Explore #14281
  * Add loop counter for full refresh in playlist
  * decreased panel height in edit mode
  * toggle collapse when clicking on collapse state text
  * Query editor row style update &amp; sass cleanup
  * Delete .all.ts@neomake_22624_74.ts
  * Further refinements of typings
  * more typings work around data query and data source
  * wip: progress on adding query types
  * wip: more typings
  * wip: typings
  * Revert 'Specify expected encoding for access/secret key'
  * Moved add query button to the right
  * Updated removing notification channel by uid
  * Check that alert notification with id already exists in
    notification settings
  * change enabled to true
  * Fixed scrollbar issue where it jumped to the top
  * Added test case dashboard
  * fix: Hack for getting the same height in splitted view,
    view could use refactor IMHO #14853
  * Minor refactoring and name changes
  * Fixed issue with explore angular query editor support
    introduced by recent angular query editor changes
  * Redid logic for fontcolor and thresholds in Gauge and
    added tests
  * Make sure we do not change -Infinity
  * Passed the theme to Gauge
  * Added tests for formatted value
  * Small refactor of Gauge and tests
  * Added typings and refactored valuemappings code
  * Moved Gauge to ui/components
  * Preparing move to ui/viz
  * Fixed getFontColor, added tests and fixed thresholds logic
  * Removed baseColor
  * add timeout test for alert handling.
  * remove maxage from session token
  * fix broken code
  * fix cannot set cookie when response is written
  * began work on react query editor props and integration
  * Added data source type to explore state
  * updated snapshot
  * renaming DataSource type to DataSourceSettings and moved
    to grafana ui
  * Fixed issue with team and user picker, fixes #14935
  * Moved data source and data query types
  * Moved plugin types to @grafana/ui
  * log fix
  * inital code for rotate
  * wip: moved plugin exports
  * build: usage instruction for repo test.
  * build: comments
  * Minor fix scrollpos when duplicating
  * build: updates ci deploy.
  * build: fixes the path for gsutil and gcloud.
  * build: fixes permissions issue.
  * removed unused props from angular query component
    interface
  * Additional query editor row tweaks
  * Query editor row in react is working
  * shortening callback functions
  * Explore: Fix datasource selector being empty with single
    datasource
  * Scroll to top when visualization picker is opened
  * Made scrollbar have scrollTop and setScrollTop props so we
    can control scroll position
  * build: only build amd64 for enterprise.
  * azuremonitor: guard for when switching from monaco editor
  * azuremonitor: move files into grafana
  * Query editor row react progress, buttons working
  * build: test script for rpm repo.
  * chore: Replace the deprecated SFC with FC
  * chore: Wrap footer with React's memo hoc
  * chore: Reduce code duplication by letting the page
    component adding the header and taking care of the page
    title
  * mini stylefix to select component
  * cloudwatch.md - quick typo fix
  * removing Label and going with FormLabel
  * Use light theme in storybook
  * Toggle edit mode works
  * login users based on token cookie
  * test: Update snapshots and mocks
  * build: deb repo update test usage instructions.
  * fix: Use Page component on 'Api Keys' and 'Preferences'
    under Configuration
  * build: uploads binaries before metadata in deb repo.
  * feat: Generate page titles from navModel
  * test: Updated snapshots
  * chore: Better way of getting the body node
  * chore: Reactify footer
  * fix: Add Pages component to Plugins and TeamList
  * fix: Configuration: Users should also use the Page
    component
  * feat: Possibility to change document title on pages using
    the Page component
  * fix: Add CustomScroller on DataSources page
  * fix: Proper types for linter
  * test: Snapshot update
  * fix: Fix import path after Scrollbar move to @grafana/ui
  * POC of page layout component
  * Added uid to AlertNotification json
  * Converted notification id to uid via fmt for old alert
    notification settings
  * Returned id for alert notifications which were created
    without uid
  * Formatted errors to err
  * Using func InitNotifier for verifying notification
    settings
  * Added uid for alert notifications
  * Renamed validation funcs for alert notification
  * Commented alert_notifications sample config
  * Instantiating notifiers from config before using
  * Added parameter org_name of alert notification to
    documentation
  * Added orgName parameter for alert_notifications
  * Added alert_notification configuration
  * redoing input props
  * another minor style change
  * More style tweaks to thresholds
  * fix: Manually trigger a change-event when autofill is used
    in webkit-browsers #12133
  * move styling
  * renaming after pr feedback
  * minor style change
  * wip: testing new query editor row design
  * Removed snapshot
  * Refactored ValueMappings
  * Moved ValueMappings to grafana/ui/component and renamed it
    ValueMappingsEditor
  * Moved Label to grafana/ui/components
  * build: repo update testable and more robus.
  * Experimenting with generating doc for ui component
  * Move action properties to payload
  * Fixed small bug with entries outside the min max values
  * Fixed NaN issue when parsing
  * Remove BasicGaugeColor from state
  * Fixed so that we can not change base threshold
  * Fixed so added threshold colors are always unique
  * Fixed issue with changing value not changing index
  * Fixed styling for small screens
  * Reordered the input row
  * Fixed the circle
  * Fixed styling
  * Refactored logic in ThresholdEditor
  * File organization, action naming, comments
  * Fix reducer issues
  * Connect Explore child components to store
  * Update comments
  * Move types to types/explore
  * Save state in URL and fix tests
  * Allow multiple Explore items for split
  * WIP Explore redux migration
  * Fixed a bug with prefix and suffix not showing when using
    value mappings
  * fixing imports, minor fix on mapping row
  * test and minor fix on mapping row
  * updated snapshot
  * Added suffix interpolation
  * Scrollbar select fix
  * Remove duplicated import
  * Initial commit
  * changelog: adds note for #14795
  * Move ColorPicker leftovers to @grafana/ui
  * inject login/logout hooks
  * begin user auth token implementation
  * utils
  * fix: It should be possible to scroll in the unit picker
    before selecting a value #14871
  * fix go fmt
  * [Feature request] MySQL SSL CA in datasource connector
    https://github.com/grafana/grafana/issues/8570
  * removes debug2 logging
  * removes error2 logger
  * WIP: good progress on react query editor support
  * Updates to latest checking.
  * 5.4.3 changelog
  * changelog: adds ntoe about closing #12864
  * fix that alert context and result handle context do not
    use the same derived context.
  * docs: add a title to the Explore docs
  * stackdriver: converts some variables from any to types
  * FormGroup component and implements
  * Restored http settings directive that was hidden in an
    unused angular controller page
  * stackdriver: small fixes after reactifying
  * changelog
  * stackdriver: add help text for bucket alias
  * Prometheus: Fix annotation step calculation
  * stackdriver: fixes space before caret icon in query editor
  * Fixed Syntax for folder permission's JSON
  * avoid infinite loop in the dashboard provisioner
  * build: fixes release problems.
  * changelog: add notes about closing #5968
  * wip: another wip commit
  * Moved panel editing components to it's own folder
  * removed old unused angular stuff, rename
  * wip: react query editors
  * Move panel width/height calculation to PanelChrome
  * Updated singlestat to use new value format function syntax
    and capitalized unit categories, fixes #12871
  * build: build specific enterprise version when releasing.
  * Fixed Gauge being cropped when resizing panel
  * units: adds back velocity units. Fixes #14851
  * Fix bug tls renegociation problem in Notification channel
    (webhook) #14800
  * Fix Error 500 on unexisting /api/alert-notification/&lt;id&gt;
  * updated snapshot
  * Minor renames and other fixes
  * pushover: add support for attaching images (closes #10780)
  * panel option section moved to grafana-ui and new panel
    option grid component
  * Simplified folder structure in grafana-ui lib
  * Addedd assertions about raw time range when panel time
    overriden
  * Panel time override tests
  * add feedback to what interval is being used (calculated in
    the backend)
  * use typings for ds and template srv
  * value formats: another rename and updates code to use new
    valueFormats func
  * value formats: renamed folder
  * Reverted move of defaults for GaugePanelOptions
  * refactoring alias by
  * Move Select styles to grafana/ui
  * Moved defaultProps to ui/components
  * Moved the rest of Threshold dependencies to ui/components
  * Renamed Threshold files
  * Renamed Thresholds to ThresholdsEditor
  * Moved Thresholds and styles to grafana/ui/components
  * Removed default export for colors
  * Fixed typings
  * Small change in SeriesColorPickerPopoverProps
  * Moved colorpicker to ui/components
  * Fixing test and small refactor
  * Moving to grafana ui, fix issue with TestRuleResult
  * Fix panel time overrides not being applied fully
  * access scope directly from this. update tests
  * build: makes sure all builds use the latest container.
  * changelog: docker images for arm.
  * Renamed Select related components: Picker* to Select*,
    Option* to SelectOption*
  * build: removes curl install from build.
  * build: tags arm as well as amd64 as latest.
  * Docker image for ARM
  * Fixing TS and updating snapshot
  * make sure frequency cannot be zero
  * refactoring. fix broken test
  * Migrate Select components to @grafana/ui
  * provide angular directive scope props correctly
  * docker: enable flux in influxdb docker block
  * Moved Thresholds and styles to grafana/ui/components
  * Update README.md
  * 11503: escape measurement filter regex value
  * 4075: Interpolate tempvar on alias
  * rename
  * fixing unitpicker
  * removing tests
  * React graph panel options component rename
  * Minor refactor of Gauge panel
  * Revert 'Docker image for ARM'
  * Revert 'build: fixes docker push.'
  * build: fixes docker push.
  * feat: Add brand as tooltip theme and use it on panel edit
    tabs #14271
  * Docker image for ARM
  * fix broken test
  * chore: Remove ScrollBar component, superseded by
    CustomScrollbar
  * Update storybook static files option to load statics
    correctly
  * unregister event listener correctly
  * Changes after PR comments
  * Removed unused refClassNameprops from Propper
  * Fixed a small bug when toggling items in toolbar
  * build: deploys enterprise to its own repo.
  * build: inline docs
  * build: publishes beta releases to separate repos.
  * refactoring
  * build: makes repo update enterprise compatible.
  * build: uses official deployment image.
  * build: adds aptly and createrepo to deploy tools.
  * build: handles unexpected cases.
  * build: only adds the correct packages to the repo.
  * build: rpm repo deploy.
  * build: repo update input error.
  * build: release of debs to our debian repo.
  * Added tests for TestRuleButton
  * Removed Test Rule button from Angular and view
  * Added TestRuleButton
  * Hint for user on when the repeat is applied
  * Removes unnecessary warnings from webpack output about
    missing exports
  * Use factors for max repeated panels per row
  * Fixing TS errors and updating snapshot
  * Move Portal to @grafana/ui
  * chore: Move sass code related to custom scrollbar into
    @grafana/ui #14759
  * Post merge updates
  * chore: Move CustomScrollbar to @grafana/ui #14759
  * changed light theme page background gradient
  * WIP
  * Max number of repeated panels per row
  * wip
  * Make tooltips persistent when hovered
  * docs: rpm/deb beta repo.
  * update snapshot
  * add form grow
  * fix: Clean up per PR feedback. Thanks @dprokop
  * removing duplicated things
  * minor code refactor
  * splitting into more files
  * Moved AlertTab and StateHistory to app/features/alerting
  * fix: When loki is default data source, datasource is
    passed as undefined to QueryOptions #14667
  * remove redundant max-width. it's already declared in
    gf-form-select-box__menu-list
  * add typing for metric descriptor
  * Removed unused Popover component
  * Update components to fit updated PopperController API
  * make templateSrv a prop
  * Refactored withPoper HOC to PopperController using render
    prop
  * use correct event handler name convention. register
    directive on startup
  * fix: Remove the onRenderError prop and add an
    ErrorBoundary component
  * replace fragment with empty jsx tags
  * refactoring tests
  * ugly fix. will be removed later on
  * adds note for #13914 and #14581
  * moved all units
  * fix: GraphPanel should be a PureComponent
  * fix more broken tests
  * feat: Display error when plot fail to render
  * wip: fix broken tests
  * adding more units and functions
  * Remove the jump effect on run query button
  * ugly temporary fix for scope issue. will be removed later
    on
  * refactoring
  * fix filter bug
  * fix: Light theme corner bg color update
  * set max width on the whole menu list instead
  * bind array instead of function
  * feat: Add 'theme' to Tooltip
  * Notify user on query error
  * Revert 'Revert 'add max width to group header
    description''
  * Revert 'add max width to group header description'
  * remove not used property
  * fix broken tests
  * use correct type for select option
  * set issearchable default value to true
  * make variable type more slim
  * remove group name from select component. let the parent
    set group name instead
  * move component to components dir. also move directive
    registration out from datasource
  * add template variable type
  * rename template variables prop
  * rename selected prop
  * rename searchable prop
  * improve component performance
  * add max width to group header description
  * remove debug logging
  * rollback test state to before template variables were
    added
  * cleanup
  * move template variable logic to component
  * remove extra arrow div
  * fix condition that expands group if it has a selected
    child. also make it possible to pass expanded as a prop
  * align input widths
  * remove console log
  * rename directive
  * remove linebreak
  * remove old group heading
  * use new generic picker
  * remove on metric type change
  * fix remove filter bug
  * use same color for label as in explore dropdown
  * cleanup query filter
  * update failing tests
  * remove redundant default value
  * use new option group in aggregation directive
  * remove redundant default value
  * wip: add option group component
  * wip: add basic option header
  * Wrap react select component in angular directive
  * updated scrollbar snapshot
  * remove not used files
  * Fixed new gometalinter issues
  * fix JSON in responses for Admin API documentation
  * 14722 - removing unnecessary arn check that breaks assume
    role feature in other AWS partitions
  * Fixed issue with cut legend in firefox &amp; mobile devices,
    fixes #14744 and #14489
  * Some cleanup
  * EqualFold()
  * forgot go fmt
  * pull connection string args from url instead
  * Add mean on distribution as well
  * docs: updated debian and centos repo.
  * Fix stackdriver aggregation series merge
  * first stuff
  * Updated documentation for new macros
  * Minor refactoring of EditorTabBody
  * Fixed timepicker css issue introduced by PR #14700 and
    remove hotfix from 297241c
  * AlertTab style fixes
  * Updated alert tab layout &amp; markup
  * Changed datasource list page default layout mode
  * Fixed timepicker css issue introduced by PR #14700
  * Added macros to mysql
  * FIxed syntaxis mistake unixEpochNanoFrom and
    unixEpochNanoTo
  * Added previous macros to mssql
  * Added unixEpochNanoTo and unixEpochNanoFrom macros to
    postgresql
  * Renamed unixEpochFilterNano to unixEpochNanoFilter
  * cleanup
  * add aggregation tests
  * add tests
  * Fix issue with value disappearing when selecting stat
  * Fixing issue with value color being wrong
  * initial design for way to build value formats lazily and a
    backward compatability layer via Proxy
  * fix template variable bug
  * Don't cut off subsecond precision for postgres macros
  * Nanosecond timestamp support postgresql
  * remove not used file
  * Fixed new gotmetalinter warning
  * add support for defining additonal database connection
    string args via extra_connection_string_args
  * clear history
  * cleanup. remove comments, not used files etc
  * state history tab
  * fix broken tests
  * use correct type for select option
  * set issearchable default value to true
  * make variable type more slim
  * remove group name from select component. let the parent
    set group name instead
  * move component to components dir. also move directive
    registration out from datasource
  * add template variable type
  * rename template variables prop
  * rename selected prop
  * rename searchable prop
  * improve component performance
  * add max width to group header description
  * remove debug logging
  * rollback test state to before template variables were
    added
  * cleanup
  * move template variable logic to component
  * remove extra arrow div
  * fix condition that expands group if it has a selected
    child. also make it possible to pass expanded as a prop
  * align input widths
  * remove console log
  * rename directive
  * remove linebreak
  * remove old group heading
  * use new generic picker
  * remove on metric type change
  * fix remove filter bug
  * use same color for label as in explore dropdown
  * cleanup query filter
  * update failing tests
  * remove redundant default value
  * use new option group in aggregation directive
  * remove redundant default value
  * wip: add option group component
  * wip: add basic option header
  * Wrap react select component in angular directive
  * s/initialDatasourceId/initialDatasource/
  * add alert in react instead of angular
  * Fixed issues with panel size in edit mode, fixes #14703
  * hide protip if not defined
  * fix filter bug
  * add help text component
  * Tweak datetime picker layout for mobile
  * Explore: Remember last use datasource
  * Update yarn.lock
  * Logs data model: add more log levels
  * Review feedback
  * Explore: fix loading indicator z-index on panel container
  * Loki: change query row to be single field again
  * Explore: logging UI style fixes
  * Loki: query limit configurable in datasource
  * Removed rxjs compat
  * ldap: adds extra debug logging
  * reactify annotation query editor
  * adds orgId to user dto for provisioned dashboards
  * Update rxjs
  * closes the body properly on successful webhooks
  * makes cache mode configurable
  * Fix general tab typos
  * added node-sass as dev dependency, needed after I removed
    grunt-sass
  * Husky and sasslint fixes, fixes #14638
  * Added a form component to @grafana/ui
  * created visualizations folder
  * Fixed JQuery typing issues
  * Typings issues
  * wip: moving react graph component to grafana/ui
  * Don't do a full frontend release build in test-frontend
    job, added typescheck (tsc noEmit) instead, fixes #14639
  * Moved sass for component to @grafana/ui lib
  * Moving a couple of types to @grafana/ui
  * Testing moving out one type to grafana/ui
  * Increased margin between controls in logs panel, fixes
    #14637
  * Fixed dashboard links not updating after variable or time
    range change, fixes #14493
  * Fixed group button tooltip placement from auto to bottom,
    fixes #14634
  * Removing erroneous backtick in docs
  * Updating docs for auth_proxy whitelist CIDR support
  * Add timestamp back to log entry type
  * Update
    public/app/plugins/datasource/loki/result_transformer.ts
  * Loki: fix timestamp field
  * Fixed panel height &amp; scroll issue with flexbox in firefox,
    fixes #14620
  * remove segment srv prop
  * use ds template srv reference
  * remove not used stuff
  * add event handler
  * add help component
  * Add support for InfluxDB's time zone clause (backend)
  * note to future me
  * delete works
  * grunt test task update
  * Add support for InfluxDB's time zone clause
  * @grafana/ui lib now contains one components, seperate lint
    &amp; tsc steps
  * changelog: add notes about closing #14519
  * Grafana ui lib is starting to work
  * typings and renamings
  * breaking up grafana into multiple packages poc
  * add project and help component
  * add alias by component
  * add alignment periods component
  * cleanup aggregation picker
  * move alignment population code to parent component. make
    alignment a stateless component instead.
  * flatten target obj
  * Grafana ui library poc
  * elasticsearch: support bucket script pipeline aggregations
  * Add units for blood sugar concentration 💉
  * on deselect when reducer is set to none
  * add alignment component
  * Fixes undefined issue with angular panels and editorTabs
  * changelog: adds note about closing #14562
  * refactor aggregation picker
  * use render props pattern
  * Update field name
  * Add documentation
  * use template variable prop
  * cleanup
  * Rename the setting and add description
  * export init notifier func
  * render editor toolbar buttons
  * Increase recent and starred limit in search and home
    dashboard, closes #13950
  * changelog: adds note about closing #14486
  * Panel help view fixes
  * rewrite angular view
  * Add min/max height when resizing and replace debounce with
    throttle
  * changelog: adds note about closing #14546
  * Adding tests for auth proxy CIDR support
  * fix only add column if not exists for mysql
  * changelog: adds note about closing #14109
  * fix handling of indices with multiple columns (mysql)
  * fix only create/drop database indices if not exists/exists
  * fix signed in user for orgId=0 result should return active
    org id
  * Another take on resizing the panel, now using
    react-draggable
  * only update session in mysql database when required
  * Raise datasources number to 5000
  * improve component performance
  * add max width to group header description
  * copy props to state to make it visible in the view
  * remove debug logging
  * rollback test state to before template variables were
    added
  * cleanup
  * move template variable logic to component
  * remove extra arrow div
  * refactor to not crash when no links
  * updating snaps
  * renaming component
  * panel help working
  * snapshots: Close response body after error check
  * fix condition that expands group if it has a selected
    child. also make it possible to pass expanded as a prop
  * align input widths
  * Update sample and default configs
  * Add OAuth provider flag to indicate if it's broken
  * Register BrokenAuthHeaderProviders if needed
  * Add units for Floating Point Operations per Second
  * remove console log
  * rename directive
  * remove linebreak
  * remove old group heading
  * use new generic picker
  * remove on metric type change
  * fix remove filter bug
  * use same color for label as in explore dropdown
  * cleanup query filter
  * update failing tests
  * remove redundant default value
  * use new option group in aggregation directive
  * remove redundant default value
  * wip: add option group component
  * wip: add basic option header
  * Wrap react select component in angular directive
  * Minor update
  * Make sure panel id is unique since some datasources
    (Graphite) will cancel ongoing requests with the same
    panel id
  * changelog: adds note about closing #14548
  * Adding CIDR capability to auth_proxy whitelist
  * Minor cleanup now that angular panel edit is no longer
  * Gauge option form markup fixes
  * toolbaritems viztab
  * filter out table responses that don't have columns and
    rows
  * enable goto explore from query panel editor for all
    datasources
  * started with component for generic panel help
  * moves migrations to /sqlstore/migrations
  * adds integration tests to ci build
  * renames main lock function
  * clean up integration tests
  * change from db_text to nvarchar
  * adds server lock package
  * initial verison of server lock
  * Minor react graph panel refactorings and fixes
  * sorting tests for change value
  * Fixes issues with user and team picker
  * fixing coloring
  * upgrade to golang 1.11.4
  * remove printed index
  * updating test
  * adding threshold
  * Refactoring react graph
  * updated dropdown typeahead to place down instead of up,
    works better when inside scrollable area
  * minor style tweak
  * propagate initial state back to explore query runner
  * Update gitlab.md
  * Update github.md
  * minor style fixes
  * Updated snapshot
  * Switched to react-select fork
  * ldap: upgrades go-ldap to v3
  * table: fixes #14484. Renders epoch string if date column
    style
  * changelog: adds note for #14483
  * Fix for no metrics panels, now goes to viz tab and does
    not show queries tab
  * minor style fix
  * minor change to table panel edit options
  * minor tweaks to text panel
  * Fixes and cleanup
  * Show predefined time ranges as first in timepicker on
    small screens
  * code cleanup in add panel, and switched off grid css
    transforms to fix z-index issuse
  * minor tweaks to alert tab
  * fixed name of alert tab
  * removed unnessary test
  * updated add panel a bit
  * minor style fix
  * updated snapshot
  * fixes to unit picker
  * updates on thresholds component
  * remove check on axis.used in flot #13765
  * Added custom scrollbar to select component
  * removed a test that isn't neccessery any more
  * replaced content in addpanelpanel with three buttons that
    can create new panel, paste copied panel, and add a new
    row, to paste panel one must copy one first, code is still
    quite rough
  * fixed cloudwatch issue
  * select refactor fixes
  * gauge working without thresholds
  * changin colors
  * explore using data source picker
  * fixing issue with copy invite link
  * getting closer with no thresholds
  * renamed folder to select
  * User picker using common select componnet
  * wip: unifying select components
  * fixing input unit test failure
  * fixed issue with switching panels
  * refactored panel-option-section into react component
  * removed console log
  * updated styles
  * starting with threshold refactor
  * wip: convert angular directives to react components
  * wip: style change progress
  * Update latest.json
  * wip: styles are starting to come together
  * wip: styles
  * wip: testing new styles
  * wip: style changes
  * fixed ordering changing panel types, fixes issues with
    loading panel options
  * moving min/max to gauge options
  * log error when resolvePath
  * wip: minor style changes
  * wip: changes
  * break out metric picker and filter
  * migration: renames logging ds to loki ds in data_source
    table
  * loki: updates the logo
  * fixing tests
  * mixing color when
  * wip
  * wip
  * remove on metric type change
  * things are working
  * fix remove filter bug
  * use same color for label as in explore dropdown
  * cleanup query filter
  * changelog: add notes about closing #8843 #11175
  * fixed unit tests
  * update failing tests
  * remove redundant default value
  * wip
  * wip
  * redone state
  * display value map or range map
  * add oauth_auto_login setting to defaults file
  * use new option group in aggregation directive
  * wip
  * remove redundant default value
  * Adding mixed query
  * Check with lowercase
  * wip metrics tab changes
  * changelog: adds note about closing #13754
  * wip: making things work again
  * React-select refactorings
  * wip: add option group component
  * wip: add basic option header
  * wip: react select css refactoring
  * docs: fix broken link on explore page
  * wip
  * changing type and started on Gauge
  * fix threshold test
  * Adding label
  * styling on dropdowns
  * Using drop down instead
  * Filter tags select box on text input #14437
  * fixed id bug
  * Using an id to identify mappings
  * Change KeyboardNavigation from hoc to render prop
    component
  * Clean up hoc and extend component props automatically
  * Let VizTypePicker use the keyboard navigation hoc
  * Moved more metrics tab to react
  * Wrap react select component in angular directive
  * Don't show heading for first tab
  * snapshots: Add support for deleting external snapshots
  * docs: explore
  * snapshots: Move external snapshot creation to backend
  * snapshots: Add external_delete_url column
  * Add keyboard navigation to datasource picker via a hoc.
  * Use react's onKeyDown event on the input instead of event
    listener on document
  * Explore: Improved line parsing for logging
  * fixed typings and remove
  * updated publish script
  * Unmount component when fading out to reset its state, such
    as search..
  * Variable rename. Did not make sense at all.
  * Fix styling for vizPicker keyboard nav and change so only
    arrow up/down is OK to use
  * fixed styling
  * Start adding keyboard navigation to VizPicker
  * use links instead of bridge network
  * fix time regions bugs
  * fixed issue with colorpicker position above window, fixes
    #14412
  * fixed issue with singlestat and repeated scopedVars, was
    only working for time series data sources, and only if
    there was any series, now scoped vars is always set, fixes
    #14367
  * fix search tag issues, fixes #14391
  * Clear query models when changing data source type, fixes
    #14394
  * fixed issue with grid responsive mode
  * fixed max height issue not being respected by react select
    dropdown
  * removed side menu for column styles, added small header to
    column styles with a border
  * Use correct variable name in fail text
  * Fix search field styles
  * Enable search also after editing
  * Explore: Split logging query into selector and search
  * Fix logs panel meta wrap
  * Explore: dont pass all rows to all rows, fixes profiler
  * Explore: Logging dedup tooltips
  * Explore: Hide scanning again after result was found
  * Explore: Fix timepicker inputs for absolute dates
  * Switch to global match for full browser support of escaped
    custom vars
  * Allow backslash escaping in custom variables
  * Fixed issue with logs graph and stacking
  * align yellow collor with graph in logs table
  * minor style change
  * Add the AWS/SES Cloudwatch metrics of BounceRate and
    ComplaintRate.  Pull request #14399
  * logs style polish
  * allow sidemenu sections without children still have a
    hover menu/header
  * explore logs options styling
  * transparent toggle style and new button group style
  * Toggle buttons
  * render a value mapping row
  * removed side menu from display options, kept overrides in
    display options, moved thresholds and time regions to its
    own section in visualization
  * changelog: adds note about closing #11221
  * removes unused code
  * fixes merge error
  * remove result format. might add this later
  * filter out build in datasources. add unit test
  * click on dashboard title moves you back to dashboard
    instead of search
  * graphInterval needs to update after query execution, fixes
    #14364
  * Explore: Parse initial dates
  * Aligned styling of stats popover/box with rest of grafana
    &amp; minor css refactoring
  * Remove Explore &gt; 'New tab' from sidebar
  * initialize empty variables array in constructor so that
    datasources can use the array in explore
  * Prometheus: Make result transformer more robust for empty
    responses
  * add table support flag in influx config
  * add scoped vars to query options
  * Rebase fixes
  * Explore: Logging line parsing and field stats
  * fixed unit tests
  * made unknown color theme aware and sync with graph color,
    some minor cleanup
  * initial stuff
  * Explore: improve error handling
  * use render props instead of cloneElement
  * sort of a hacky way to figure if the small variation
    should be used for the label
  * add basic button group component, using the the same label
    style as is
  * Restore PluginEditCtrl accidently removed
  * explore logs styling
  * wip: alternative level styling &amp; hover effect
  * wip: explore logs styling
  * more detailed error message for loki
  * If user login equals user email, only show the email once
    #14341
  * UserPicker and TeamPicker should use min-width instead of
    fixed widths to avoid overflowing form buttons.  #14341
  * wip: explore logs styling
  * restoring monospace &amp; making sure width are correct when
    hiding columns
  * fixed logs to time series calculation issue, increased
    bucket size, fixes #14248
  * Always open panel links in new window if user asked for it
    #14333
  * Changing from PureComponent to Component to re-render on
    link updates made in Angular #14333
  * minor tweaks, now table renders faster and changes less on
    second stage rendering
  * explore logs css refactoring, step1
  * explore logs styling poc, WIP
  * Fix transparent option #14333
  * Add prop key to panelPropsString to avoid a bug when
    changing another value and the render doesnt trigger
  * loki: adds proper error handling for config page
  * renames Grafana Logging ds to Loki
  * Pass some panel props down as strings to trigger render
    #14333
  * Trigger panel.render on title, description, links change
    #14333
  * Put issue number to test code
  * Fix bug what updating user quota doesn't work
  * Fix bug what updating org quota doesn't work
  * public/app/plugins/*: Fix some misspell issues
  * public/sass/*: Fix misspell issue
  * public/app/features/*: Fix some misspell issues
  * public/app/core/*: Fix some misspell issues
  * README.md: Fix small typo
  * fix snapshots
  * Added isDefault switch on settings
  * fix to switch component
  * Rename BodyPortal to Portal and accept prop 'root' which
    is where the portal should be placed
  * Create a portal and use it with our popper component
    (tooltip and popover) to avoid potential
    overflow-/zindex-bugs
  * add icon
  * explore data source selector fix
  * Update css to use the border-radius variable and add a new
    variable for the popper's distance to its ref
  * Update README.md
  * fix for panel-initialized event not being called
  * refactored and added tests for panel model remember
    properties
  * redact value for plugin proxy routes
  * pkg/*: Fix misspell issues
  * fix for panel embedding. Solo panel height was not
    correctly set. Made panel--solo into panel-solo class. in
    develop branch we have remove the need for the panel class
  * added support for influxdb cumulative_sum function in tsdb
  * Use buildTableConstraint instead of buildSchemaConstraint
    to find the datatype of a column if using a table from a
    different database schema
  * Readme: We should write Node.js the same way in all places
    in the readme
  * Small tooltip css-adjustments and add css for position
    'bottom-start' used by the panel header corner
  * Explore: Display duplicate row count as number
  * Adapt styles
  * Explore: Logging query live preview of matches
  * added max-widths to explore start pages boxes
  * Alert tab fails when datasource method
    targetContainsTemplate doesnt exist #14274
  * improve comments
  * fixed promql and loggging syntax so all punctuation chars
    are treated the same, remove hover move
  * remove all query empty related code. root cause of the
    problem was to fix hasNonEmptyQuery
  * Let the cached props from previous visualization be the
    masters, unless specified in keepLatestProps const
  * POC on how to save away settings from a viztype and
    restore when switching back to it #14274
  * remove redudant spread
  * Set query empty condition in render function. Also clear
    query transactions when no valid query is present
  * Remove query empty from model
  * fixed logging start page
  * Use popover styles for stats popover
  * Fine tune stats styles
  * Tests for label stats calculation
  * Explore: Logging label stats
  * stop scanning when clear all button is clicked
  * build: update latest when pushing docker.
  * Use origin meta
  * only display scan button if there is at least one existing
    selector that returned an empty result
  * minor refactoring
  * Explore: return to grid layout for logs table
  * Add VizPicker search #14274
  * changelog: add notes about closing #11067
  * fixed grabage in markup
  * fix: align input backgrounds for code editors
  * fixedUnit for Flow:l/min and mL/min
  * feat: #11067 prevent removing last grafana admin
    permissions
  * another style fix for broken dark theme word highlight
  * fix time regions using zero hours
  * Misc styling fixes to explore: start page, slate code
    editor colors, text highlight in auto completeter
    suggestion
  * Revert commit
  * only make it possible to scan for older logs if there is
    at least one non failing selector
  * update package.json to next version
  * Stick to .tsx? for babel file test
  * changelog: add notes about closing #13815
  * changelog: add notes about closing #14246
  * arrow function
  * changelog: add notes about closing #12653
  * fix for add/remove labels
  * Hid 'Forgot your password' link from login menu when reset
    is disabled
  * Prevent password reset when login form is disabled or
    either LDAP or Auth Proxy is enabled
  * fix for initial options
  * minor css fixes
  * update changelog
  * update latest.json to latest stable version
  * new stable docs version
  * minor css fix
  * redid props for gauge options
  * dataproxy: Override incoming Authorization header
  * changelog: add notes about closing #14228
  * Explore: Show logging errors from backend
  * change obj order when merging so that correct format is
    being used
  * Explore: Fix logging query parser for regex with
    quantifiers
  * Update README.md
  * Fixed typo in function name
  * Explore: Fix label and history suggestions
  * tidy import
  * let each sql datasource handle timeFrom and timeTo macros
  * style changes for panel placeholder (move and resize)
    effect
  * never load fallback query field. remove commented code
  * add an error alert component that will be displayed when
    there was an error loading ds in explore
  * fix: minor style changes, removed hover scale increase
  * react-panel: Add nullcheck to prevent error on datasources
    without meta options
  * react-panel: Options button should always be enabled now
    when Time Range-options are there
  * react-panel: Move time range options to its own component
    and render it under the options button instead
  * created color enum
  * make sure target obj is not destructured so that angular
    copy of objected can be mutated
  * Review feedback
  * react-panel: Add test for Input with validation on blur
  * react-panel: Input validation should be optional
  * react-panel: Clean up input validation and increase code
    readability
  * react-panel: Time range options moved to 'Queries' tab
  * react-panel: Remove mock response button for now
  * react-panel: Remove comments and improve readability in
    render()
  * react-panel: Use correct type for children prop to avoid
    the use of fragments &lt;&gt;&lt;/&gt;
  * react-panel: Remove json-formatter-js since we will
    continue with the 'patched' version
  * react-panel: Move all query inspector logic into
    QueryInspector component and start with the 'Mock
    response'
  * react-panel: Toggle Expand/Collapse json nodes in Query
    Inspector
  * react-panel: Add CopyToClipboard-component and separate
    QueryInspector to its own component from QueriesTab
  * react-panel: Trigger panel refresh when opening inspector.
    Add loading-message
  * react-panel: Replace JSONFormatter npm package with the
    current monkey patched JsonExplorer
  * react-panel: Clean up the JSONFormatter and make sure it
    updates both on mount and when props update
  * react-panel: Get real datasource query for query inspector
  * react-panel: Create component for JSON formatting and use
    it on query inspector
  * changelog: add notes about closing #14167
  * make getAll return array instead of object
  * remove obsolete test
  * Update README.md
  * Add AWS/CodeBuild namespace for CloudWatch datasource
  * Fixed styling issues with new checkbox style
  * Fix other misspell issues
  * docs/*: Fix misspell issues
  * CHANGELOG.md: Fix misspell issues
  * Explore: Logging render performance
  * remove log
  * min and max value
  * update gauge on remove threshold
  * user added thresholds state
  * console logs and code layout
  * pass data correctly to event handler
  * revert Label change
  * update color on gauge when changing
  * remove explore check - make it possible to load all
    datasources
  * add table support flag for stackdriver
  * add table support flag for prometheus
  * add table support flag for postgres
  * add table support flag for opentsdb
  * add table support flag for mysql
  * add table support flag for mssql
  * add table support flag for logging
  * add table support flag for graphite
  * added google_tag_manager_id from defaults.ini
  * removed extra whitespace
  * Update export_import.md
  * added new icons, fixed so different icons in different
    themes, added animation to hover on icons, styled choose
    visualization and datasource for both themes, made som
    styling adjustments to whole panel editor
  * sorting tests
  * remove border
  * color indicator
  * add new flag in order to be able to indicate whether the
    datasource has native support for tables
  * prevent explore from crashing when table is not present in
    response
  * Explore: Logging label filtering
  * Logging: fix query parsing for selectors with multiple
    labels
  * using percentage to not hide search when smaller screen
  * build: explaining the linux build.
  * check for null with toLocalString (#14208)
  * Fix elastic ng-inject (build issue) (#14195)
  * add current editor to panel targets
  * Added stop scan button
  * Explore: Scan for older logs
  * color picker
  * remove time srv initialization
  * restructure imports
  * get intervals from explore function
  * unregister all query editor event listeners
  * remove comments
  * temp remove until stackdriver implements explore
  * sort on value
  * use default range from time picker
  * Requested Backend changes, removed link in popover
    description for the offset field
  * Remove confusing &lt;&gt; from variable intro
  * includes ranges correctly in the options object
  * docker: Upgrades base packages in the images.
  * small fixes
  * logic for adding rows, styling
  * chore: correct pause-all-alerts auth in docs
  * Requested Backend changes, added details to popover
    description for the offset field
  * Explore: Fix JS error when switching between 2 prometheus
    datasources
  * color touches
  * Add support for Offset in elasticsearch datasource,
    date_histogram aggregation, fixes grafana #12653
  * Fix tests to account for sortText
  * build: always test publisher.
  * build: packages linked to dl.grafana.com.
  * Fix tests to account for loglevel long names
  * Explore: Filter logs by log level
  * styling
  * created test for some functions
  * update changelog
  * mock interval data
  * fix handle of elasticsearch 6.0+ version
  * rename variable
  * hide row specific buttons when query editor is rendered
    from explore
  * add support for explore events
  * minor style fix
  * minor fixes
  * docs: various fixes of what's new in v5.4
  * use plugin_loader directly instead of using the wrapper
  * docs: fix old ldap url redirect
  * fixed issue with babel plugin proposal class properties
    that initiated properties to void 0. This breaks angularjs
    preAssignBinding which applies bindings to this before
    constructor is called. Fixed by using fork of babel
    plugin.
  * Explore: make query field suggestions more robust
  * Fix abbreviations of Litre/min and milliLitre/min (#14114)
  * Sort Prometheus range suggestions by length
  * docs: what's new in v5.4
  * Explore: swtiching to logging should keep prometheus
    labels in case of error
  * tweaks to gf-inline-form style PR #14154 change
  * adding back button
  * styling tweaks
  * initial commit
  * docs: signout_redirect_url description in auth overview
  * minor style changes
  * Sticky footer for all pages
  * edit mode styling
  * edit mode styling
  * edit mode styling
  * Added comments
  * style tweaks
  * render and sort
  * return actual error if failing to update alert data
  * Fix issue with deleting a query (empty string not
    updating)
  * Fix history rendering for DataQuery
  * margin when listing multiple gf-form should be right
  * styling progress
  * Fix a typo
  * panel edit ux experiments
  * changelog: add notes about closing #14150
  * temporary fix for starting grafana not running systemd
  * cloudwatch: handle invalid time ranges
  * cloudwatch: recover/handle panics when executing queries
  * Combine query functions
  * Renamed targets to queries
  * added icons for panel-edit side menu
  * updates time range options for alert queries
  * format: remove &lt;/input&gt; and align tabs
  * updating state
  * Explore: Introduce DataQuery interface for query handling
  * Fix set utilities for explore section
  * typos in docs/sources/alerting/rules.md
  * typos in docs/sources/alerting/rules.md
  * fixed failing graph tests
  * gfdev: fixes unparseable for duration
  * fixed issue with new legend not checking if
    panel.legend.show
  * gfdev: adds alert always in pending state
  * docs: adds example timeline for alerting for
  * build: docker build for ge.
  * react-panel: Avoid duplicate keys
  * added alert tab to new react panel editor
  * update path to alerting for image
  * started on thresholds
  * react-panel: Add data source 'options'. Needs UX, WIP.
  * update release publish script links
  * fixes to view mode for panels, can now go back as before
  * Add visibility toggle for explore graph series
  * what's new in v5.4 placeholder
  * fix label and default threshold
  * react-panel: Add data source 'help'
  * fix for issue with error view in production builds
  * changelog: adds note for #13561
  * update changelog
  * stackdriver: remove not used variable
  * fixed menu to go to panel view mode
  * stackdriver: use angular dropdown so that we can restrict
    user input
  * stackdriver: make sure object type queries are also
    checked for vtemplate variables
  * minor style update
  * changelog: adds note about closing #13577
  * adds basic auth configuration to default.ini
  * added header section to legacy tabs
  * stackdriver: reset defaults.ini
  * changelog: add notes about closing #14120
  * changelog: add notes about closing #14129
  * switch slider changes
  * linters.
  * build: correct filters for ge build artifacts.
  * build: releaser supports releasing only some artifacts.
  * Revert 'docs: building Grafana on arm.'
  * Add doc for api 'GET /api/users/:id/teams'
  * Re-organize packages and add basic auth test
  * Revert 'Update google analytics code to submit full URL
    not just path'
  * Add Cloudwatch/CloudHSM Metrics and dimensionMaps
  * remove react warning
  * added chekbox and other tweaks
  * refactor options, show labels and markers
  * docs: building Grafana on arm.
  * stackdriver: add query keyword to service, metric and
    project since these were the only fields in the editor
    that was missing it in the whole editor
  * Explore: POC dedup logging rows
  * stackdriver: add query keyword style to query fields
  * stackdriver: fix failing test
  * stackdriver: reimplementing service variable query type
  * Revert 'typo fix'
  * typo fix
  * prefix and suffix
  * decimals
  * update snapshot
  * stackdriver: fix failing tests
  * changelog: add notes about closing #13352
  * changelog: add notes about closing #13810
  * changelog: add notes about closing #13605
  * changelog: add notes about closing #13876
  * changelog: add notes about closing #13946
  * changelog: add notes about closing #13555
  * changelog: add notes about closing #13425
  * changelog: add notes about closing #13655
  * stackdriver: update docs
  * stackdriver: add support for template variables
  * react-panel: Finish the data source search on query tab
    and start moving switch-data-source-logic from angular
  * linter.
  * fixed issue switching back from mixed data source,
    introduced by react panels changes
  * build: minor refactor.
  * build: fixes a bug where nightly rpm builds would be
    handled as stable.
  * some touch ups on unit
  * go meta lint errors
  * update changelog
  * builds: introduces enum for relase type.
  * fix group sync cta link
  * picker and functionaliy
  * fixed issue with panel size when going into edit mode
  * stackdriver: join resource and metric labels. split them
    in values and keys
  * changelog: add notes about closing #13924
  * build: table-driven tests for publisher.
  * fix id returned from google is a string
  * changelog: adds note about closing #7886 &amp; #6202
  * changelog: adds note about closing #11893
  * Fix param
  * Add GET /api/users/:id/teams for orgAdmin
  * Tooltip should be able to take up space when used on an
    absolute positioned element
  * minor fixes
  * panel-header: Move the corner information in the panel
    header to its own component
  * changelog: add notes about closing #12550
  * fix selected home dashboard should show as selected even
    though its not starred
  * panel-header: Move the panel description/links/error
    container outside of panel header to not interfere with
    the react-grid stuff
  * reload browser after preferences been updated
  * panel-header: Unmount popper when not needed.
  * fix snapshot tests
  * panel-header: Updated snapshots for popper
  * panel-header: Add fade in transition to tooltip
  * Trying to reduce the amount of duplication with
    preferences
  * panel-header: Make it possible to style the reference
    element and fix so panel description looks good
  * filter out alpha plugins in api call, fixes #14030
  * panel-header: Simplify condition
  * panel-header: Avoid undefined classNames and use the real
    panel description
  * panel-header: Updates for the new react-popper api and
    make it possible to hover the tooltip popper without it
    closing
  * panel-header: Bump @types/react, @types/react-dom, react,
    react-dom, react-popper to latest versions
  * panel-header: Display description in modal
  * update changelog
  * changelog: add notes about closing #11977
  * changelog: add notes about closing #6367
  * docs: team http api update
  * [elasticsearch] Do not set a placeholder to index name, if
    it's already specified.
  * changelog: adds note about closing #14043
  * fixed issue with save.
  * fixed mutability issue in dashboard dropdowns
  * Explore: Fix table pagination styles
  * team preferences ui
  * feat: team preferences
  * Explore: Dont set datasource in state if navigated away
  * fix switching from es raw document metric breaks query
    editor
  * alerting: reduce the length of range queries
  * Mitigate XSS vulnerabilities in Singlestat panel
  * Retain decimal precision when exporting CSV
  * Added Id to BasicUserInfo returns
  * Added google oauth account id
  * switch style tweaks
  * Explore: collapsible result panels
  * removing test page
  * format value
  * default value
  * created classes for new checkbox and variables
  * Prometheus: fix rules expansion
  * handle default value
  * various fixes to angular loading
  * Explore: POC for datasource query importers
  * build: enabled darwin build.
  * expand groups when searching
  * build: darwin compatible build env.
  * maxHeight and style overrides
  * moved slider into label to make it clickable, styled
    slider in dark and light theme, created variables for
    slider
  * fix: dont setViewMode when nothing has changed
  * fix redirect issue, caused by timing of events between
    angular location change and redux state changes
  * fix datasource testing
  * panel options now load even when changing type
  * fixed issues when changing type, need to remove event
    listeners and cleanup props
  * build: refactoring.
  * React edit mode for angular panels progress
  * minor fixes
  * fixed order of time range tab
  * Update ReadMe.
  * Update google analytics code to submit full URL not just
    path
  * devenv: elasticsearch datasources and dashboards
  * fix pipeline aggregations on doc count
  * changelog: add notes about closing #5930
  * fixed alert tab order and fixed some console logging
    issues
  * Add tooltip
  * some progress on groups and options
  * changed time region color modes
  * panel-header: Move the corner information in the panel
    header to its own component
  * changelog: add notes about closing #12550
  * fix pending alert annotation tooltip icon
  * alert rule have to be pending before alerting is for is
    specified
  * fix selected home dashboard should show as selected even
    though its not starred
  * build: internal metrics for packaging.
  * panel-header: Move the panel description/links/error
    container outside of panel header to not interfere with
    the react-grid stuff
  * alerting: improve annotations for pending state
  * reload browser after preferences been updated
  * panel-header: Unmount popper when not needed.
  * fix snapshot tests
  * panel-header: Updated snapshots for popper
  * panel-header: Add fade in transition to tooltip
  * Trying to reduce the amount of duplication with
    preferences
  * stackdriver: revert project test stuff
  * stackdriver: revert test code
  * panel-header: Make it possible to style the reference
    element and fix so panel description looks good
  * adds pending filter for alert list page
  * adds pending state to alert list panel
  * alertmanager: adds tests for should notify
  * Extracted language provider variables for readibility
  * devenv: graph time regions test dashboard
  * fix time regions mutable bug
  * set default color mode
  * filter out alpha plugins in api call, fixes #14030
  * alerting: support `for` on execution errors and notdata
  * poc: handling panel edit mode in react even for angular
    panels poc
  * panel-header: Simplify condition
  * wip: minor update
  * minor fix
  * css update to switch slider
  * tests for supporting for with all alerting scenarios
  * should not notify when going from unknown to pending
  * Fix formatting and remove enabled toggle
  * panel-header: Avoid undefined classNames and use the real
    panel description
  * wip: switch slider test
  * panel-header: Updates for the new react-popper api and
    make it possible to hover the tooltip popper without it
    closing
  * panel-header: Bump @types/react, @types/react-dom, react,
    react-dom, react-popper to latest versions
  * Add basic authentication support to metrics endpoint
  * panel-header: Display description in modal
  * minor panel options type fix
  * docs: description about graph panel time regions feature
  * update changelog
  * changelog: add notes about closing #11977
  * changelog: add notes about closing #6367
  * docs: team http api update
  * wip: adding general tab for react panel edit mode
  * [elasticsearch] Do not set a placeholder to index name, if
    it's already specified.
  * devenv: graph time regions test dashboard
  * create time regions solely based on utc time
  * started on options and groups
  * fix: added events to MetricsTabCtrl to closer mimic
    MetricsPanelCtrl
  * minor css change
  * Moved query manipulations from metrics controller to
    metrics tab so they are more easily shared between angular
    and react panels
  * fixed panel focus for react panels
  * minor changes to react panels
  * changed how size is calcualted and propagated and added
    proper interval calc to DataPanel
  * changelog: adds note about closing #14043
  * first stuff
  * pkg/cmd/grafana-server/server.go: Check
    sendSystemdNotification return value.
  * pkg/cmd/grafana-server/server.go: check
    serviceGraph.Provide() errors
  * pkg/cmd/grafana-server/main.go: Fix error value not
    checked
  * wip panel size handling
  * fixed issue with save.
  * fixed mutability issue in dashboard dropdowns
  * adced clickoutside wrapper
  * fixed singlestat guage ceneterd dot rendering issue
  * refactoring back the interval calculation, needs to be
    different for react panels
  * fix case where timeshift and time override is used
  * wip: refactoring interval and time override handling
  * updates latest to 5.3.4
  * changelod: add release date for 5.3.3 and 5.3.4
  * devenv: graph time regions test dashboard
  * graph: Time region support
  * Explore: Fix table pagination styles
  * devenv: update alerting with testdata dashboard
  * stackdriver: use arrow functions
  * stackdriver: use new naming convention for query editor
    all over
  * adds redis devenv block
  * restore user profile preferences
  * changelog: add notes about closing #13328 #13949
  * updates macaron session package
  * minor react panels refafactor
  * removed console.log
  * some cleanup of unused stuff and type fixes
  * completed work on panel not found view
  * Clarify wording of playlist protip
  * team preferences ui
  * feat: team preferences
  * Explore: Dont set datasource in state if navigated away
  * Explore: Don't suggest term items when text follows
  * wip: panel plugin not found
  * fixed scrollbar autohide prop
  * wip: panel-header: On panel refresh, get new timeRange
    from timeSrv, not the old one from the state
  * wip: panel-header: Avoid null returning to get better code
    readability. High five @ peterholmberg
  * wip: panel-header: Remove the TimeData type
  * wip: panel-header: Add proper typings to maxDataPoints and
    interval + remove code in comment
  * wip: panel-header: Move getResolution and
    calculateInterval into utils-functions and use the same
    code from react and angular
  * wip: panel-header: Start implementing the
    applyPanelTimeOverrides in the react panels by moving it
    to a util, make it pure and call it from angular and
    react.
  * import changes
  * updated text styling when switching views
  * Add `gofmt -s` to CircleCI
  * minor fixes based on code review
  * Fix gofmt issues
  * Add pic into actionCard message
  * minor style fixes &amp; polish
  * minor update
  * disable custom webkit scrollbar styles
  * refactoring &amp; cleaning up css
  * Minor progress on edit mode
  * improve dropdown pane connetion to tab toolbar
  * Add megacheck to gometalinter CircleCI target
  * pkg/tsdb/influxdb/influxdb.go: Fix surrounding loop is
    unconditionally terminated.
  * scripts/build/release_publisher/publisher_test.go: Fix
    trivial megacheck warning.
  * draw gauge
  * data source picker demo state
  * stackdriver: remove service query tyhpe
  * stackdriver: correct aligner name
  * fix in to not render multiple labels
  * stackdriver: typescriptifying props
  * stackdriver: remove redundant try catch
  * Update stackdriver.md
  * Adjust UI depth of query statistics
  * stackdriver: rename query function
  * stackdriver: rename query variable
  * stackdriver: remove debug log
  * stackdriver: add documentation for the template query
    editor
  * stackdriver: test saved variable
  * stackdriver: fix failing tests
  * stackdriver: remove services query type
  * stackdriver: update tests
  * stackdriver: add tests for render snapshop and default
    query type
  * stackdriver: remove lodash since object assign will do the
    trick
  * stackdriver: make sure we don't crash when selected
    service doesnt have a value
  * stackdriver: add simple render test
  * stackdriver: rename params
  * stackdriver: remove not used prop
  * stackdriver: persist template variable definition
  * stackdriver: add default value for query type
  * stackdriver: pass query definition from react, making it
    possible to use another definition than the query string
    only
  * stackdriver: make it possible to use alignment period
    template variable
  * stackdriver: make it possible to use aligner template
    variable
  * stackdriver: make it possible to use aggregation template
    variable
  * stackdriver: make it possible to use aggregation template
    variable
  * stackdriver: make it possible to use metric type template
    variable
  * stackdriver: set currentdatasource when editview is
    enabled
  * stackdriver: return correct value
  * stackdriver: reset query value on datasource changed
  * stackdriver: fix default value bug
  * stackdriver: extend label width
  * stackdriver: revert refactoring
  * stackdriver: extract variables for pickers
  * stackdriver: cleanup
  * stackriver: rename interface
  * stackriver: use type for state
  * stackdriver: rename state vars
  * stackdriver: extract common function
  * stackdriver: streamline the way labels are refreshed when
    a new value is picked in the dropdowns above
  * stackdriver: handle default state
  * stackdriver: refactor dropdown component
  * stackdriver: replace components with basic stateless
    select
  * stackdriver: remove not used func. wrap query in exception
  * stackdriver: reload all child dropdown and update selected
    accordingly
  * stackdriver: improve default state handling
  * stackdriver: use standard naming convention for selects
  * stackdriver: streamline label change
  * stackdriver: refactor TemplateQueryComponent
  * stackdriver: use enum for query type
  * stackdriver: add aggregation query
  * stackdriver: add alignment periods
  * stackdriver: add aligner query
  * stackdriver: add resource types query
  * stackdriver: add support for resource label queries
  * stackdriver: return friendly display name
  * stackdriver: add metric labels query
  * stackdriver: move response parsing to datasource file
  * stackdriver: return values for services and metric types
  * stackdriver: rename default component
  * stackdriver: more renaming
  * stackdriver: refactoring - rename react components and
    file structure changes
  * stackdriver: remove not used code
  * stackdriver: add selector components for service and
    metric type
  * stackdriver: refactor stackdriver query ctrl
  * stackdriver: make sure default template query editor state
    is propagted to parent angular scope
  * stackdriver: conditional template component rendering
  * stackdriver: add react component for template query editor
  * stackdriver: make it possible to load react plugin
    components from template query page
  * stackdriver: add basic directive for loading react plugin
    components
  * Preserve suffix text when applying function suggestion
  * wip: progress on edit mode ux with tabs
  * can render something
  * don't drop the value when it equals to None
  * changelog: adds note about closing #13993
  * Remove Origin and Referer headers while proxying requests
  * Refactored log stream merging, added types, tests,
    comments
  * docs: improve helper test for `For`
  * alerting: adds docs about the for setting
  * panel-edit-ux-tabs on top alternative
  * Add new option to set where to open the message url
  * added loading state
  * Fixes #13993 - adds more options for Slack notifications
  * fix switching from es raw document metric breaks query
    editor
  * add auth.proxy headers to sample.ini
  * add auth.proxy headers to default.ini
  * refactored how testing state was handled, using redux for
    this felt way to require way to much code
  * adds debounce duration for alert dashboards in ha_test
  * fixed issue with reducer sharing url query instance with
    angular router
  * fixed exporter bug missing adding requires for datasources
    only used via data source variable, fixes #13891
  * minor text change in export modal
  * build: removes unused.
  * clear test box if success
  * Fixed issues introduced by changing to PureComponent
  * Added testing state in reducer
  * further refactoring of #13984
  * minor fix
  * refactorings and some clean-up / removal of things not
    used
  * Update
    docs/sources/permissions/dashboard_folder_permissions.md
  * Fix typo in docs/sources/reference/scripting.md
  * experimental option boxes
  * ux: changed panel selection ux
  * move enterprise down in menu
  * wip: panel-header: Fix shareModal compatibility with react
    and angular
  * wip: panel-header: Remove custom menu items from panels
    completely
  * wip: panel-header: Reverted a lot of code to pause the
    'custom menu options' for now
  * wip: panel-header: More merge conflicts during cherry pick
  * wip: panel-header: More merge conflicts during cherry pick
  * Update docs/sources/permissions/datasource_permissions.md
  * Update docs/sources/permissions/datasource_permissions.md
  * Update
    docs/sources/permissions/dashboard_folder_permissions.md
  * Update docs/sources/http_api/datasource_permissions.md
  * Update docs/sources/enterprise/index.md
  * Update docs/sources/enterprise/index.md
  * Update docs/sources/enterprise/index.md
  * Update docs/sources/enterprise/index.md
  * Update docs/sources/enterprise/index.md
  * Update docs/sources/enterprise/index.md
  * minor change
  * wip: panel-header: More merge conflicts
  * Fix loglevel tests for Explore loggging
  * wip: panel-header: Merge conflicts
  * wip: panel-header: Fragment not needed anymore
  * wip: panel-header: Add possibility to add custom actions
    to the menu by passing them in as props
  * wip: panel-header: Separate all panel actions to its own
    file so we decouple them from react
  * wip: panel-header: Start implementing the Toggle legend,
    but its not taken all the way
  * wip: panel-header: Change DashboardPanel to a
    PureComponent to avoid unwanted rerenders
  * wip: panel-header: Refactor so 'Share' use the same code
    in angular+react
  * wip: panel-header: Add 'Edit JSON' functionality + make
    sure everyone using the json editor pass in the model
    property instead of the scope property when triggering the
    json modal
  * wip: panel-header: Add 'Copy' functionality
  * wip: panel-header: Add 'Duplicate'
  * wip: Add 'Share' to the react panels
  * wip: panel-header: Move code existing in both
    angular+react to utility functions
  * wip: panel-header: Remove panel
  * Mobx is now Redux
  * wip: Initial commit for PanelHeaderMenu
  * changelog: add notes about closing #13903
  * changelog: add notes about closing #13932
  * unify log level colors between rows and graph
  * Graph log entries by log level
  * fix selecting datasource using enter key
  * Adaptive bar widths for log graph
  * changelog: add notes about closing #13970
  * build: fixes
  * build: publisher handles nightly builds.
  * rename and mark functions as private
  * drag handle css
  * moved drag handle
  * fixed options
  * Time selection via graph
  * minor code style change
  * basic panel options working
  * Adding Cloudwatch AWS/Connect metrics and dimensions
  * wip: react panel options architecture
  * export: provide more help regarding export format
  * build: minor publisher fixes.
  * extract store from configurestore
  * added actions
  * build: publishes grafana enterprise to grafana.com
  * changelog: adds note about closing #13322
  * build: publisher uses local time.
  * build: publisher supports both local and remote.
  * build: publisher can find artifacts from local sources.
  * build: refactor releaser.
  * build: prepares release tool for finding local releases.
  * build: improved release publisher dry-run.
  * build: use build workflow id instead of build number.
    (#13965)
  * alerting: delete alerts when parent folder is deleted
  * refactor dashboard alert extractor
  * for: use 0m as default for existing alerts and 5m for new
  * panel options wip
  * Exposing digest from angular component
  * adds tests for extracting for property
  * minor fix
  * changelog: add notes about closing #13606
  * devenv: table panel links
  * renames `debouceduration` to `for`
  * introduce state `unknown` for rules that have not been
    evaluated yet
  * fixes go meta lint issue
  * wire up debounce setting in the ui
  * adds db migration for debounce_duration
  * introduces hard coded deboucing for alerting
  * always execute the user teams query
  * handle error before populating cache
  * build: fixes gcp push path.
  * alerting: adds tests for the median reducer
  * add minimal permission
  * typo fix for 'has'
  * Gitlab -&gt; GitLab
  * changelog: adds note about closing #13945
  * Add tests covering alternate syntax for aggregation
    contexts
  * Handle suggestions for alternate syntax aggregation
    contexts
  * fix terms agg order deprecation warning on es 6+
  * fix failing tests
  * removed file I added accidentally
  * fixed to template PR issues, #13938
  * alerting: increase default duration for queries
  * Explore: Logging graph overview and view options
  * Load hash based styles in error.html, too
  * Add [hash] to filename of grafana.{light,dark}.css
  * minor tweak to back to dashboard buttons
  * Fix minor JSON typo in HTTP API docs
  * remove replaced components
  * reverting babel change
  * remove this
  * removed these unused components
  * reverting script change
  * updated snap
  * tests
  * minor doc tweaks
  * updated enterprise page
  * Added new backend setting for license file
  * updating state and save
  * make permission sub items in sidemenu cleaner
  * changelog: add notes about closing #13925
  * Explore: fix metric selector for additional rows
  * fix for responsive rule for footer
  * Updated login page logo &amp; wordmark and responsive behavior
  * added new workmarks
  * fixed react whitespace warning on teams page
  * renamed org files to match new naming guide
  * moved profile pages to it's own feature folder
  * moved new teams page
  * reload page after preferences update
  * Add delta window function to postgres query builder
  * Increase Telegram captions length limit.
  * docs: enhanced ldap
  * Explore: async starts of language provider
  * listen for changes in angular land and propagate that back
    to react
  * docs: fix datasource permissions keywords
  * build: grafana enterprise docker image.
  * added caching of signed in user DB calls
  * added actions
  * IE11 fix for legend tables below graph
  * cleaned up render
  * renders angular component
  * updated api keys snapshot
  * restored transition
  * removed logging call
  * add table column date format
  * fixed memory leaks and minor refactoring
  * build: gpc credentials added to deploy.
  * changelog: add notes about closing #13762
  * update changelog
  * build: deploys to gcp.
  * build: deploys to gcp. (#13911)
  * datasource permission http api
  * restructure administration/permissions page into a section
    with sub pages
  * Fix TimePicker test by enforcing UTC on date string
  * updated view to use angular loader
  * Explore: repair logging after code restructuring
  * docs: schema -&gt; database
  * build: deployment ci container. (#13902)
  * docs: mysql
  * minor progress
  * Make Explore plugin exports explicit
  * add functionality to override service in registry
  * moved state
  * register datasource cache service with proper name
  * revert application lifecycle event support
  * changelog: adds note about closing #13876
  * Add new build info metrics that contains more info
    (#13876)
  * JS tooling: run TS grunt tasks only when files changed
  * revert file name change
  * remove unused code
  * log error on datasource access denied
  * include teams on signed in user
  * application lifecycle event support
  * refactor datasource caching
  * Fix cell coloring
  * Fix bug with background color in table cell with link
  * add dashnav responsive rule to hide tv button on smaller
    screens
  * Implement oauth_auto_login setting
  * Explore: fix copy/paste on table cells
  * rename type
  * using label component
  * Pluggable components from datasource plugins
  * fixed type
  * removed angular code
  * test and some refactoring
  * build: adds branch info to binary build
  * now that css is loaded sync again I can remove some styles
    from index html body css
  * WIP babel 7
  * Revert to sync loading of css, sometimes js loaded before
    css which caused issues
  * Update grafana_stats.json
  * Makefile: dependency-driven target to build node_modules
  * removes old invalid release guide
  * added missing alpha state prop to graph2 panel
  * minor update
  * added switch form component
  * updated graph tests dashboard
  * fixed width of panel edit mode
  * Fix query hint tests after refactor
  * Fixing issue 13855
  * Add tests to cover PlaceholdersBuffer and sum hint
  * Add sum aggregation query suggestion
  * fixes to angular panel edit mode
  * Reduce re-renderings when changing view modes
  * updated singlestat logo
  * more ux progress
  * Add tests to cover aggregation context cases
  * Fix label suggestions for multi-line aggregation queries
  * panel edit mode changes
  * Update snapshots.
  * Use jest.fn instead of string.
  * Explore: error handling and time fixes
  * ux experiments
  * build: builds grafana docker for enterprise at release.
  * Add code to flot that plots any datapoints which to not
    have neighbors as 0.5 radius points  - fixes
    https://github.com/grafana/grafana/issues/13605
  * adding default value and update actions
  * build: ge build fix.
  * build: grafana enterprise docker. (#13839)
  * moved state to redux, renamed entities
  * testing panel edit ux idea
  * changelog: add notes about closing #13769
  * add test
  * cache region result
  * use default region to call DescribeRegions
  * fix: updated backend srv to use appEvents and removed
    parts of alertsSrv
  * simple select
  * build: correctly adds enterprise to the filename. (#13831)
  * docs: improve ES provisioning examples
  * changelog: adds note about closing #13723
  * stackdriver: don't set project name in query response
    since default project is now loaded in its own query
  * Optimize the Dingding match values format
  * Add Dingding message type to support mass text
    notification
  * graph legend: fix table padding
  * Moved prom language features to datasource language
    provider
  * Split text template into variable
  * Add match values into Dingding notification message
  * graph legend: fix phantomjs rendering when legend is on
    the right
  * fix for annotation promise clearing, bug introduced last
    week when merging react panels step1
  * fix panel solo size
  * mysql: fix timeFilter macro should respect local time zone
  * load preferences
  * support template variable in stat field
  * only look in current database in findMetricTable
  * graph legend: fix table alignment
  * fix dingding doc error
  * fixed routes and page
  * graph legend: minor refactor
  * Added types to query rows
  * update latest.json to latest stable version
  * changelog: update
  * cleaned up the flow
  * changelog: add notes about closing #13280
  * delete provisioning meta data when deleting folder
  * Update the regex-matching in templateSrv to work with the
    new variable-syntax and be more flexible to regex-changes
    #13804
  * changelog: add notes about closing #13600
  * changelog: update
  * Move the variable regex to constants to make sure we use
    the same reg… (#13801)
  * docs: fix tutorials index page. Fixes #13799
  * graph panel: fix legend alignment
  * Explore: fix graph resize on window resize
  * changelog: adds note for #13691
  * docs: fix tutorials index page. Fixes #13799
  * Resource type filter (#13784)
  * Fix race condition on add/remove query row
  * moving things
  * typing changes
  * changelog: add notes about closing #13764
  * pkg/tsdb/stackdriver/stackdriver.go: Fix regular
    expression does not contain any meta characters.
  * pkg/tsdb/graphite/graphite.go: Fix regular expression does
    not contain any meta characters.
  * pkg/login/ldap.go: Fix warning comparison to bool constant
  * Added margin and correct border radius
  * Fix rebase, fix empty field still issuing query problem
  * Changelog: Adds curl to docker image in 5.3.2
  * fix: another fix for #13764 , #13793
  * Submit query when enabling result viewer
  * Get query hints per query transaction
  * docker: adds curl back into the docker image for utility.
    (#13794)
  * Explore: query transactions
  * connected to store, self remove logic
  * fix: kiosk url fix, fixes #13764
  * changelog: add notes about closing #13633
  * changelog: add notes about closing #13666
  * fix: Text box variables with empty values should not be
    considered fa… (#13791)
  * renaming things
  * graph legend: review fixes
  * add debug logging of folder/dashbord permission checks
  * sync mysql query editor template with postgres
  * add char as datatype for metric and group columns
  * build: indentation mistake.
  * build: fixes filename issues.
  * fix injecting dependencies to graph legend directive
  * changelog: adds note for #13669
  * docs: update debian installation instructions
  * stackdriver: some tweaks to the text on the config page
    and in docs
  * stackdriver: refactoring request builder
  * stackdriver: remove not used struct
  * stackdriver: remove not needed scope
  * stackdriver: add provisioning example for gce
    authentication
  * stackdriver: add documentation for gce default account
    authentication
  * stackdriver: change name of authentication type
  * stackdriver: improve config page info box documentation
  * stackdriver: prevent backend query from being made when
    there are not yet any defined targets
  * stackdriver: fix failing tests
  * stackdriver: improve error handling
  * graph legend: fix legend when series are having the same
    alias
  * stackdriver: remove not used query file
  * stackdriver: remove test datasource query. use
    ensuredefaultproject instead
  * stackdriver: remove debug comments
  * stackdriver: improve error handling in the datasource
  * stackdriver: fix typo
  * stackdriver: add debug logging
  * stackdriver: fix broken braces
  * stackdriver: fix broken condition after rebase
  * stackdriver: use constant instead of variable
  * stackdriver: remove debug log
  * stackdriver: fix failing test
  * stackdriver: use gce variable
  * stackdriver: add variable for gce authentication type
  * stackdriver: get default project from backend. also ensure
    default project could be retrieved when authentication
    type is gce
  * stackdriver: only load default project from backend if
    it's not available on the target. this might happen when
    using gce authentication and provisioning
  * stackdriver: display error message if project name is not
    present in jwt file
  * stackdriver: only load project name if it's not already
    stored in the ds info json
  * stackdriver: add default value for authentication type
  * stackdriver: wip - remove debug code
  * stackdriver: improve ui for toggling authentication type
  * stackdriver: only get default token from metadata server
    when applying route
  * stackdriver: only get default token from metadata server
    when applying route
  * stackdriver: make backend query a pure test datasource
    function
  * stackdriver: add status code
  * stackdriver: wip - return metric descriptors in the format
    of tablew
  * stackdriver: wip - get metric descriptors in the backend
  * stackdriver: wip - add logic for retrieving token from gce
    metadata server in the auth provider
  * stackdriver: wip - add very basic checkbox for gce auto
    authentication
  * stackdriver: break out project name resolving into its own
    function in the stackdriver.go file
  * stackdriver: wip - temp remove jwt token auth
  * stackdriver: wip - always use gce default account for
    stackdriver
  * stackdriver: wip - add scope and remove debug code
  * stackdriver: WIP - test retrieving project id from gce
    metadata
  * skip jwt token auth if privateKey is empty
  * fetch token from GCE metadata server
  * Revert 'for development'
  * for development
  * graph legend: fix quotes displaying
  * graph legend: minor refactor
  * Enterprise crosscompilation (#13783)
  * component working
  * graph legend: fix rendering after legend changes
  * graph legend: refactor, fix another review issues
  * fix: DataPanel isFirstLoad state fix
  * Fix click-based selection of typeahead suggestion
  * ux: remove duplicate placeholder attribute
  * initial work to add shortcut to toggle legend - generic
  * scripts/build/publish.go: Fix warning on err variable.
  * pkg/services/alerting/reader.go: Fix should use for range
    instead of for { select {} }.
  * pkg/middleware/middleware.go: Fix empty branch warning.
  * pkg/plugins/plugins.go: remove ineffective break
    statement.
  * fix order for mysql, remove postgres specific code
  * using react component
  * Explore: reuse table merge from table panel
  * graph legend: refactor, move behaviour logic into
    component
  * stackdriver: add default project to provisioning
    documentation
  * adjust meta data queries for mysql
  * fix references to postgres datatypes
  * graph legend: review fixes
  * changelog: add notes about closing #13667
  * changelog: add notes about closing #13718
  * fixed gofmt issue after go update
  * fix cannot receive dingding alert bug
  * fix: fixed variable srv tests
  * stackdriver: only add unit to resonse obj if it has a
    value
  * make interpolateVariable arrow function
  * fix: another set of fixes for refresh
  * fixed issue with template refresh
  * Fix tslint errors
  * stackdriver: fix failing tests
  * stackdriver: make sure unit is not returned to the panel
    if mapping from stackdriver unit to grafana unit can't be
    made
  * Fix variable highlighting
  * Fixed yarn.lock (previous merge took out integrity)
  * changelog: add notes about closing #13710
  * wip: enterprise docs
  * allow unit override if cloudwatch response unit is none
  * Revert 'don't overwrite unit if user set'
  * don't overwrite unit if user set
  * changelog: add notes about closing #13674
  * fix LDAP Grafana admin logic
  * graph legend: remove unused code
  * graph legend: refactor
  * docs: cleanup of how to build for docker.
  * Review feedback, increased height
  * changelog: add notes about closing #12342
  * update changelog
  * remove not used file
  * simplify code
  * Explore: fix render issues in split view
  * A list of where to make changes when upgrading Go and
    Node.js (#13693)
  * tests
  * Update PromQueryField tests to address fixed bug
  * Fix typeahead behaviour for QueryField
  * permissions: cleanup.
  * hooked up actions
  * Explore: Use react-table as table component
  * created view
  * docs: installing custom plugins in docker.
  * Document oauth_auto_login setting
  * changelog: add notes about closing #13692
  * postgres: use arrow function declaration of
    interpolateVariable
  * Use closure for calling interpolateVariable
  * changelog: add notes about closing #12308
  * Add socket support for mysql data source
  * changelog: adds note about closing #12330 and #6696
  * remove addpermissions component
  * cloudwatch: return a distinct list of regions
  * docs: update cloudwatch iam policy description
  * removes d in disableResolvedMessage
  * removed snaps
  * alerting: tests default value for disable resolve message
  * re-add hard coded region list
  * update doc due to client layout change
  * clean up tests
  * fix gofmt, add test, correct noted concerns with default
    value
  * fix gofmt, add test, correct noted concerns with default
    value
  * changelog: add notes about closing #13629
  * add encrypt connstr param conditionally on the value
    chosen via GUI.
  * graph legend: add color picker (react)
  * removing datasource permissions states from grafana
  * update latest.json to latest stable version
  * update changelog
  * build: Upgraded nodejs to 8 on appveyor
  * codestyle
  * rename UI Option, align with control, update tests
  * pausing for now
  * Remove unwanted char
  * Fix incorrect alt text on logo
  * return default region list from backend
  * don't merge hard coded region list
  * add error message
  * get regions from after datasource save
  * show all CloudWatch regions
  * get region list from ec2:DescribeRegions
  * fix concurrent map writes
  * update, don't remove 'Known Issues' docs section.
  * update provisioning docs.
  * fix new setting default value handling.
  * rename new JSON data attrbute.
  * changelog: add notes about closing #13464
  * changelog: add notes about closing #13553
  * update changelog
  * doc(documentation) license
  * doc(documenation)
  * add channel option to disable the resolved alert (OK
    Message) that is sent when condition returns to normal.
  * Can render graph
  * Add 'encrypt' setting to MSSQL data source.
  * rendering settings
  * build: makes sure publisher.sh is available when
    deploying.
  * Fix grammar in log message
  * changelog: add notes about closing #13641 #13650
  * Escape typeahead values in query_part
  * Escape values in metric segment and sql part
  * changelog: add notes about closing #13628
  * update .bra.toml for using latest bra version
  * progress on react time series infra
  * wip: began first steps for a react graph component
  * various fixes to to queries tab (in react mode)
  * react panels query processing
  * react panels: got data
  * working on react data / query exectution
  * changed DataPanel from HOC to use render props
  * fixing unit tests
  * Removed reference to plugin_api.md (SDK Readme) on the
    development page as the file that it points to no longer
    exists. This addresses an open issue on the grafana.org
    repo
  * Adding tests
  * Adding time clockms and clocks
  * pkg/cmd/grafana-server/main.go: remove os.Kill as it
    cannot be trapped
  * changed to plain errors further down the alerting
    validation model so error did not get double wrapping in
    ValidationError
  * alerting: propagate alert validation issues to the user
    instead of just 'invalid alert data' message
  * updated gitignore
  * fix for graph time formating for Last 24h ranges, fixes
    #13650
  * pkg/services/sqlstore/user_auth_test.go: comment unused
    users slice
  * fixed a typo
  * fixed a typo
  * fix: label values regex for single letter labels
  * created component for http settings
  * removes debug log.
  * make sure to add all variable nodes to dag before linking
    variables
  * changelog: adds note for #13607
  * updated jest to 23.10
  * Adds backend hooks service so extensions can modify index
    data
  * fix route issue
  * removed unused setting variable
  * minor setting refactorings
  * renamed extension point in the frontend
  * updated circleci build-container version
  * minor change to cloudwatch code formatting
  * minor ux fix for new select
  * fmt
  * grafana/grafana#13340 complete oauth doc
  * changed property name to UserWasDeleted and added an
    assert for it
  * Update check for invalid percentile statistics
  * pkg/services/alerting/notifiers/telegram.go: check error
    before close.
  * pkg/tsdb/*: Fix do not pass a nil Context
  * devenv: fix influxdb block
  * docs: refer to v5.3 instead of v5.2
  * removed unsused function
  * docs: stackdriver fixes after review
  * fix mutability bug, removed unused constructor
  * stackdriver: check if array is empty to prevent filter
    from crashing. This closes #13607
  * Handle DescriptionPicker's initial state #13425
  * stackdriver docs: metric query editor and annotations
  * Update snapshots after merge
  * Requests for ds via backend blocked for users without
    permissions.
  * Removes unused code.
  * Remove CTA when CTA-action is clicked instead of a /new
    route #13471
  * Add fancy delete button for ApiKeys.
  * Add form to both the CTA page and the regular list.
  * Add onClick handler to CTA.
  * Updated tests for new protip.
  * Updated protip, not sure what to write there.
  * Update tests for ApiKeys CTA screen.
  * changelog: add notes about closing #13616
  * Show CTA if there are no ApiKeys, otherwise show table.
  * Extract ApiKeyCount from state.
  * made it possible to have frontend code in symlinked
    folders that can add routes
  * Added Loading state on org pages
  * fix phantomjs render of graph panel when legend as table
    to the right
  * changelog: add notes about closing #13172
  * add test for es alert when group by has no limit
  * poc: frontend extensions
  * added the UserWasRemoved flag to make api aware of what
    happened to return correct message to UI
  * Remove user form org now completely removes the user from
    the system if the user is orphaned
  * remove tab
  * bug fix
  * Update time_series_query.go
  * changelog: add notes about closing #11711
  * add admin page to show enterprise license status
  * docs: add version notes
  * tests
  * Css fix for selected option
  * User without permission to a datasource won't see it.
  * Updated test snapshot #13425
  * Initialize Explore datasource correctly
  * Refactors ds permissions to a filter.
  * Remove the fixed widths and make it possible to pass it in
    as a prop instead #13425
  * User filtering now works properly at the backend #13425
  * Removed old code #13425
  * Rename css class 'gf-form-select2' to 'gf-form-select-box'
    #13425
  * Use new class names #13425
  * Fixes for the tag filtering in the search #13425
  * Start implementing the upgraded react-select in the tag
    filter box #13425
  * fix /api/org/users so that query and limit querystrings
    works
  * Bump grafana/build-container to 1.2.0
  * Revert 'Lock down node version to see if we get rid of the
    circleci build issue'
  * Revert 'Try to remove circleci cache to see if that solves
    the build issue'
  * Try to remove circleci cache to see if that solves the
    build issue
  * Generate yarn.lock from older yarn
  * Revert 'Add node version output for debugging'
  * Add node version output for debugging
  * Lock down node version to see if we get rid of the
    circleci build issue
  * Lock down webpack to 4.19.1 to avoid issue with
    webpack-cli
    (https://github.com/webpack/webpack/issues/8082)
  * Bump react-select to 2.1.0 #13425
  * Updated lockfile to get rid of build error #13425
  * Add frontend filtering of users in user picker #13425
  * Replace $white with a color working in both themes #13425
  * Replace System.import() with import() to get rid of
    warning
  * Clean up css for react-select v2 #13425
  * Upgrade Datasources-picker on Explore page #13425
  * Enable trailing on the debounce in the TeamPicker (same as
    in UserPicker) #13425
  * Update typescript notifications #13425
  * Update (js-) tests and snapshots for react-select 2 #13425
  * Remove variables not used #13425
  * wip: Remove code for old react-select component #13425
  * wip: The pickers are stateful nowadays, no need to pass in
    the current value #13425
  * wip: Upgrade react-select #13425
  * set v5.3 as root docs
  * disable permissions
  * whatsnew: adds image for Stackdriver
  * fixing weird arrow in select
  * update latest.json to 5.3.0
  * changelog: set date for 5.3.0 release
  * fixing permission rows
  * changelog: add notes about closing #13575
  * enable permissions for data source
  * Use correct naming convention
  * Fix typo
  * Provide more information about what's included in the
    Stackdriver plugin
  * changelog: add notes about closing #13575
  * cloudwatch: return early if execute query returns error
  * fix tab switching
  * add test for automatically unit set
  * fix crach bug
  * fix id validation
  * refactoring after review comments
  * changelog: adds note for #13559
  * added setting top hide plugins in alpha state
  * wip: fixed issues now things are starting to work as
    before for angular panels
  * pausing permissions list
  * Block graph queries from being queued until annotation
    datasource promises resolve
  * Redone with DataSourcePermissions
  * remove datasource permission admin for now
  * reverted AddPermissions
  * Explore: highlight typed text in suggestions
  * Update provisioning.md (#13572)
  * stackdriver: update docs, showing how to escape private
    key and use yaml multiline strings
  * modified AddPermissions component
  * set unit for CloudWatch GetMetricStatistics result
  * Remove duplicate labels in the datasource query
  * render drag handle only in edit mode
  * ux: minor update to look of stackdriver query help
  * changelog: adds note for #13495
  * add gopkg.in/square/go-jose.v2 to dependencies, update
    github.com/hashicorp/yamux
  * adding permissions component
  * reverted back and using angular for settings and
    dashboards
  * stackdriver: improve filter docs for wildcards and regular
    expressions
  * stackdriver: always use regex full match for =~ and
    !=~operator
  * stackdriver: add tests from regex matching
  * stackdriver: always use regex full match for =~ and
    !=~operator
  * stackdriver: test build filter string
  * stackdriver: test that no interpolation is done when there
    are no wildcards
  * stackdriver: remove debug logging
  * stackdriver: add more tests
  * stackdriver: fix broken substring. also adds tests
  * stackdriver: remove not necessary helper functions
  * stackdriver: interpolate stackdriver filter wildcards when
    asterix is used in filter
  * stackdriver metric name fix. Fixes #13562
  * Fixed nav model
  * fix for influxdb annotation issue that caused text to be
    shown twice, fixes #13553
  * wip: restoring old angular panel tabs / edit mode
  * ux: final fixes to new datasource page
  * Fix text overflow on playlist search  #13464
  * docs: fix minor typos
  * ux: more minor ds setting tweaks
  * ux: more minor ds setting tweaks
  * ux: tweaks to add datasource page and datasource settings
    page
  * Fixed typo in query editor placeholder text.
  * Explore: do not show default suggestions after expressions
  * Explore: trigger a query field render to fix highlighting
  * Explore: compact state URLs
  * fix gofmt tests output
  * removed duplicate route
  * Use size-me to resize explore Graph, added types
  * algorithm to find new name if it exists
  * ux: misc react migration fixes and info box style
    improvement
  * docs: new variable type text box that allows free text
    input
  * docs: annotations tag filter with template variable
    support
  * docs: whats new in 5.3 - a few tweaks
  * mysql: note about connection max lifetime and wait_timeout
  * Explore: reset typeahead on cursor move
  * Explore: resize graph on window resize
  * Fix rate function hint for series with nulls
  * Extract query hints
  * Prevent Explore from updating when typing query
  * Avoid new metrics options being passed selector, made
    PromField pure
  * Perf on query field and typeahead
  * Dont rebuild datasource options on each render
  * contributing.md
  * changelog: add notes about closing #13326
  * react-2-angular: added generic angular directive loader
    util that can be used from react
  * search data source types
  * mini fix
  * css: minor fix to search
  * bump master version to 5.4.0-pre1
  * provisioning: adds more logging about failed to deletion
    of provisioned dashboards
  * various fixes and improvements
  * changelog: set date for 5.3.0-beta3 release
  * build: fix for invalid pathing for release publisher
  * changlog: adds note about closing #13551 and #13507
  * new grid layout add data source
  * test: updated react snapshot
  * ux: minor tweak to link
  * stackdriver: adds missing nginject attribute
  * docs: better wording and docs links.
  * Fix issue with updating role permissions #13507
  * fixed toggle buttons
  * dataproxy should forward a trailing slash to proxy
  * add datasource proxy test to verify trailing slashes are
    forwarded
  * centered dashboard icon in search with flexbox
  * mssql: fix tests
  * build: automatically publish releases to grafana.com.
  * updated after pr feedback
  * pkg/tsdb/postgres/postgres_test.go: pass
    context.Background() instead of nil
  * pkg/tsdb/mysql/mysql_test.go: pass context.Background()
    instead of nil
  * pkg/tsdb/mssql/mssql_test.go: pass context.Background()
    instead of nil
  * adjust mssql tests
  * pkg/tsdb/elasticsearch/client/client_test.go: pass
    context.Background() instead of nil
  * added data source type type
  * pkg/services/alerting/notifiers/telegram_test.go: pass
    context.Background() instead of nil
  * remove generic macros from macros_test and add integration
    test for generic macros
  * Revert 'Revert 'Org users to react''
  * Revert 'Org users to react'
  * add postgres test for global macros
  * add test
  * stackdriver heatmap support
  * added slow queries scenario to test data source, added new
    panel test dashboard with slow queries
  * Fix 'appropriate'-typo
  * Update configuration doc to include socket@server
  * move timeFrom, timeTo, unixEpochFrom and unixEpochTo
    macros to sql_engine
  * wip: began work on support for testdata tables &amp;
    annotations support
  * docs: connection limits for sql datasources
  * ux: put connection limits under own section
  * fiddling with validation
  * changelog: adds note about closing #13492
  * view and route
  * wip: made sqlstore dialect accessable from outside
  * better comment about state changes
  * get or create alert notification should use transaction
  * use notification state id instead of notifier id
  * merges defaultShouldNotify and ShouldNotify
  * move version conflict logging for mark as complete to
    sqlstore package
  * removed duplicate route
  * improve local variable name
  * avoid exporting notificationState and
    notificationStateSlice
  * avoid sending full notification state to pending/complete
  * deleting obsolete things
  * Make max open, max idle connections and connection max
    life time configurable
  * snap
  * fix after merge from master
  * rename GetNotificationStateQuery to
    GetOrCreateNotificationStateQuery
  * reminder: uses UpdatedAt to track state changes.
  * snaps
  * invitees
  * changed from RFC to PureComponent
  * devenv: add postgres ha test config example
  * wip: going in circles
  * typo in sample.ini
  * pkg/tsdb/cloudwatch/credentials.go: Remove unnecessary
    variable assignment
  * pkg/cmd/grafana-server/main.go: '_ = &lt;-ch' simplified to
    '&lt;-ch'
  * pkg/tsdb/stackdriver/stackdriver_test.go: return
    simplified
  * Fix megacheck issue unused code.
  * invites table
  * Update ldap.md
  * use alert state changes counter as secondary version
  * wip: data source permissions hooks
  * docs: stackdriver version notice.
  * tests
  * added default prop instead of specifying prop
  * filter users in selector based on search
  * Moved explore helpers to utils/explore
  * Explore: jump to explore from panels with mixed
    datasources
  * functions and tests
  * cleanup alert_notification_state when deleting alert rules
    and channels
  * don't notify if notification state pending
  * remove unused code
  * stackdriver: set default view parameter to FULL
  * stackdriver: no tags for annotations (yet)
  * stackdriver: add help section for annotations
  * devenv: enable some debug logging for ha test setup
  * alert -&gt; ok with reminders enabled should send
  * stackdriver: revert an accidental commit for text template
    variable
  * Added test for url state in Explore
  * Make Explore a pure component
  * first crude display
  * stackdriver: remove metric.category alias pattern
  * stackdriver: remove commented code
  * stackdriver: unit test group by and aggregation dropdown
    changes
  * stackdriver: make it impossible to select no aggregation
    when a group by is selected
  * Explore: Store UI state in URL
  * stackdriver: add relevant error message for when a user
    tries to create a template variable
  * stackdriver: make sure labels are loaded when service is
    changed in dropdown
  * stackdriver: change info logging to debug logging
  * stackdriver: change pattern for annotation to metric.value
  * stackdriver: add support for bool values
  * stackdriver: add support for int64 values
  * stackdriver: use correct default value for alignment
    period
  * stackdriver: fix reducer names
  * fix set sent_at on complete
  * snaps
  * noop services poc
  * implemented general actionbar
  * handle pending and completed state for alert notifications
  * stackdriver: fix froamt annotation text for value
  * stackdriver: make it possible to use point values of type
    string
  * No need to get alert notification state in ShouldNotify
  * using constant
  * added no datasources added
  * stackdriver: broadcasting through $scope doesnt work
    anymore since query_filter_ctrl is now a sibling directive
    to query_aggregation_ctrl, so broadcasting is now done
    using $rootScope
  * wip: test get alert notification state
  * wip: send and mark as complete
  * components, test, removed old not used files
  * wip: impl so that get alertstate also creates it if it
    does not exist
  * fix: preloader element issue
  * Adding AWS Isolated Regions
  * wip
  * stackdriver: pattern formatting for annotations
  * stackdriver: fix alignment period bug
  * stackdriver: set first metric as selected if no metric
    could be retrieved from the target
  * stackdriver: wip annotation support
  * Compile TS of the whole project to detect type errors
  * stackdriver: update tests
  * stackdriver: es6 style directive, avoid using scope
  * deletez
  * refactoring: slight changes to PR #13247
  * revert rename
  * stackdriver: fix typescript error
  * stackdriver: remove not needed alignment option
  * using constant
  * stackdriver: extract out filter, metric type directive
  * stackdriver: add unit tests to resolve unit function
  * rename to pluginlistitem
  * fixing types
  * stackdriver: convert most common stackdriver units to
    grafana units if possible
  * sqlstore: add support for checking if error is constraint
    validation error
  * rewrote to use react.sfc
  * explore: fixes to dark theme, fixes #13349
  * Remove angular code related to API Keys and point the
    route to the React component #13411
  * Open modal with API key information after key is added
    #13411
  * Add tests for the reducers &amp; selectors for API keys #13411
  * Update test-snapshot, remove dead code #13411
  * Add tests for ApiKeysPage #13411
  * Add 'search box' and a 'add new' box to the new API Keys
    page #13411
  * Pick up the type from app/types
  * Pick up the type from app/types
  * Move User type out of UserPicker and into app/types
  * wip: Reactify the api keys page #13411
  * add support for mysql and postgres unique index error
    codes
  * implement sql queries for transactional alert reminders
  * stackdriver: fix typescript errors
  * stackdriver: pass interval from panel to backend
  * stackdriver: remove debug logging
  * stackdriver: update docs so that they align with alignment
    period rules in stackdriver gui
  * stackdriver: update alignment period rules according to
    stackdriver
  * stackdriver: set target to be raw query
  * stackdriver: publish docs to v5.3 (not root)
  * initial rename refactoring
  * changelog: adds note about closing #12534
  * devenv: grafana high availability (ha) test setup
  * stackdriver: use more appropriate test data
  * Add goconst to CircleCI
  * fix: also set dashboard refresh to false
  * simplified fix for 12030
  * prevent refresh on fixed time window
  * using more variables
  * stackdriver: fix broken test
  * stackdriver: workaround for the fact the jest definitions
    does not include not
  * stackdriver: docs update
  * stackdriver: WIP - implement stackdriver style auto
    alignment period. also return the used alignment period
    and display it in the query editor
  * stackdriver: distinct grafana auto from stackdriver auto
    in alignment period
  * stackdriver: use correct name for variable
  * stackdriver: remove montly from alignment periods
  * Added constant
  * tests
  * stackdriver: add alignemnt period
  * stackdriver: make sure service and metric display name is
    used instead of value when loading a saved query editor
  * alerting: move all notification conditions to
    defaultShouldNotify
  * stackdriver: use correct event name
  * stackdriver: fix broken tests
  * stackdriver: update aggregation and alignment before
    refreshing when changing metric
  * stackdriver: use correct naming convention
  * stackdriver: get value type and metric kind from metric
    descriptor instead of from latest metric result
  * filter NULL values for column value suggestions
  * changed to first and last child
  * imguploader: Add support for ECS credential provider for
    S3
  * stackdriver: adds on-change with debounce for alias by
    field
  * cli: fix init of bus
  * Remove .dropdown-menu-open on body click fixes #13409
  * stackdriver: improve aggregation logic
  * stackdriver: fix failing test
  * stackdriver: wip: split metric dropdown into two parts -
    resource and metric
  * first test
  * stackdriver: remove console.log
  * filter plugins and layout mode
  * stackdriver: typescriptifying controller
  * render list
  * stackdriver: break out aggretation logic into its own
    directive and controller. also adds tests for new dropdown
    population logic
  * Remove option r from ln command since its not working
    everywhere
  * fix: updated tests
  * using variable
  * Fix spelling of your and you're
  * Changed setting to be an alerting setting
  * created test for graph disclaimer
  * Remove non-existing css prop
  * fix: Legend to the right, as table, should follow the
    width prop. Removing css conflicting with baron's width
    calculation. #13312
  * stackdriver: populate alignment and aggregation dropdowns
    based on metric type and value type
  * docs: postgres gif.
  * limit number of time series show in explore graph
  * docs: whats new for 5.3
  * rendering: Added concurrent rendering limits
  * stackdriver: fix test after parameter added to constructor
  * stackdriver: skeleton for more query types on the backend
  * stackdriver: better error handling for getLabels
  * stackdriver: move getLabels from query_ctrl to datasource
  * Run all sql data source queries for one panel concurrently
  * removed border, cleaned up css and fixed class naming
  * devenv: fix uid for bulk alert dashboards
  * Explore: moved code to app/features/explore
  * target gfdev-prometheus datasource
  * stackdriver: fix bug when multiple projects connected to
    service account
  * devenv: adds script for creating many dashboards with
    alerts
  * stackdriver: refactoring - extract out filtersegments
    component
  * stackdriver: alias patterns WIP
  * Fix goconst issues
  * When stacking graphs, always include the y-offset so that
    tooltips can render proper values for individual points
  * provisioning: changed provisioning default update interval
    from 3 to 10 seconds
  * Update render.js
  * Update render.js
  * Fix https://github.com/grafana/grafana/issues/13387 metric
    segment options displays after blur
  * docs: improve oauth generic azure ad instructions
  * invalidate access token cache after datasource is updated
  * Fix datbase &gt; database
  * Fix changed want md5 hash
  * Revert Fahrenheit to Farenheit
  * Fix some typos found by codespell
  * Fix misspell issues
  * fix: use same User-Agent header as in other places in
    grafana when making external requests
  * docs: changed Json Web Token wording to be just JSON key
    file
  * added beta notice
  * created switch button for org users that can toggle
    between users and invites
  * pkg/tracing/tracing.go: replace deprecated cfg.New
    function
  * stackdriver: remove WIP tests
  * pkg/services/sqlstore/user.go: empty branch
  * pkg/tsdb/elasticsearch/response_parser.go: simplify
    redundant code
  * pkg/tsdb/elasticsearch/client/search_request.go: simplify
    loop with append.
  * Explore: remove closing brace with opening brace
  * Explore: show series title in tooltip of legend item
  * Explore: dont rate-hint on rate queries
  * Explore: Fix metric suggestions when first letters have
    been typed
  * Fix misspelled authentication in Auth overview doc
  * fix reader linux test
  * resolve symlink on each run
  * stackdriver: add templating support for metric, filter and
    group by
  * wip: panel options idea2
  * stackdriver: use group by fields to create default alias
  * make sure we don't add the slash twice
  * Update render.js
  * devenv: fix docker blocks paths
  * Updated phantomjs render script to take full height
    screenshots
  * devenv: re-add missing docker-compose files
  * Explore: Fix label suggestions for recording rules
  * Explore: Fix click to filter for recording rule
    expressions
  * Don't use unnest in queries for redshift compatibility
  * pkg/tsdb/elasticsearch/client/client.go: use time.Since
    instead of time.Now().Sub
  * pkg/plugins/dashboards_updater.go: Simplify err check
  * pkg/services/sqlstore/alert_notification.go: Simplify err
    check
  * remove the test that does not do anything
  * add the trailing slash
  * stackdriver: add custom User-Agent header
  * stackdriver: remove hardcoding of test project name
  * updated
  * set maxworkers 2 for frontend tests
  * removes codedov refs
  * disable codecov
  * add a test
  * Fix setting test
  * stackdriver: improve query look
  * moves /tests to /pkg/plugins
  * stackdriver: add alignment period to query controller
  * stackdriver: making sure we dont pass too big
    alignmentPeriods to the stackdriver api
  * stackdriver: fix broken tests
  * stackdriver: adds default value for alignment period
  * stackdriver: use alignment period that is passed from
    frontend. if set to auto, use value provided from the
    panel. also added tests for alignment period
  * stackdriver: use alignment that is passed from frontend in
    the query
  * stackdriver: adds advanced options collapse to query
    editor with the possibility to select secondary
    aggregation and alignment
  * removes testdata from getting started
  * stackdriver: fix init labels bug
  * moves benchmark script to devenv
  * moves docker/ to devenv/docker
  * changelog: adds note about closing #9735
  * docs: add version disclaimer for postgres query editor
  * moves files from /tests to more appropriate folders
  * docs: template variable support for annotations
  * Update getting_started.md
  * pkg/services/sqlstore: Fix sess.Id is deprecated: use ID
    instead. (megacheck)
  * pkg/services/sqlstore: Fix x.Sql is deprecated: use SQL
    instead. (megacheck)
  * fix: increased team picker limit to 50, closes #13294
  * rename folder
  * Add documentation for PostgreSQL query builder
  * stackdriver: improve query editor to handle no data better
  * stackdriver: fixes in query editor
  * stackdriver: type rename
  * display team member labels
  * new column for team_member table
  * fix hipchat color code used 'no data' notifications
  * stackdriver: makes sure filter dropdown doesnt crash if
    clicked before values are loaded
  * fixes strange gofmt formatting
  * stackdriver: adds null check to query
  * gdev: added test dashboard for polystat panel
  * Explore: Add multiline syntax highlighting to query field
  * stackdriver: add support for filtering to backend
  * Hotfix for Explore (empty page after running query)
  * stackdriver: add filters to query editor
  * ldap: made minor change to group search, and to docs
  * stackdriver: fixes remove option in filter
  * dsproxy: add mutex protection to the token caches
  * metrics: starts some counters at zero
  * tech: remove all mobx stuff
  * stackdriver: wip - filters for query editor
  * stackdriver: adds remove group by option
  * stackdriver: improve segments for group bys in query
    editor
  * stackdriver: load time series meta data for group by
    dropdown
  * stackdriver: make sure distinct labels are returned. also
    added test
  * stackdriver: fix failing test
  * stackdriver: test get metric types
  * stackdriver: wip - group bys
  * stackdriver: update logo
  * stackdriver: ux for config page, docs updated
  * upload: make the button text configurable
  * stackdriver: add simple readme
  * stackdriver: reverse points array to be in ascending order
  * stackdriver: adds support for primary aggregations
  * stackdriver: better error handling and show query metadata
  * stackdriver: tests for parsing api response
  * stackdriver: add first test for parsing frontend queries
  * Stackdriver: Fix weird assignment
  * Stackdriver: Use metric type from query controller state
  * Stackdriver: Set target correctly
  * Stackdriver: Break out parse response to its own func
  * Stackdriver: Use ds_auth_provider in stackdriver. This
    will make sure the token is renewed when it has exporired
  * Stackdriver: Restructured ds proxy tests
  * stackdriver: fix test
  * Stackdriver: Add new file
  * Stackdriver: Start breaking out apply route to its own
    file
  * Stackdriver: Parsed url params
  * Stackdriver: Parse datapoints correctly
  * Stackdriver: Add backed query using
  * Stackdriver: Prettify json
  * Stackdriver: Move data to target
  * Stackdriver: Load example metric and start parsing
    response
  * Stackdriver: Exposing stackdriver backend api
  * Stackdriver: Use new access token API
  * Stackdriver: Temporary exporting token lookup
  * Stackdriver: Loads project name and metrics descriptions
    into the query controller
  * Stackdriver: Corrected field title and removed debug
    logging
  * Stackdriver: Removed debug logging
  * Stackdriver: Improved feedback for when a JWT is already
    uploaded in the ds config page
  * docs: first draft for stackdriver datasource
  * dsproxy: implements support for plugin routes with jwt
    file
  * Stackdriver: Added test for getProjects
  * Stackdriver: Refactored api call to google resource
    manager
  * Stackdriver: Add scope for google resource manager
  * Stackdriver: Fixed error message from google resource
    manager
  * Removes comment
  * Adds skeleton for loading projects from google resource
    manager
  * Adds unit tests to test datasource
  * Implemented datasource test
  * Fixed broken if statement
  * Adds jwt token signing google auth
  * Improved user experience
  * Upload: Fixing link function in directive
  * Adds poc code for retrieving google auth accesstoken
  * Build new stackdriver frontend script
  * Add stackdriver backend skeleton
  * Adds stackdriver frontend skeleton
  * Use datasource cache for backend tsdb/query endpoint
    (#13266)
  * added underline to links in table
  * fix: add permission fixes
  * test: added simple dashboard reducer test
  * feat: dashboard permissions are working
  * Fix gauge display accuracy for 'percent (0.0-1.0)'
  * use pluginName consistently when upgrading plugins
  * removes old unused examples (#13260)
  * fix: added loading screen error scenario (#13256)
  * changelog: add notes about closing #11555
  * Interpolate $__interval in backend for alerting with sql
    datasources (#13156)
  * anonymous usage stats for authentication types
  * disabling internal metrics disables /metric endpoint
  * wip: dashboard permissions to redux
  * renames PartialMatch to MatchAny
  * fix: add folder permission fix
  * fix: fixed tslint issue introduced in recent prometheus PR
    merge
  * Folder pages to redux (#13235)
  * folder permissions in redux
  * minor fix
  * fix test
  * add annotation option to treat series value as timestamp
  * wip: first couple of things starting to work
  * fix: added reducer test
  * Adhoc-filtering for prometheus dashboards (#13212)
  * docs: include active directory ldap example and
    restructure
  * First pass at a text based template var, getting feedback
    from devs
  * fix: url update loop fix (#13243)
  * wip: working on reducer test
  * fix: gofmt issues
  * fix: added loading nav states
  * redux: moved folders to it's own features folder
  * fix theme parameter not working problem while prefer theme
    set to light (#13232)
  * fix: added type export to fix failing test
  * fix: fixed typescript test error
  * mobx -&gt; redux: major progress on folder migration
  * another circleci fix
  * Another circleci fix
  * changed gometalinter to use github master
  * commented out metalinter as gopkg is having issues
  * wip: folder settings page to redux progress
  * Fix prometheus label filtering for comparison queries
    (#13213)
  * Upgrade react and enzyme (#13224)
  * enable partial tag matches for annotations
  * put folder name under dashboard name, tweaked aliginments
    in search results
  * support template variables with multiple values
  * Teams page replace mobx (#13219)
  * renames jest files to match new convention
  * upgrade of typescript and tslint and jest (#13223)
  * fix nil pointer dereference (#13221)
  * removes protoc from makefile
  * wip: folder to redux
  * changelog: note about closing #11681
  * Adding Centrify configuration for Oauth
  * wip: progress on redux folder store
  * wip: moving option tabs into viz tab
  * fix: changing edit / view fullscreen modes now work
  * actions for group sync
  * initial render/refresh timing issues
  * team settings
  * wip: began folder to redux migration
  * test for team member selector
  * flattened team state, tests for TeamMembers
  * refactor: moved stuff into new features dir
    manage-dashboards
  * move: moved styleguide to admin
  * fix: fixed singlestat test broken due to file move
  * moved folders from features into the main feature folder
    they belong to
  * Add jsonnet with grafonnet-lib to provisioning docs
  * fix: Dashboard permissions now shows correctly, fixes
    #13201
  * redux: do not use redux logger middleware in production
    builds
  * Allow oauth email attribute name to be configurable
    (#13006)
  * Document required order for time series queries (#13204)
  * refactor: changed AlertRuleItem pause action to callback
  * Fix query builder queries for interval start
  * team members, bug in fetching team
  * renaming things in admin
  * graph legend: use refactored version of scrollbar, #13175
  * Teampages page
  * refactoring: custom scrollbars PR updated, #13175
  * scrollbar: use enzyme for tests instead of
    react-test-renderer
  * changelog: add notes about closing #13121
  * fix code formatting
  * Fix quoting to handle non-string values
  * scrollbar refactor: replace HOC by component with children
  * graph legend: scroll component refactor
  * scrollbar refactor: replace HOC by component with children
  * adds usage stats for alert notifiers (#13173)
  * changelog: typo
  * docs: what's new in v5.3 placeholder
  * tests for withScrollBar() wrapper
  * tests for withScrollBar() wrapper
  * changelog: restructure and add 5.3.0-beta1 header
  * changelog: add notes about closing #13157
  * wrapper for react-custom-scrollbars component
  * graph legend: use 'react-custom-scrollbars' for legend
    scroll
  * wrapper for react-custom-scrollbars component
  * docs: sql datasources min time interval
  * changelog: note about closing #10424
  * docs: minor fixes
  * docs: Updated auth docs
  * docs: updated
  * spelling errors
  * make default values for alerting configurable
  * Adding Action to view the graph by its public URL.
  * changelog: order changes by group (ocd)
  * changelog: add notes about closing #13030
  * added radix rule and changed files to follow rule (#13153)
  * set search query action and tests
  * docs: default paths in the docker container.
  * delete team
  * added only-arrow-functions rule and changed files to
    follow new rule (#13154)
  * load teams and store in redux
  * build: uses 1.1.0 of the build container.
  * creating types, actions, reducer
  * Only authenticate logins when password is set (#13147)
  * refatoring: minor changes to PR #13149
  * Add min time interval to mysql and mssql
  * build: updated build-container with go1.11.
  * added no-conditional-assignment rule and changed files to
    follow new rule
  * fix test failures for timeInterval
  * document postgres min time interval
  * Add min time interval to postgres datasource
  * Changed functions to arrow functions for
    only-arrow-functions rule. (#13131)
  * mobx: removed unused SearchStore
  * fix: Updated test
  * redux: minor changes to redux thunk actions and use of
    typings
  * Reactify sidebar (#13091)
  * Changed functions to arrow functions for
    only-arrow-functions rule.
  * removed unused mobx state
  * changed functions to arrowfunctions for
    only-arrow-functions rule (#13127)
  * fix: fixed home dashboard redirect issue when behind
    reverse proxy, fixes #12429 (#13135)
  * tests
  * Changed functions to arrow functions for
    only-arrow-functions rule.
  * improve remote image rendering (#13102)
  * handle new variables created not yet added
  * changelog: add notes about closing #10095
  * graph legend: implement series toggling and sorting
  * docs: postgres provisioning
  * changelog: adds note about closing #13125
  * fixed title prefix, fixes #13123 (#13128)
  * Reopen log files after receiving a SIGHUP signal (#13112)
  * Fixed a bug in the test and added test for filter alert
    rules
  * graph legend: react component refactor
  * added Bitcoin as a currency option
  * added new-parens rule (#13119)
  * cli: avoid rely on response.ContentLength (#13120)
  * some basic selector tests
  * fixed testcase
  * pausing alert
  * docs: v5.2 upgrade notice, ref #13084
  * changelog: add notes about closing #7330
  * extend from purecomponent
  * remove log
  * actions and reducers for search filter
  * added rule use-isnan and and updated file to follow new
    rule (#13117)
  * added no-namespace and no-reference rules (#13116)
  * added no-angle-bracket-type-assertion rule and updatet
    files to follow rule (#13115)
  * Updated rules for variable name (#13106)
  * update wording and punctuation  (#13113)
  * redux: improved state handling
  * redux: progress
  * wip: load alert rules via redux
  * refactor: changed nav store to use nav index and selector
    instead of initNav action
  * moving things around
  * Fix array display from url
  * wip: solid progress on redux -&gt; angular location bridge
    update
  * wip: moving things around
  * wip: moveing things around
  * wip: redux refactor
  * pass timerange in meta data queries
  * ignore information_schema tables
  * added jsdoc-format rule and fixed files that didn't follow
    new rule (#13107)
  * set member-access and no-var-keyword to true, removed
    public in two files (#13104)
  * fix: for text flickering in animation on chrome on windows
  * graph legend: minor refactor
  * use quoting functions from MysqlQuery in datasource
  * render query from query builder
  * graph: make table markup corresponding to standards
  * graph: legend as React component
  * wip: redux
  * redux: wip progress for using redux
  * fixed so preloader is removed when app is loaded
  * removed console.log
  * separated fade-ins for logo and text, tweaked delays and
    timing for fade-in animations
  * docs: minor updates, more work to do
  * ux: minor fixes to loading screen
  * start implementing mysql query editor as a copy of
    postgres query editor
  * reset metric column when changing table
  * fix timeFilter resetting when changing table
  * when changing table, refresh panel once after columns have
    been changed
  * added pro-tip text, removed pro-tip link
  * fixed styling for background and text, added intro
    animation, added fade in to text
  * fix timecolumn handling when table changes
  * set default for timeGroup in query builder to $__interval
  * when changing table reset columns
  * fix metric column suggestions
  * fix suggestions for metric column
  * Return correct path for OpenBSD in cli's returnOsDefault
    (#13089)
  * updated changelog
  * New TV Mode, dashboard toolbar update (layout change &amp; new
    cycle view mode button) (#13025)
  * added this:any to functions and changed functions to
    arrowfunctions
  * feat: loading css async &amp; inline svg
  * Explore: keep query when changing datasources (#13042)
  * changed var to let in 50 files (#13075)
  * changed var to let in last files (#13087)
  * tsconfig: started on setting noImplicitThis to true
  * tsconfig: format file
  * document postgres version and TimescaleDB option
  * tslint: added 1 more rule, #12918
  * tslint: added 2 more rules and removed unused component,
    #12918
  * tslint: added a new tslint rule
  * added rule prefer const to tslint (#13071)
  * dep ensure (#13074)
  * hide Query Builder button for table panels
  * check for correct quoting of multiple singlequotes
  * changed var to const 2 (#13068)
  * changed var to const (#13061)
  * update latest.json to latest stable version
  * docs: corrected docs description for setting
  * remove min time interval from datasource config
  * remove unneeded queryOptions
  * changelog: add notes about 4.6.4 and 5.2.3 releases
  * fix quoting
  * strip quotes when auto adding alias
  * handle quoting properly for table suggestion
  * link to github instead
  * recheck timecolumn when changing table
  * update filter macro on time column change
  * string formating fixes
  * go fmt fixes
  * Moved tooltip icon from input to label #12945 (#13059)
  * added empty cta to playlist page + hid playlist table when
    empty (#12841)
  * changed from rotating to bouncing, maybe to much squash
    and stretch
  * Update provisioning.md
  * make default mode for table panels raw editor
  * improve description for timescaledb option
  * Review feedback.
  * use series matchers to get label name/value
  * changelog: add notes about closing #12865
  * fixed so validation of empty fields works again
  * added a loading view with a spining grafana logo
  * fix handling of variable interpolation for IN expresions
  * tslint: tslint to const fixes part3 (#13036)
  * tslint: more const fixes (#13035)
  * tslint: changing vars -&gt; const (#13034)
  * tslint: autofix of let -&gt; const (#13033)
  * fix: minor fix to changing type
  * upgrades to golang 1.11
  * wip: angular panels now have similar edit mode and panel
    type selection enabling quick changing between panel react
    and angular panel types
  * add min interval to postgres datasource
  * wip: major change for refresh and render events flow
  * fix: going from fullscreen fix
  * wip: minor fixes
  * copy and docs update for alert notification reminders
  * change/add tests for alerting notification reminders
  * wip: trying to align react &amp; angular edit modes
  * WIP Update tslint (#12922)
  * changelog: add notes about closing #12952 #12965
  * build: fixes rpm build when using defaults.
  * docs: reminder notifications update
  * changelog: add notes about closing #12486
  * docs: changes
  * created a section under administration for authentication,
    moved ldap guide here, created pages for auth-proxy,
    oauth, anonymous auth, ldap sync with grafana ee, and
    overview, moved authentication guides from configuration
    to, added linksin configuration page to guides
  * fixed so animation starts as soon as one pushes the button
    and animation stops if login failed
  * added link to getting started to all, changed wording
  * tests: fix missing tests (with .jest suffix)
  * docs: alerting notification reminders
  * update copy/ux for configuring alerting notification
    reminders
  * heatmap: fix tooltip bug in firefox
  * fix tableSegment and timeColumnSegment after table
    suggestion
  * Update notifications.md
  * sql: added code migration type
  * changelog: add notes about closing #11890
  * Explore: Apply tab completion suggestion on Enter (#12904)
  * Show min-width option only for horizontal repeat (#12981)
  * Fix bulk-dashboards path (#12978)
  * add suggestions for reminder frequency and change copy
  * don't write to notification journal when testing
    notifier/rule
  * remove unnecessary conversion (metalinter)
  * fix after merge with master
  * Refresh query variable when another variable is used in
    regex field (#12961)
  * Webpack tapable plugin deprecation (#12960)
  * unify quoting
  * dsproxy: interpolate route url
  * prefill editor with first metric table
  * only allow 1 filter macro in where clause
  * fix timeColumnType assignment
  * make suggested filter macro depend on type
  * use unixEpochGroup macro for unix timestamp
  * alerting: inline docs for the slack channel.
  * Replacing variable interpolation in 'All value' value
  * changelog: add notes about closing #12229
  * cleaning up test data
  * changelog: add notes about closing #12892
  * docs: es versions supported
  * devenv: update sql dashboards
  * when value in variable changes, identify which variable(s)
    to update
  * removed inverse btn styling and added bgColor to generic
    oauth and grafana.com login buttons, added styling so log
    in button uses dark theme inverse btn styling both for
    dark and light theme
  * suggest operators depending on datatype
  * Doc - fix title level
  * Update doc about repeating panels
  * Doc - fix broken link
  * build: beta versions no longer tagged as latest.
  * docs: cleanup.
  * docs: docker and restarts.
  * update persisted parts on param change
  * persist datatype information
  * Don't do value suggestions for numeric and timestamp
  * created a class for loading buttons, added a button for
    when login slow on login page
  * rename postgres_query.jest.ts to .test.ts
  * fix variable escaping
  * autodetect timescaledb when version &gt;= 9.6
  * build: duplicate docker run-script removed.
  * detect postgres version for saved datasources
  * Set User-Agent header in all proxied datasource requests
  * use pointer cursor for buttons in query editor
  * docs: cloudwatch dimensions reference link.
  * require postgres 9.4+ for ordered set aggregate functions
  * add postgres version to datasource config
  * only show first/last aggregate when timescaledb is enabled
  * keep jsonData in PostgresDatasource
  * docs: remove message property in response from get alerts
    http api
  * changelog: add notes about closing #5623
  * build: cleanup
  * should allow one default datasource per organisation using
    provisioning
  * build: fixes rpm verification.
  * docs: add grafana version note for gitlab oauth
  * docs: gitlab: add note about more restrictive API scope
  * social: gitlab_oauth: set user ID in case email changes
  * docs: document GitLab authentication backend
  * social: add GitLab authentication backend
  * build: verifies the rpm packages signatures.
  * changelog: add notes about closing #12224
  * added guide for logging in to grafana for the first and
    how to add a datasource
  * docs: update
  * feat: add auto fit panels to shortcut modal, closes #12768
  * changelog: add notes about closing #12680
  * docs: update postgres provisioning
  * Remove dependencies
  * Rename test files
  * changelog: add notes about closing #12598
  * add version disclaimer for TimescaleDB
  * document TimescaleDB datasource option
  * Use variable in newPostgresMacroEngine
  * Remove Karma scripts and docs
  * changelog: add notes about closing #10705
  * fix: ds_proxy test not initiating header
  * Don't pass datasource to newPostgresMacroEngine
  * Remove tests and logs
  * Fix for Graphite function parameter quoting  (#12907)
  * don't render hidden columns in table panel (#12911)
  * fix: added missing ini default keys, fixes #12800 (#12912)
  * refactor timescaledb handling in MacroEngine
  * change: Set User-Agent to Grafana/%Version%
    Proxied-DS-Request %DS-Type% in all proxied ds requests
  * Remove comment
  * Cleanup
  * All tests passing
  * Class to function. Half tests passing
  * Karma to Jest: graph (refactor) (#12860)
  * tech: removed js related stuff now that 99% is typescript
    (#12905)
  * Add React container
  * changelog: add notes about closing #12805
  * fix redirect to panel when using an outdated dashboard
    slug (#12901)
  * Add commit to external stylesheet url (#12902)
  * build: increase frontend tests timeout without no output
  * fix: Alerting rendering timeout was 30 seconds, same as
    alert rule eval timeout, this should be much lower so the
    rendering timeout does not timeout the rule context, fixes
    #12151 (#12903)
  * changelog: add notes about closing #12476
  * now hides team header when no teams + fix for list hidden
    when only one team
  * Rename to HeatmapRenderer
  * Mock things
  * Explore: Fix label filtering for rate queries
  * add $__unixEpochGroup to mssql datasource
  * add $__unixEpochGroup to mysql datasource
  * Add $__unixEpochGroup macro to postgres datasource
  * changed const members to filteredMembers to trigger get
    filtered members, changed input value to team.search
    (#12885)
  * get timecolumn datatype on timecolumn change
  * changelog: add notes about closing #12882
  * Removes link to deprecated docker image build
  * Add mocks
  * fix datatype query
  * Changelog update
  * docker: makes it possible to set a specific plugin url.
  * Add support for $__range_s (#12883)
  * Refactor setting fillmode
  * Update dashboard.md
  * Fix typo
  * Explore: label selector for logging
  * Replace element
  * Rewrite heatmap to class
  * Explore: still show rate hint if query is complex
  * Explore: Filter out existing labels in label suggestions
  * Add note for #12843
  * Fix initial state in split explore
  * replaced with EmptyListCta
  * Begin conversion
  * changed messaging
  * mention time_bucket in timescaledb tooltip
  * keep legend scroll position when series are toggled
    (#12845)
  * replaced confirm delete modal with deleteButton component
    in teams members list
  * [wip]added empty list cta to team list, if statement
    toggles view for when the list is empty or not
  * Update NOTICE.md
  * Fix padding for metrics chooser in explore
  * fix rebase error
  * revert passing ctrl to testDatasource
  * change timescaledb to checkbox instead of select
  * add timescaledb option to postgres datasource
  * build: fixes png rendering in the docker based
    docker-image build.
  * remove duplicated /tmp entry in .dockerignore
  * move run script, update README
  * produce an image compatible with grafana-docker
  * More efficient builds and some fixes to the Go binaries
  * Simple Docker-based build option
  * Add example OR search_filter to docs
  * Explore: expand recording rules for queries
  * Explore: Query hints for prometheus (#12833)
  * Convert URL-like text to links in plugins readme
  * skip target _self to remove full page reload
  * use uid when linking to dashboards internally in a
    dashboard
  * add previous fill mode to query builder
  * added more info about the teams
  * removed mock-teams, now gets teams from backend
  * changelog: add notes about closing #12756
  * add api route for retrieving teams of signed in user
  * devenv: update sql dashboards
  * team list for profile page + mock teams
  * changelog: add notes about closing #11270
  * Fixing bug in url query reader and added test cases
  * fix missing *
  * rename last fillmode to previous
  * change fillmode from last to previous
  * return proper payload from api when updating datasource
  * Review feedback
  * changelog: update #12768
  * Remove window
  * Fix url param errors
  * Explore: Metrics chooser for prometheus
  * Add clear row button
  * Add clear button to Explore
  * Explore: show message if queries did not return data
  * Fix closing parens completion for prometheus queries in
    Explore (#12810)
  * Update ROADMAP.md
  * Update ROADMAP.md
  * Update ROADMAP.md
  * switched to lowercase
  * replaced escape() call, renamed formatter to be more
    expressive
  * Smaller docker image (#12824)
  * build: failing to push to docker hub fails the build.
  * Reversed history direction for explore
  * Explore: Add history to query fields
  * unix socket docs
  * Explore: facetting for label completion (#12786)
  * docs: how to build a docker image.
  * Remove Karma test
  * All tests passing
  * Add mock constructor
  * Begin conversion
  * Convert query control
  * Convert datasource
  * refactor: take submenu into account PR #12796
  * refactor: renaming variables, refactoring PR #12796
  * refactor: moving code around a bit, refactoring PR #12796
  * Remove weird import
  * Disable submenu when autopanels is enabled
  * Extract to own method
  * Use  and add keybard shortcut
  * Add temporary url parameter
  * Replace floor with round
  * Go with just single margin compensation
  * Add margin and padding compensation
  * Remove weird import
  * Fit panels to screen height
  * dont break default parameters for functions
  * fix suggestion query
  * renamed slate unit tests to .jest.ts
  * Remove simple tests
  * Support client certificates for LDAP servers
  * Begin conversion
  * Add click on explore table cell to add filter to query
    (#12729)
  * dont order for aggregate
  * build: makes it easier to build a local docker container.
  * add moving average to query builder
  * adjust frontend test
  * use $__timeGroupAlias macro
  * specify grafana version for last fill mode
  * add fillmode 'last' to sql datasource
  * build: disables external docker build for master and
    release.
  * build: complete docker build for master and releases.
  * build: removes unused args to docker build.
  * build: imported latest changes from grafana-docker.
  * build: attach built resources.
  * build: builds docker image from local grafna tgz.
  * build: new workflow for PR:s and branches.
  * docker: inital copy of the grafana-docker files.
  * changelog: add notes about closing #1823 #12801
  * Add auto_assign_org_id to defaults.ini
  * changelog: add notes about closing #12749
  * changelog: add notes about closing #12766
  * adjust test dashboards
  * remove info logging
  * added two new classes for color, fixed so link has value
    color
  * changelog: add notes about closing #12063
  * Add new Redshift metrics and dimensions for Cloudwatch
    datasource
  * changelog: add notes about closing #12752
  * changelog: update
  * Improve iOS and Windows 10 experience (#12769)
  * add series override option to hide tooltip (#12378)
  * changelog: add notes about closing #12785
  * removed table-panel-link class
  * removed table-panel-link class and add a class white to
    modify table-panel-cell-link class
  * add warning when switching from raw sql mode
  * add more prominent button for switching edit mode
  * document $__timeGroupAlias
  * add $__timeGroupAlias to mysql and mssql
  * fix custom variable quoting in sql* query interpolations
  * add compatibility code to handle pre 5.3 usage
  * Change to arrow functions
  * Add all tests to one file
  * changelog: add notes about closing #12561
  * Remove angularMocks
  * All tests passing
  * replaced style with class for links
  * Add $__timeGroupAlias to postgres macros
  * adjust test dashboards
  * remove alias from postgres $__timeGroup macro
  * changelog: add notes about closing #12762
  * fix: team email tooltip was not showing
  * fix: test data api route used old name for test data
    datasource, fixes #12773
  * removed a blank space in div
  * fixed color for links in colored cells by adding a new
    variable that sets color: white when cell or row has
    background-color
  * changelog: add notes about closing #12300
  * Weird execution order for the tests...
  * fixed test result
  * added urlescape formatting option
  * changelog: add notes about closing #12744
  * changelog: add notes about closing #12727
  * add aws_dx to cloudwatch datasource
  * also fixed 'Watt per square metre'
  * fixed that missing one
  * add version note to metric prefix and fix typo
  * devenv: update sql dashboards
  * mssql: update tests
  * fix usage of metric column types so that you don't need to
    specify metric alias
  * Begin conversion
  * changelog: update
  * changelog: add notes about closing #12747
  * Add missing tls_skip_verify_insecure (#12748)
  * rename special to windows
  * add first and last support
  * refactor function handling in query builder
  * refactor column function handling
  * consistent nameing fro group and select
  * mssql: add logo
  * add tests for metric column prefix to mssql
  * add metric column prefix test for mysql
  * document metric column prefix in query editor
  * document metric column prefix for mysql and mssql
  * Remove extra mock
  * Karm to Jest
  * correct volume unit
  * Remove lo
  * Test passing. Remove Karma
  * adjust metric prefix code to sql engine refactor
  * add testcase for metric column as prefix
  * Use metric column as prefix
  * Fix emit errors
  * Fix test
  * Add async/await
  * refactor schema query generation
  * removed unused class from the deletebutton pr
  * frontend part with mock-team-list
  * Update test for local time
  * update devenv datasources and dashboards for sql
    datasources
  * Begin conversion
  * use const for rowlimit in sql engine
  * Cleanup
  * Remove Karma file
  * All tests passing
  * All except one passing
  * remove tableschema from query builder ui
  * changelog: add notes about closing #12731
  * elasticsearch: support reversed index patterns
  * update devenv datasources and dashboards for sql
    datasources
  * mssql: use new sql engine
  * mysql: use new sql engine
  * postgres: use new sql engine
  * refactor sql engine to make it hold all common code for
    sql datasources
  * Pass more tests
  * Refactor Explore query field (#12643)
  * Begin conversion
  * All tests passing. Remove Karma test.
  * Almost all tests passing
  * Add tslib to TS compiler
  * docs: using interval and range variables in prometheus
  * Two passing tests
  * Update Configuration.md
  * Start conversion
  * changelog: add notes about closing #12533
  * changelog: add notes about closing #12668
  * changelog: update
  * changelog: add notes about closing #12668
  * fix for typeahead background, increased lighten
  * added position absolute and some flexbox so I could remov
    changes in display and setTimeout, added tests and types,
    did some renaming
  * fix invalid reference
  * minor fixes
  * fix failing test due to time diff issues
  * Remove comments
  * remove unneeded comment
  * Remove old influx stuff
  * changelog: add notes about closing #12489
  * changelog: add notes about closing #12551
  * changelog: add notes about closing #12533
  * Karma to Jest
  * Begin conversion
  * changelog: add notes about closing #12589
  * changelog: add notes about closing #12636 #9827
  * Remove influx qeury_ctrl jest, as it is already completed
  * Test fail depending on test order
  * Karma to Jest: begin influx query_ctrl
  * Make beautiful
  * Karma to Jest: completer
  * Remove comments and Karm test
  * Karma to Jest
  * Pass more tests
  * changelog: add notes about closing #12644
  * fix code style
  * docs: mentation that config changes requires restart.
  * return 400 if user input error
  * changing callback fn into arrow functions for correct
    usage of this (#12673)
  * Fix requested changes
  * Add templating docs for
  * Add docs about global variables in query template
    variables
  * Figuring out why it doesn't initialize
  * Add support for interval in query variable
  * Add jest file
  * Change to arrow functions
  * Add graph_ctrl jest
  * changelog: add notes about closing #12691
  * Update kbn.ts
  * Add jest test file
  * Id validation of CloudWatch GetMetricData
  * Fix timezone issues in test
  * fix window function query without group by
  * changelog: adds note for #11487
  * add order by to metadata queries
  * set explicit order for rate and increase
  * escaping ssl mode on postgres param
  * fix pre gui queries shortcircuit
  * Add unit test for InfluxDB datasource
  * Support timeFilter in templating for InfluxDB
  * Datasource for Grafana logging platform
  * removed blue-dark variable with blue-light in light-theme,
    blue variable now has same value as blue-dark had before,
    should fix issue with any low contrast issues with blue in
    light-theme, this made query-blue variable unnecessery
    removed it, added variable for variable dropdown highlight
    background
  * removed import appEvents
  * built a component for delete button in tables, instead of
    using a modal to confirm it now does it in the row of the
    table, created a sass file for the component, the
    component uses css transitions for animation
  * fix: postgres/mysql engine cache was not being used, fixes
    #12636 (#12642)
  * added: replaces added to grafana
  * fix: datasource search was not working properly
  * add groupby when adding first aggregate
  * docs: minor docs fix
  * Fix label suggestions in Explore query field
  * pluginloader: expose flot gauge plugin
  * alert: add missing test after refactor
  * Handle query string in storage public_url (#9351) (#12555)
  * HTTP API documentation +fix when updating a playlist
    (#12612)
  * Explore: calculate query interval based on available width
  * Use url params for explore state
  * Dont parse empty explore state from url
  * Fix default browser th font-weight
  * Adding eval_data to alerts query results
  * ldap: Make it possible to define Grafana admins via ldap
    setup, closes #2469
  * nginx: update to docker block
  * minor fix for legacy panels
  * Remove string casting for template variables in prometheus
  * ldap: docker block readme update
  * Make prometheus value formatting more robust
  * Update README.md
  * Devenv testdata dashboards (#12615)
  * fix test for query generation
  * dont run queries if target has no table set
  * add query to find metric table
  * add popover for metric column
  * rename PostgresQueryBuilder to PostgresMetaQuery
  * dont expand variables in rawSql
  * filter datatype for groupby suggestions
  * fix rate special function when using group by
  * remove unused import
  * refactor adding sqlPart
  * remove render code from sql_part
  * fix bug in query generation with metricColumn
  * refactor PostgresQuery
  * refactor PostgresQueryCtrl
  * refactor PostgresQueryCtrl and PostgresQuery
  * refactor addGroupBy and removeGroupByPart
  * use let for variable declaration
  * Add templateSrv to PostgresQuery tests
  * add tests for query generation
  * Reverted $q to Promise migration in datasource_srv
  * Allow settting of default org id to auto-assign to
    (#12401)
  * Remove unused SASS variables (#12603)
  * fix: panel embedd scrolbar fix, fixes #12589 (#12595)
  * fix tests for postgres datasource
  * Set datasource in deep links to Explore
  * send timerange with metricFindQuery
  * Explore Datasource selector
  * changed you to your (#12590)
  * indent generated SQL
  * Add comments
  * Fix freezing browser when loading plugin
  * handle counter overflow and resets in rate
  * partition by metricColumn when using increase
  * add rate and increase special functions
  * wip: another baby step, another million to go
  * skip backend request if extended statistics is invalid.
    (#12495)
  * Refactor team pages to react &amp; design change (#12574)
  * (prometheus) prevent error to use $__interval_ms in query
    (#12533)
  * fix: folder picker did not notify parent that the initial
    folder had been changed, fixes #12543 (#12554)
  * Add support for skipping variable value in URL, fixes
    #12174 (#12541)
  * Update mac.md
  * Update windows.md
  * Update rpm.md
  * Update debian.md
  * Don't build-all for PRs
  * Refactor value column SQL generation
  * Refactor metric column sql generation
  * fix: requests/sec instead of requets (#12557)
  * Add folder name to dashboard title (#12545)
  * Fix css loading in plugins (#12573)
  * Refactor group by query generation
  * Refactor where clause generation
  * refactor SQL generation for value columns
  * Refactor time column sql generation
  * Refactor render function on PostgresQuery
  * prepare sql part for special functions
  * set query gui as default handle old panels gracefully
  * Added BurstBalance metric to list of AWS RDS metrics.
  * dont throw exception for unknown types
  * Prevent scroll on focus for iframe
  * add alias when adding group by
  * Add new sequential color scales
  * add aggregates when adding group by
  * add column alias when add aggregate function
  * move go vet out of scripts and fixing warning (#12552)
  * fix enter in sql_part_editor
  * fix editing expression parts
  * wip: you can now change panel type in edit mode
  * rename inputBlur to switchToLink
  * react panels: working on changing type
  * Cleanup and remove some jest.fn()
  * fix spelling
  * add current value to dropdown if its not in resultset
  * Revert 'show current value in dropdown when its not part
    of list'
  * Remove irrelevant tests and templateSrv stub
  * show current value in dropdown when its not part of list
  *  redid redux poc, old branch was to old and caused to many
     conflicts
  * wip: redux poc
  * fix diff and percent_diff (#12515)
  * improve error message
  * generate unique id when variable is multi
  * support GetMetricData
  * dep ensure
  * update aws-sdk-go
  * Update lodash/moment version (#12532)
  * fix: minor css change
  * wip: minopr progress on react panel edit infra
  * Tabs to spaces in tslint (#12529)
  * wip: minor progres on react panels edit mode
  * add None to metric column suggestions
  * handle pre query gui queries gracefully
  * dont break on panels that dont have rawQuery set
  * refactor transformToSegments
  * devenv: updated devenv provision scripts
  * wip: viz editor started
  * ux: minor fix/tweak to inactive view mode, think logo
    should be visible &amp; fixes dashboard title alignment
  * changelog: add notes about closing #12379
  * Fix datasource sorting with template variables
  * another baby step
  * changelog: add notes about closing #12484
  * changelog: add notes about closing #12506
  * rename quoteLiteral to quoteIdentAsLiteral
  * changelog: add notes about closing #12506
  * fix links not updating after changing variables
  * remove unused function removeSelect
  * put updateParam back in
  * fix where clause generation
  * remove hardcoded $__timeFilter, make macros functional in
    where clause
  * remove dead code, make label more flexible
  * fix constraint removal
  * react-panels: minor progress on data flow
  * dont autoquote, suggest quoted values if requried
  * prometheus heatmap: fix unhandled error when some points
    are missing
  * fix caret for help button is ds http settings
  * do not autoquote identifiers
  * fix group by ui
  * changelog: add notes about closing #11618 #11619
  * fix where constraint handling
  * remove dead code from sql_part fix where clause query
    generation
  * Add mock to test files
  * Create new instance in beforeEach
  * Remove comments
  * Karma to Jest: Cloudwatch datasource
  * Karma to Jest: MySQL datasource
  * Karma to Jest: postgres datasource
  * Basic cleanup
  * Add mocks in test file
  * Remove q and stub
  * Add Jest stubs
  * Remove async
  * Remove logs and comments
  * Start elastic ds test conversion
  * run enterprise build only on master for now
  * refix the settings indentation
  * update stats admin doc
  * fix json indentation
  * include where constraints in query generation
  * remove unnecessary conversions
  * rearrange elements of query builder
  * mv query_part to sql_part
  * changelog: update
  * changelog: add notes about closing #11818
  * changelog: add notes about closing #12460
  * changelog: add notes about closing #8186
  * changelog: add notes about closing #12379
  * changelog: add notes about closing #12362
  * devenv: open ldap docker block now prepopulating data with
    correct member groups
  * ci: Only publish grafana enterprise packages tagged with
    enterprise.
  * Make table sorting stable when null values exist (#12362)
  * Fix bar width issue in aligned prometheus queries (#12483)
  * correct example (#12481)
  * ldap: improved ldap test env with more structured users
    and groups
  * test: fixed usage of wrap in tests.
  * ci: typo
  * ci: publishes grafana enterprise to s3.
  * refactoring: making api wrap public
  * refactoring: enterprise build/hooks refactorings (#12478)
  * Karma to Jest: datasource_srv (#12456)
  * fix: #12461 introduced issues with route registration
    ordering, adding plugin static routes before plugins
    package had been initiated (#12474)
  * omit extra template refresh (#12454)
  * wip: minor progress on DataPanel
  * Improve extensions build.  (#12461)
  * [mysql] fix $__timeGroup rounding (#12469)
  * [mssql] fix $__timeGroup rounding (#12470)
  * [postgres] fix timeGroup macro rounding (#12468)
  * pkg/social/github: Allow changing of userinfo data
    (#12471)
  * notifications: dont return error if one notifer failed
  * use sqlPart for ui parts
  * avoid calling os.Exit outside main.go (#12459)
  * update mysql/mssql query/annotation help sections
  * docs: update folders api
  * Changed documentation for MSSQL and MySQL to reflect macro
    changes
  * docs: update scripted dashboard for v5
  * docs: update scripted dashboard for v5
  * docs: update organisation http api
  * docs: upd windows installation
  * notifications: send notifications synchronous
  * notifications: read without tran, write with tran
  * registry: adds more comments
  * registry: adds comments to interfaces
  * changelog: update
  * changelog: update
  * changelog: add notes about closing #12438
  * alerting: only log when screenshot been uploaded
  * fixes typos
  * Reverted yarn.lock to master
  * Used PostgreSQL TSDB as a model the set up the
    __timeFilter, __timeFrom, and __timeTo macros for
    Microsoft SQL and MySQL
  * changelog: add notes about closing #12444
  * Revert 'auth proxy: use real ip when validating white
    listed ip's'
  * changelog: adds note for #11892
  * changelog: add notes about closing #12430
  * fix footer css issue
  * Karma to Jest: 3 test files (#12414)
  * fix: log close/flush was done too early, before server
    shutdown log message was called, fixes #12438
  * react panels wip
  * Karma to Jest: value_select_dropdown (#12435)
  * support passing api token in Basic auth password (#12416)
  * Add disabled styles for checked checkbox (#12422)
  * changelog: add notes about closing #11920
  * changelog: add notes about closing #11920
  * changelog: update
  * docs: upd what's new in v5.2
  * docs: update index with link to what's new in 5.2 instead
    of 5.0
  * wip: react panels editor mode, tabs working
  * changelog: add notes about closing #12385
  * react panels wip
  * feat: panels v2, metrics-tab loading
  * docs: upd what's new in v5.2
  * docs: upd what's new in v5.2
  * login: fix layout issues
  * build: yarn should be included out of the box on circle ci
  * notifier: handle known error first
  * ensure that if the dasboardID is negative, it will not
    bypass the checking of the right (#12398)
  * changelog: add notes about closing #11968
  * Webpack 4 (WIP) (#12098)
  * Make pre/postfix coloring checkboxes inactive when gauge
    is active
  * removes unused return object
  * handle 'dn' ldap attribute more gracefully (#12385)
  * Update ROADMAP.md
  * Fix typo
  * Switched MySQL and MSSQL macros for timeFilter and related
    to use BETWEEN and calculate UNIX time server side instead
    of database side. Fixes #11618 #11619
  * docs: update installation instructions
  * routing: raise panic if duplicate routes are added
  * routing: allows routes to be added to existing groups
  * changelog: add notes about closing #11868
  * enhance error message if phantomjs executable is not found
  * fix: annnotation api &amp; sql issue
  * changelog: add notes about closing #12248
  * set correct text in drop down when variable is present in
    url using key/values
  * Light improve of massive delete annotation api (#12390)
  * Fix 12248
  * Fixing wrong /public path, relative to the webpack.dev
    script, that would avoid webpack from cleaning previous
    builds. (#12351)
  * changelog: add notes about closing #12383
  * changelog: adds note about closing #12313
  * Return a 404 when deleting a datasource through the API if
    it doesn't exist and add a test for it to confirm #12313
  * Set $rootScope in DatasourceSrv
  * Add options to colorize prefix and postfix in singlestat
  * devenv: adds dashboard with multiple rows
  * changelog: adds note about closing #10971
  * Pass configured/auth headers to a Datasource.
  * Karma to Jest: history_ctrl. .gitingore: .vs/
  * changelog: add notes about closing #12359
  * build: fix signing of multiple rpm packages
  * docs: what's new in v5.2 and docker installation updates
  * tech: adds comments about route register code
  * changelog: add notes about closing issue
  * Karma to Jest: history_ctrl. Update version: ts-jest
  * changelog: add notes about 5.2.0-beta2
  * changelog: add notes about closing #12240
  * changelog: add notes about closing #12256
  * changelog: add notes about closing #11792
  * changelog: add notes about closing #12315
  * dashboard: fix drop down links
  * wip: react panels, query editor loading from react
    PanelEditor view
  * fix regressions after save modal changes of not storing
    time and variables per default
  * wip: react panel minor progrss
  * updated
  * Karma to Jest: history_srv (#12341)
  * react panels minor progress
  * make sure to process panels in collapsed rows when
    exporting dashboard
  * changelog: add notes about closing #3132
  * docs: update installation instructions
  * react panel minor progress
  * ldap: add note about config in Grafana
  * ldap: add note to dockerfile
  * changelog: add notes about closing #12343
  * docs: Plugin review guidelines and datasource auth pages
  * remove unused argument in default scenario of guardian
    test
  * fix: fixed permission issue with api key with viewer role
    in dashboards with default permissions
  * wip: react panel makeover mini progress
  * Karma to Jest: time_srv (#12303)
  * Karma to Jest: team_details_ctrl (#12321)
  * Fix error in InfluxDB query
  * expose functions to use sessions
  * changelog: adds note about closing #11607
  * test commit for checking github permissions
  * changelog: add notes about closing #12278
  * changelog: add notes about closing #11076
  * snapshot: copy correct props when creating a snapshot
  * added comment to reason the id tag
  * set current org when adding/removing user to org
  * changelog: add notes about closing #10707
  * Include the vendor directory when copying source in to
    Docker (#12305)
  * changelog: adds note about closing #12199
  * adds tests for journaling sql operations
  * use epoch to compare timestamp
  * adds inTransactionCtx that calls inTransactionWithRetryCtx
  * merge create user handlers
  * transactions: start sessions and transactions at the same
    place
  * adds info about eval/reminder interval
  * tests for defaultShouldNotify
  * cloudwatch: handle invalid time range
  * notifications: make journaling ctx aware
  * make sure to use real ip when validating white listed ip's
  * Adding Cloudwatch AWS/AppSync metrics and dimensions
  * notifications: gather actions in one transaction
  * changelog: adds note about closing #12286
  * sql: adds tests for InTransaction
  * bus: noop should still execute fn
  * removes unused code
  * bus: Dispatch now passes empty ctx if handler require it
  * bus: dont start transaction when creating session
  * bus: dont mix ctx/classic handlers
  * bus: DispatchCtx can now invoke any handler
  * refactoring: renamed AddCtxHandler to AddHandlerCtx PR
    #12203
  * refactoring: transaction manager PR #12203
  * fixes typo in code
  * check if admin exists or create one in one transaction
  * replace begin/end with wrapper function
  * bus: support multiple dispatch in one transaction
  * docs: adds info about grafana-dev container
  * changelog: add notes about closing #12282
  * Added Litre/min and milliLitre/min in Flow (#12282)
  * remove papaparse dependency
  * list name is deleteDatasources, not delete_datasources
  * remove internal influx ifql datasource
  * Document the endpoint for deleting an org
  * tests: rewrite into table tests
  * influxdb: adds mode func to backend
  * Fix queryfield wrapper css
  * Fix Queryfield metrics field missing
  * batch DOM reads from query field typeahead
  * hint support for typeahead
  * Make suggestions an object
  * Trigger typeahead on Ctrl-Space
  * refactor Explore query field
  * changelog: add notes about closing #11484
  * changelog: add notes about closing #11233
  * Remove import
  * Fix PR feedback
  * Removed papaparse from external plugin exports
  * Karma to Jest: query_builder
  * dsproxy: move http client variable back
  * Karma to Jest: threshold_mapper
  * Expose react and slate to external plugins
  * Karma to Jest: threshold_manager
  * Karma to Jest: query_def, index_pattern
  * Remove import
  * Karma to Jest: elastic_response
  * changelog: notes about closing #12189
  * #11607 corrected file cleanup test
  * #11607 removed unnecessary conversion (from gometalinter)
  * Improve test readability
  * #11607 fixed formatting
  * #11607 Cleanup time of temporary files is now configurable
  * moved link icon in panel header
  * Karma to Jest: playlist_edit_ctrl
  * Karma to Jest: exporter
  * Update graphite.md
  * changelog: add notes about closing #10796
  * added id tag to Panels for html bookmarking on longer
    Dashboards
  * dashboard import to folder: minor fixes
  * Docs: output location from build script
  * Correct Provisioning documentation link
  * dsproxy: allow multiple access tokens per datasource
  * Mock core in jest-setup
  * Docs: Update Build from Source
  * Convert tests from Karma to Jest
  * changelog: add notes about closing #11963
  * save-modal save button (#12047)
  * Karma to Jest: graph-tooltip
  * removed QueryOptionsCtrl references
  * update latest.json to 5.1.3
  * use ng-if
  * hot-fix ifql testdatasource()
  * triggers grafana-docker master build
  * changed som variables to values so it's the same for dark
    and light theme, added special styling for login text,
    link and input (#12196)
  * mattn/go-sqlite3 v1.6.0 to v1.7.0
  * changelog: add notes about closing #11074
  * fixed so panel title doesn't wrap and  (#12142)
  * graph: fix legend decimals precision calculation
  * Use Passive eventListener for 'wheel' (#12106)
  * removes more unused code
  * removes unused code
  * nicer collapsed row behaviour (#12186)
  * remove DashboardRowCtrl (#12187)
  * add panel on enter
  * autoFocus the search filter
  * adds missing return statement
  * Fix typo: eleasticsearch -&gt; elasticsearch (#12184)
  * Annotations support for ifql datasource
  * dashboard: improve import UX for non-editor users
  * Template variable support for ifql datasource
  * Use cut to trim down the SHA1.
  * show import menu in sidenav, dashboard search and manage
    dashboards page
  * Fix metrics panel test by adding config mock
  * Respect explore settings in config ini
  * Add .html to webpack.hot resolve extensions
  * Version the tarball uploaded to s3 and tell the next step
    about it.
  * dashboard: import into current folder from manage folder
    page
  * dashboard: add Import button to manage page
  * dashboard: import to folder
  * Query helpers for IFQL datasource
  * alerting: fixes broken table rename
  * docs: docker secrets available in v5.2.0
  * Remove round-robin urls in ifql DS
  * IFQL range variable expansion
  * alerting: renames journal table to
    alert_notification_journal
  * alerting: move queries from evalcontext to notifier base
  * alerting: invert sendOnce to sendReminder
  * changelog: add notes about closing #11657
  * alerting: remove zero units from duration
  * alerting: only check frequency when not send once
  * always show server admin link in sidenav if grafana admin
  * update google auth config docs
  * changelog: add notes about closing #11525
  * fix: fixed problem with expanding access mode help in ds
    settings
  * dep: use master branch for plugin model
  * alerting: fixes invalid error handling
  * fixed so default is all and general only show dashboards
  * changelog: add notes about closing #11882
  * added s to folderId in params
  * renamed variable in tests
  * added comment, variableChange -&gt; variableValueChange
  * added a test
  * added if to check if new variable has been added
  * Gravatar fallback does not respect 'AppSubUrl'-setting
    (#12149)
  * change admin password after first login
  * changelog: adds note about closing #11958
  * revert: reverted singlestat panel position change PR
    #12004
  * Revert 'provisioning: turn relative symlinked path into
    absolut paths'
  * provisioning: turn relative symlinked path into absolut
    paths
  * changelog: adds note about closing #11670
  * elasticsearch: sort bucket keys to fix issue wth response
    parser tests
  * docs: what's new in v5.2
  * made folder text smaller
  * Implement code review changes
  * Bug fix for repeated alerting even on OK state and add
    notification_journal cleanup when alert resolves
  * Fix tests
  * Fix multiple bugs
  * Revert changes post code review and move them to
    notification page
  * Feature for repeated alerting in grafana
  * InfluxDB IFQL datasource
  * changelog: add notes about closing #11167
  * docs: docker secrets support. (#12141)
  * alerting: show alerts for user with Viewer role
  * datasource: added option no-direct-access to
    ds-http-settings diretive, closes #12138
  * provisioning: adds fallback if evalsymlink/abs fails
  * tests: uses different paths depending on os
  * renames intervalSeconds to updateIntervalSeconds
  * changelog: add notes about closing #5893
  * removed italic
  * changelog: add notes about closing #11500, #8168, #6541
  * Alert panel filters (#11712)
  * docs: update alerting docs with alerting support for
    elasticsearch
  * added span with folder title that is shown for recently
    and starred, created a new class for folder title
  * provisioning: makes the interval for polling for changes
    configurable
  * provisioning: only update dashboard if hash of json
    changed
  * remove dead code
  * elasticsearch: minor refactor
  * changelog: update
  * changelog: add notes about closing #10748, #8805
  * save modal ux improvements  (#11822)
  * changelog: add notes about closing #11515
  * provisioning: only provision if json file is newer then db
  * Guard /explore by editor role on the backend
  * make path absolute before following symlink
  * provisioning: follow symlinked folders
  * test: fixes broken test on windows
  * changelog: add notes about closing #11771
  * changelog: add notes about closing #11971
  * Fix singlestat threshold tooltip (#12109)
  * build: only runs db related tests on db.
  * build: integration testing postegres on ci.
  * build: mysql integration testing on ci.
  * Fix karma tests that rely on MetricsPanelCtrl
  * changelog: Second epochs are now correctly converted to
    ms.
  * Fix panel menu test
  * Restrict Explore UI to Editor and Admin roles
  * Fix CSS to hide grid controls in fullscreen/low-activity
    views
  * changelog: add notes about closing #11645
  * Support InfluxDB count distinct aggregation (#11658)
  * provisioning: enable relative path's
  * changelog: note about closing #11858
  * devenv: improve readme
  * provisioning: place testfiles within testdata folder
  * changelog: add notes about closing #11494
  * Add new regions to handleGetRegions function (#12082)
  * PR: minor change to PR #12004 before merge
  * fix: refactoring PR #11996 and fixing issue #11551
    16706hashkey in json editors
  * devenv: script for setting up default datasources
  * tech: updated react-grid-layout to latest official
    release, closes #12100
  * Fix cache busting for systemjs imports for plugins
  * devenv: scripts for generating many unique dashboards
  * docker: new block for elasticsearch6
  * changelog: add notes about closing #12087
  * sql: seconds epochs are now correctly converted to ms.
  * add validation of uid when importing dashboards
  * fix: add track by name in annotation list to avoid
    $$hashKey in json
  * changelog: adds note about closing #9703
  * go fmt fixes
  * configure proxy environments for Transport property
  * Show create dashboard link if at least editor in one
    folder
  * graphite: avoid dtracing headers in direct mode
  * Fix sourcemaps for webpack hot config
  * return better error message when err is ErrSmtpNotEnabled
  * elasticsearch: handle if alert query contains template
    variable
  * changelog: adds note about closing #9847
  * Sparklines should scale to the data range (#12010)
  * Split webpack dev config into dev and hot
  * Upgrade webpack loaders (#12081)
  * pin versions of xorm to resolve sql tests
  * build: fixes broken path for bra run
  * use sql builder for the get system stats sql query
  * fix directly specified variable rendering
  * remove unused function renderAdhocFilters
  * send param in callback for get-param-options
  * Fix #9847 Add a generic signout_redirect_url to enable
    oauth logout
  * make separator configurable
  * fix error message
  * Changed Prometheus interval-alignment to cover whole panel
    range
  * alerting: refactor tests
  * add usage stats for datasource access mode
  * Review feedback (heading, typos)
  * add additional usage stats metrics
  * add tests for sending usage stats
  * Integrated dark theme for explore UI
  * elasticsearch: adds some more/better debug logging to
    client
  * changelog: fix broken link to contributor
  * changelog: adds note about closing #11788
  * The old code for centering removed
  * Backend image rendering as plugin (#11966)
  * Fix typo in README.md
  * build: updates publisher to support arm archs for deb and
    rpm.
  * Explore split view
  * Fixed custom dates for react timepicker
  * Explore: Design integration
  * Explore: time selector
  * Fix dashboard snapshot deletion (#12025)
  * fix names of foreign arch packages
  * elasticsearch: handle NaN values
  * elasticsearch: metric and pipeline agg setting json
    encoding fix
  * elasticsearch: query interval override fix
  * elasticsearch: default interval fix
  * Document table row merge for multiple queries
  * elasticsearch: pipeline aggregation fix for json encoding
  * build: always build for all platforms.
  * fix: remove deadcode to make gometalinter happy
  * elasticsearch: refactor query handling and use new es
    simple client
  * elasticsearch: new simple client for communicating with
    elasticsearch
  * elasticsearch: refactor and cleanup
  * build: removes deploy from nightly while testing it.
  * update provisioning.md
  * Fix ResponseParser for InfluxDB to return only string
    values
  * Conditionally select a field to return in ResponseParser
    for InfluxDB
  * build: clean up the workflow filters.
  * Revert 'Conditionally select a field to return in
    ResponseParser for InfluxDB'
  * Revert 'Fix ResponseParser for InfluxDB to return only
    string values'
  * Revert 'move queryTimeout option to common setting'
  * move queryTimeout option to common setting
  * add query timeout option for Prometheus
  * build: crosscompilation for nightlies and releases.
  * set style for registered query components
  * make param wrapper configurable
  * fix metric column when using group by
  * separate label in template from type
  * use sql part component
  * use sql part component
  * add sql_part component
  * Singlestat value: vertical alignment fix
  * Added Swiss franc currency
  * quote column name in buildValueQuery
  * return values quotes for suggestions in where expression
  * test: moves test files to testdata folder
  * build: downloads and bundles phantomjs for darwin and
    windows.
  * build: publisher updated to support more architectures and
    OSs.
  * build: saves artifacts with the build
  * build: crossplatform build with packages.
  * build: script for tagging and pushing a release
  * codespell: fixes
  * fix: fixed some minor startup logging issues
  * Sqlstore refactor (#11908)
  * Adds constant description for units
  * test: increase expire time to avoid tz issues in tests
  * explore: fixes #11953
  * migrated files to ts, removed unused functions from
    lodash_extended
  * docs: installation pages for 5.1.3
  * changelog: add note for #11830
  * legend: fixes Firefox/baron scroll bug
  * wrote classes
  * migrated jquery.flot.events to ts
  * use canMakeEditable
  * allow to add annotation for non editable dashboard
  * scroll: temporary fix for double scrollbar issue
  * backend plugins: log an error if parsing meta field failed
  * backend plugins: expose meta field
  * fixes following first code review
  * add useful note to alerting api docs
  * improve alerting api docs sample responses
  * Prometheus step alignment: shift interval only on jitter
  * Use babel and hot loader only in yarn start
  * docs: removes notes about beeing introduced in 5.0
  * lock caniuse-db version to resolve phantomjs rendering
    issue
  * Update dashboard_permissions.md
  * move database-specific code into dialects (#11884)
  * refactor: tracing service refactoring (#11907)
  * fix typo in getLdapAttrN (#11898)
  * docs: update installation instructions targeting v5.1.2
    stable
  * changelog: add notes about closing #11862, #11656
  * Fix dependencies on Node v10
  * Update dashboard.md
  * changelog: add notes about closing #10338
  * Phantom render.js is incorrectly retrieving number of
    active panels (#11100)
  * singlestat: render time of last point based on dashboard
    timezone (#11425)
  * Fix for #10078: symbol '&amp;' is not escaped (#10137)
  * Add alpha color channel support for graph bars (#10956)
  * interpolate 'field' again in Elasticsearch terms queries
    (#10026)
  * Templating : return __empty__ value when all value return
    nothing to prevent elasticsearch syntaxe error (#9701)
  * http_server: All files in public/build have now a huge
    max-age (#11536)
  * fix: ldap unit test
  * only error log when err is not nil
  * rename alerting engine to service
  * case-insensitive LDAP group comparison (#9926)
  * changelog: add notes about closing #11813
  * docs: updated changelog
  * fix XSS vulnerabilities in dashboard links (#11813)
  * PR: ux changes to #11528
  * renames alerting engine to match other services
  * allow analytics.js to be cached, enable anonymizeIP
    setting (#11656)
  * Revert 'Add baron scrollbar to a node managed by gafana
    (#11850)'
  * decrease length of auth_id column in user_auth table
  * fixed svg background (#11848)
  * Add baron scrollbar to a node managed by gafana (#11850)
  * Fix CSS asset loading for yarn start (HMR) (#11855)
  * fix: fixed gometalinter issues with Discord PR
  * docs: update installation instructions targeting v5.1.1
    stable
  * fix root_url in docs &amp; comments (#11819)
  * changelog: 5.1.1 update
  * fix: loading of css url (images/fonts)
  * Support for local Docker builds
  * Update ROADMAP.md
  * support additional fields in authproxy (#11661)
  * better handling for special chars in db config (#11662)
  * Fix/improved csv output (#11740)
  * Update ROADMAP.md
  * Update ROADMAP.md
  * Update ROADMAP.md
  * Remove preceding `/` from public JS path (#11804)
  * Add panel scrolling docs (#11826)
  * escape pipe symbol same way as in templating docs
  * changelog: add notes about closing #11616
  * added left:unset to counter left:0 in recent react-select
    release
  * fixed text color in light theme
  * changelog: add notes about closing #11800
  * test if default variable interpolation is effective when
    no specific format is specified
  * changelog: notes about closing #11690
  * changelog: add notes for ##11754, #11758, #11710
  * scroll: remove firefox scrollbars
  * Add missing items to Gopkg.lock
  * pipe escape try #3
  * use ascii code for pipe symbol to not mess up markdown
    table
  * try to fix table
  * dont shadow format passed in as function parameter
  * fix: removed manully added http server from inject graph
    as it is now a self registered service
  * fix: removed unused channel
  * fix: comment spell fix
  * fix: fixed race condition between http.Server
    ListenAndServe &amp; Shutdown, now service crash during
    startup correctly closes http server every time
  * refactoring: lots of refactoring around server shutdown
    flows, making sure process is terminated when background
    service has crashed
  * refactor: provisioning service refactoring
  * Metrics package now follows new service interface &amp;
    registration (#11787)
  * Revert 'Opportunities to unindent code (unindent)'
  * scroll: fix scrolling on mobile Chrome (#11710)
  * changelog: add notes about closing #11625
  * remove jest it.only to not skip important tests
  * fixed so all buttons are styled not just small ones, fixes
    #11616
  * --amend
  * fix: improved handling of http server shutdown
  * add test for prometheus table column title
  * Fix url encoding, expand template vars, fix TS hacks
  * Explore: Add entry to panel menu to jump to Explore
  * changelog: notes about closing #11498
  * Initial Baby Step to refactoring settings from global vars
    to instance (#11777)
  * table: fix for padding
  * graph histogram: fix invisible highest value bucket
  * dashboard: show save as button if can edit and has edit
    permission to folders
  * new property for current user indicating if edit
    permissions in folders
  * increase length of auth_id column in user_auth table
  * fix dropdown typeahead issue
  * Use opportunities to unindent code (unindent)
  * Outdent code after if block that ends with return (golint)
  * Remove redundancy in variable declarations (golint)
  * fix: minor fix to plugin service shut down flow
  * appveyor: uppercase the C drive in go path
  * docs: further documents changes to the docker image.
    (#11763)
  * disable ent build to avoid slowing down build speed
  * Explore: add support for multiple queries
  * Fixed settings default and explore path
  * Refactoring PluginManager to be a self registering service
    (#11755)
  * fix: removed log calls used while troubleshooting
  * refactor: refactoring notification service to use new
    service registry hooks
  * Enable Grafana extensions at build time.  (#11752)
  * revert renaming of unit key ppm
  * fix to match table column name and order
  * Import and typescript fixups
  * Settings to enable Explore UI
  * tech: removes unused code
  * Explore WIP
  * add deadcode linter to circleci
  * pkg: fix deadcode issues
  * build.go: fix deadcode issues
  * docs: update current version to 5.1
  * docs: update installation instructions targeting v5.1.0
    stable
  * changelog: update for v5.1.0
  * fix so that google analytics script are cached
  * prometheus: convert metric find query tests to jest
  * prometheus: fix variable query to fallback correctly to
    series query
  * removed height 100% from panel-container to fix ie11 panel
    edit mode
  * replaced border hack carot with fontawesome carot fixes
    #11677
  * dev: Mac compatible prometheus block. (#11718)
  * mssql: fix value columns conversion to float when using
    timeseries query
  * postgres: fix value columns conversion to float when using
    timeseries query
  * mysql: fix value columns conversion to float when using
    timeseries query
  * sql datasource: extract common logic for converting value
    column to float
  * added pointer to show more, reset values on new query
  * docs: add known issues section for mssql documentation
  * force GET for metadataRequests, w/ test
  * Renamed helperRequest and removed positional args
  * Move function calls w/ side-effects to componentDidMount
  * changed test name and dashboardMock code
  * fixed test
  * add ineffassign to circleci gometalinter check
  * pkg/components: fix ineffassign issues
  * pkg/cmd: fix ineffassign issues
  * pkg/log: fix ineffassign issues
  * pkg/services: fix ineffassign issues
  * removed import config
  * fixed so user who can edit dashboard can edit row, fixes
    #11466
  * Fixes signing of packages.
  * db: fix failing user auth tests for postgres
  * changed rps to reqps
  * bump version
  * added button to show more preview values for variables,
    button runs a function that increases options limit, fixes
    #11508
  * Added requests/sec(throughput)
  * use inherited property from api when rendering permissions
  * return inherited property for permissions
  * pkg/tsdb: fix ineffassign isues
  * fix circleci gometalinter test
  * Sort results from GetDashboardTags
  * Add silent option to backend requests
  * docs: escape asterisk in Graphite docs
  * docs: disable quoting option for MSSQL
  * docs: fix example for graphite tag query
  * docs: spelling
  * docs: add missing backtick for mysql/postgres
  * docs: fixes for table in variable docs
  * build: fixes release deploy
  * changelog: adds releaste date for 5.1.0-beta1
  * graphite: convert ds test to jest
  * build: removes gometalinter
  * cli: adds os and arch headers
  * slightly better example
  * adjust timeFilter, timeFrom and timeTo macro examples
  * docs: what's new improvements
  * docs: what's new improvements
  * docs: what's new
  * docs: fix typos
  * docs: what's new
  * docs: whats new
  * docs: more info prometheus heapmap to whats new
  * docs: improve what's new in v5.1
  * docs: what's new in v5.1 draft
  * Add weback-dev-server with hot/hmr support
  * build: only lint the pkg folder
  * changelog: adds note about closing #11476
  * dev: only build server with bra run
  * add gometalinter to circleci
  * comment unused struct fields
  * remove unused variables detected by varcheck
  * fix typo
  * docs: describes variable formatting options
  * docs: graphite template variables for tag queries
  * docs: describes new variable formatting syntax
  * changelog: notes about closing #10427
  * move jest test file to specs
  * make add panel panel scrollbar adjust when panel/dashboard
    grid are resized
  * style: code simplifications
  * build: introduce -dev flag optimal for building in
    development mode
  * changed copied message and added forced render for width
    change
  * removed padding and moved carrot
  * changelog: adds note about closing #11613 and #11602
  * cleanup, make sure users are always synced with ldap
  * Specify expected encoding for access/secret key
  * make sure user's default org is kept up to date
  * fix: sign in link should have target self to trigger full
    page reload, fixes #11626
  * codespell: exclude by words instead of files
  * remove old comment
  * org role sync tests
  * refactor authproxy &amp; ldap integration, address comments
  * pass DN in ldap test
  * tests for user auth module
  * fix ldap test
  * restructure GetUserByAuthInfo
  * error handling
  * use Result in GetAuthInfoQuery
  * switch to passing ReqContext as a property
  * cleanup
  * switch to Result
  * update auth proxy
  * fixes
  * fix tests
  * shared library for managing external user accounts
  * fix: Label font weight should be semi bold, fixes #11629
  * docs: typos
  * graphite: adds tests for tags and tag_values functions
  * docs: update provisioning documentation
  * changelog: notes about closing #10883
  * changelog: adds note for #11553
  * dev: only build server with bra run
  * changelog: adds note for #11173
  * added forceupdate to grid item so addpanel items rezie
    instantly, renamed function to copyPanel, fixed panel
    items height issue
  * revert changes of add panel button to require save
    permission
  * changelog: fix typo
  * changelog: notes about closing #11572
  * Fix issues with metric reporting (#11518)
  * changelog: notes about closing #10747
  * fix: Row state is now ignored when looking for dashboard
    changes (#11608)
  * disable codecov comments
  * add some more sort order asserts for permissions store
    tests
  * Revert 'build: remove code cov'
  * Revert 'removes codecov from frontend tests'
  * docs: update postgres macro functions documentation
  * tsdb: update query and annotation editor help texts for
    postgres
  * changelog: notes about closing #11578
  * calculate datetime for timeFrom and timeTo macro in go
  * set default for sslmode to verify-full in postgres
    datasource editor (#11615)
  * add some more sort order asserts for permissions store
    tests
  * Use sort.Strings() (gosimple)
  * Remove unused return value assignment (gosimple)
  * Remove unnecessary fmt.Sprintf() calls (gosimple)
  * Merge variable declaration with assignment (gosimple)
  * Use fmt.Errorf() (gosimple)
  * Simplify make() (gosimple)
  * Use raw strings to avoid double escapes (gosimple)
  * Simplify if expression (gosimple)
  * Simplify comparison to bool constant (gosimple)
  * Simplify error returns (gosimple)
  * Remove redundant break statements (gosimple)
  * fix unconvert issues
  * variable: fix binding bug after ts conversion
  * add GetFromAsTimeUTC and GetToAsTimeUTC and use them in
    timeFilter macro
  * fix merge conflict
  * remove changes to module.ts from this branch
  * migrated dropdown-typeahead to ts (#11499)
  * changelog: adds note for #11556
  * changelog: adds note for #11133
  * dashboard: better size and alignment of settings icons
  * bra should use the proper build script
  * moved version in help menu to top
  * docs: elasticsearch and influxdb docs for group by time
    interval option (#11609)
  * changelog: improved docker image
  * docs: new docker image in Grafana 5.1.0.
  * added fix for test
  * addeds test for sort order
  * Show Grafana version and build in Help menu
  * changlelog: notes about closing issues/pr's
  * sqlds: fix text in comments for tests
  * add codespell to circleci
  * removes codecov from front-end tests
  * wip: writing tests for permission sorting
  * changelog: adds note about closing #11228
  * remove postgresversion and convert unix timestamp in go
  * Support deleting empty playlist
  * Grafana-CLI: mention the plugins directory is not writable
    on failure
  * make timefilter macro aware of pg version
  * add postgresVersion to postgres settings
  * changelog: adds note for #11530
  * Documentation spelling fix
  * docs: fix codespell issues
  * public: fix codespell issues
  * conf: fix codespell issues
  * blocks: fix codespell issues
  * CHANGELOG.md: fix codespell issues
  * scripts: fix codespell issues
  * pkg: fix codespell issues
  * provisioned dashboard validation should be made when
    importing a dashboard
  * provisioned dashboard validation should not be made from
    provisioning service
  * remove comment/unused variable
  * docs: improves provisoning example for postgres
  * docs: add mssql provisioning example
  * docs: improves provisoning example for each datasource
  * ordered user orgs alphabeticaly fixes #11556
  * permissions sorting fixed + icon same size as avatrs
  * docs: update mssql with azure sql database support
  * changelog: adds note for #11569
  * docs: update default annotation limit when querying api
  * Mention the ?inactive parameter in the docs
  * Add another URL param ?inactive? which works like ?kiosk?
    but with title
  * tsdb: remove unnecessary type casts in sql data sources
    macro engines
  * tsdb: sql data sources should handle time ranges before
    epoch start correctly
  * change annotation limit from 10 to 100
  * remove mistakenly added styles
  * fix right side legend rendering in phantomjs
  * scrollbar: fix so no overflow for legend under graph
  * build: remove code cov
  * scrollbar: fixes continuation scrolling for iOS
  * added styling to fontawesome icons so they have same size
    as the other icons
  * Improve wording
  * Add minimal IAM policy example for CloudWatch data source
  * PR comments
  * docs: fix typo of default port for mssql
  * minor scrollbar fixes
  * scrollbar: remove unused div
  * dashboard: show baron scrollbar in dashboard panel when
    mouse is over
  * fix so that page scrollbars can be scrolled by keyboard on
    page load
  * fix so that dash list panel are rendered correctly
  * panel: add baron scroller to correct element
  * Windows build updated to go1.10.
  * scrollbar: use native scroll for page
  * converted functions to arrow functions
  * folders: fix permissions in folder picker component
  * permission: fix user with org viewer save/move permissions
  * alerting: handle invalid json format
  * docker: change mysql container so that it uses utc
  * mysql: use a datetime column with microsecond precision in
    test
  * tsdb: improved floating point support when converting sql
    time column to epoch (ms)
  * added @ngInject
  * provisioning: dont override permissions
  * provisioning: simplify db query
  * mssql: fix precision for time columns in time series query
    mode
  * postgres: support running multiple postgres integration
    tests
  * postgres: fix precision for time columns in time series
    query mode
  * mysql: fix precision for time columns in time series query
    mode
  * mysql: mysql tests should use a db server with UTC
  * provisioning: fixes broken tests
  * tsdb: add support for more data types when converting sql
    time column to epoch (ms)
  * provisioning: check provisiong before saveCmd
  * provisioning: fixes typo
  * provisioning: adds error handling
  * added @ngInject
  * playlist: add missing nginject attribute
  * Update annotations.md to contain correct annotations api
    path
  * removed console.log
  * docs: update after #11531
  * docs: improves provisoning example text
  * fix test
  * convert graphite epoch to ms
  * skip mssql fix
  * add mssql and mysql
  * don't convert to uint64
  * scrollbar: fix phantomjs rendering error
  * prevent angular from evaluating {{hostname}} in tooltip
    (#11514)
  * using millis for annotations too
  * data source: rename direct/proxy access mode in data
    source settings
  * Fix ResponseParser for InfluxDB to return only string
    values
  * Conditionally select a field to return in ResponseParser
    for InfluxDB
  * docs: fixes typo
  * docs: updated debian distro in install docs to stretch,
    closes #11527
  * Revert files
  * Fix after merge
  * Make dashboard JSON editable
  * guardian: when updating permissions should verify existing
    permissions
  * api: allow authenticated users to search current org users
    and teams
  * css: quick fix after IE11 changes
  * scrollbar: fix add panel height bug
  * scrollbar: styles cleanup
  * migrating to ts
  * fixed sidemenu icon issue created by earlier pr
  * added icons for viewer and editor, fixed add permission
    team avatar
  * singlestat: Fix optimization in
    setTableColumnToSensibleDefault
  * influxdb: Check before assuming first column to be 'time'
  * provisioning: fix tests for save provisioned dashboard
    modal
  * provisioning: ux fixes when saving provisioned dashboards
  * graphite: use a query when testing data source
  * migrated metric_segment to ts
  * scrollbar: fix search scroller in mobile view
  * scrollbar: fix graph legend height
  * changelog: adds note for #11165
  * migrated dash_class to ts
  * migrated segment_srv to ts
  * removed indent for manage dashboards
  * scrollbar: fix potential memory leaks in event handlers
  * skip migration if it is a big number
  * Use curly brackets around hyperlink help text #11478
    (#11479)
  * scrollbar: fix dashboard width updating for different
    modes
  * scrollbar: remove perfect-scrollbar and add baron to
    package list
  * scrollbar: fix dashboard width bug
  * scrollbar: fix 'legendScrollbar.destroy is not a function'
    error
  * Alerting: Fixing mobile notifications in Microsoft Teams
  * created closeDropdown function, renamed appevent, added
    second appevent for open timepicker
  * permissions: return user and team avatar in folder
    permissions api
  * permission: generate team avatar url with default
  * migrated playlist-routes to ts
  * migrated last all.js to ts
  * scrollbar: fix Firefox scroll position restore
  * Notes for closing #7119
  * changelog: adds note for #11128
  * variables: adds test for variable sorting
  * Add case-insensitive sort for variables.
  * graphite: fixes #11434
  * settings: fixes test
  * changed from margin to padding
  * fixes for avatar on adding permission and size for gicon
  * scrollbar: fix side menu on mobile devices
  * changed variable for tabbed close btn hover, and changed
    text-strong variable for lighttheme, removed commented out
    variable
  * mssql: typos in help sections
  * docs: spelling
  * added if to onAppevent, renamed appevent, add appevent to
    applyCustom and setRelativeFilter
  * Webpack Grafana plugin template project to links (#11457)
  * scrollbar: fix Firefox issue (white stripe on the right of
    scrollbar)
  * scrollbar: fix legend rendering issues
  * Initially move to baron scrollbar
  * rm panel.type  constrain from threshold_mapper.ts (#11448)
  * No need for node_modules/bin in npm run-script (#11449)
  * changelog: adds note about closing #11555
  * add article
  * fix some typos
  * docker: add users and groups to ldap block
  * timepicker now closes without exiting edit/view mode,
    close order: modal, timepicker, view
  * migrated graph_tooltip to ts
  * started migration to ts
  * Fix #10555 #6888 Better escape for Prometheus variables
  * bounnd the esc key to exit timepicker
  * print to stderr since logger might not exist
  * settings: return error instead of ignoring it
  * docs: adds provisioning examples for all datasources
  * Fixed typo in upgrading.md
  * docs: rpm install page - update to centos 7
  * docs: install pages for v5.0.4
  * removed padding for icons and added margin
  * changelog: another update for v5.0.4
  * changelog: update for v5.0.4
  * changelog: adds note about closing issues
  * fixed graphpanel editmode and custom width for right side
    legend for IE11
  * alerting: bad default state for notifiers
  * Clarified formatting multiple values doc
  * Add Google Hangouts Chat notifier.
  * dashboard: allow alerts to be saved for new/provisioned
    dashboards
  * add response_parser test
  * add fallback for gravatar in org/admin view
  * tech: migrates to none deprecated mail lib
  * docs: not about email notifications and local img store
  * alert: fixes broken link back to grafana
  * docs: update table plugin documentation with value/range
    to text mapping
  * cleanup and add more test
  * table panel: additional fixes for value to text mapping
  * add value to text mapping
  * provisioning: better description for provisioned save
    modal
  * dashboards: reject updates of provisioned dashboards
  * notes about closing #9210
  * fixed alignment in search + fixed issue ie popup
  * changelog: adds note about closing #11102
  * sidemenu fix for internet explorer 11, changed icon
    width/height to pixels and added height to logo
  * docs: prometheus ds, remove 'new in v4.3' note
  * remove categories from queryPart
  * fix a terms bug and add test
  * remove unused import
  * handle aggregate functions more generic
  * Add new currency - Czech koruna
  * docs: update heatmap and prometheus docs, #10009
  * provisioning: improve UX when saving provisioned
    dashboards
  * styled login page for ie11
  * - pipeline aggs support - add some test
  * support non-nested menu entries
  * provisioning: removes id from dashboard.json
  * Handle Interval Date Format similar to the JS variant
    https://github.com/grafana/grafana/pull/10343/commits/7e14e272fa37df5b4d412c16845d1e525711f726
  * Use net.SplitHostPort to support IPv6
  * add missing word to graphite docs
  * set right series name
  * Missed the 'p d' hint in the popup-menu
  * Add hints for the 'pd' Duplicate Panel command from PR
    #11264
  * remove README changes
  * finished CODING PHASE 1
  * wip
  * notes about closing #11306
  * cleanup
  * changelog: unix socket permissions
  * Adjust permissions of unix socket
  * docs: fix typos
  * docs: update postgres, mysql and mssql documentation
  * docs: update graph panel documentation
  * docs: tweaks
  * changelog: adds note about closing #5855
  * remove dashboardId check... i can't figure out how the
    tests work
  * get circle to run tests again
  * add dashboardId to test
  * remove api tests
  * fix operator
  * remove constraint from sqlstore
  * move dashboard error to API (not sql)
  * legend: small refactoring
  * changelog: adds note about closing #11278
  * docs: spelling
  * docs: add intro paragraph to provisioning page
  * Cleanup CircleCI V2 Conversion
  * Make golint happier
  * dooh
  * update the updated column!
  * using circle as my tester
  * using circle as my tester
  * adding tests, but they arent running locally
  * changelog: notes for #1271 and #2740
  * graph: minor fixes to y-axes alignment feature
  * added save icon to save buttons
  * removed trash can icon from save buttons
  * mysql: skip tests by default
  * Return actual user ID in UserProfileDTO
  * convert epoch to milliseconds
  * adding updated column
  * mssql: update query editor help
  * mysql: fix precision for the time column in
    table/annotation query mode
  * postgres: fix precision for the time column in
    table/annotation query mode
  * mssql: fix precision for the time column in
    table/annotation query mode
  * mssql: remove UTC conversion in macro functions
  * mssql: fix timeGroup macro so that it properly creates
    correct groups
  * small screen legend right also work like legend under in
    render + set scrollbar to undefined in destroyScrollbar so
    it doesnt become disabled when toggeling between right and
    under
  * dashboard version cleanup: more tests and refactor
  * Make golint happier
  * fixed so legend right works like legend under on small
    screens
  * adding created column
  * Alerting: move getNewState to EvalContext
  * minor refactor of dashboard version cleanup
  * refactor: dashboard version cleanup
  * limit number of rows deleted by dashboard version cleanup
  * fix dashboard version cleanup on large datasets
  * docs: add variable regex examples (#11327)
  * graphite: adds more traces for alerting
  * sql datasource: extract common logic for converting time
    column to epoch time in ms
  * docs: details about provisioning elastic
  * update email default year and name
  * dataproxy: adds dashboardid and panelid as tags
  * Alerting: Add retry mechanism and its unitests
  * docs: spelling
  * snapshot: fix legend rendering bug
  * session: update defaults for ConnMaxLifetime
  * snapshots: removes errors for empty values in ViewStore
  * Allocated to a separate alignment block. Replaced the
    attribute of the second axis by the attribute of the axes.
  * Expose option to disable snippets
  * changed var to const, changed to string interpolation
  * mssql: adds test for time should be ms in table mode
  * Remove unused kibana images
  * changed var to const
  * changelog: adds note about closing #11114 &amp; #11086
  * mssql: convert tests to jest
  * mssql: fix precision for time column in table mode
  * converted file to ts
  * changelog: notes about #10093 and #11298
  * dashboard: fix phantomjs panel rendering in collapsed row
  * Fixed unit test.
  * Changed the way this feature was activated. And changed
    tolltip.
  * Added validation of input parameters.
  * converted file to ts
  * docs: update using mssql in grafana
  * fix: only run gofmt on pkg directory omitting vendor
    directory
  * fix: dep ensure. now without gofmt on ventor directory
  * mssql: add integration test to verify stored procedure
    usage
  * mssql: encrypt password in database
  * mssql: remove dynamic construction of metric column and
    other columns
  * docker: pin microsoft/mssql-server-linux to 2017-CU4 tag
  * docs: improve guide for high availability
  * fix: only run gofmt on pkg directory omitting vendor
    directory
  * test
  * mssql: cleanup and minor refactor
  * mssql: allow host without port and fallback to default
    port 1433
  * docker: update test dashboard for mssql tests
  * mssql: cleanup and minor changes
  * Missed thanks in changelog
  * Adds pagerduty api update to changelog.
  * mssql: update readme
  * mssql: update test dashboard
  * docs: Using Microsoft SQL Server in Grafana
  * mssql: remove logos for now
  * docs: mssql documentation will go into another branch
    targeting next minor version
  * Updated roadmap for 5.1
  * Minor format changes
  * Changed Swedish and Icelandic currency
  * fix failed tests for dashboard view state
  * dashboard: fix rendering link to panel in collapsed row
  * docs: update install docs for 5.0.3
  * changelog: 5.0.3
  * mssql: add alternative logo without text
  * mssql: strip inkscape from logo
  * mssql: minor improvements of query editor help
  * mssql: skip rendering of mssql logos until we have a valid
    logo
  * docker: add test dashboard for mssql tests based on test
    data generated by integration test
  * mssql: additional integration tests
  * mssql: support money, smallmoney and decimal data types
  * mssql: update plugin.json, added description and name
    MSSQL -&gt; Microsft SQL Server
  * added indent to dashboards inside folder in search
    dropdown, and added indent to dashboard icon in search
    item
  * session: fork Macaron mysql session middleware
  * database: expose SetConnMaxLifetime as config setting
  * database: fixes after xorm update
  * database: update xorm to v0.6.4 and xorm core to v0.5.7
  * prometheus editor: variable autocomplete support (PR
    #9988)
  * made a keyboard shortcut to duplicate panel
  * docs: update mssql documentation
  * mssql: disable mssql integration tests per default
  * mssql: timeGroup fill support added.
  * mssql: add timeGroup integration test
  * alertmanager: /Creating/Sending/
  * mssql: adds fill to timeGroup macro.
  * allow any database for influx proxy
  * remove
  * alertmanager: handle resolved alerts, nodata, and
    execution errors
  * add regex search of username and password in urls, which
    are replaced by strings.Replace
  * notitfiers: avoid ShouldNotify duplication
  * fix merge error
  * alertmanager: if there are no alerts to send, do nothing
  * docker: change port for prom random data scrape target
  * mssql datasource: wip
  * docker: mssql and mssql tests blocks with common build
    context
  * fix lint problems
  * fix lint problems
  * fix lint problems
  * read aggregate functions from database
  * add buildAggregateQuery
  * Update README.md
  * docker: fake-data-gen:latest updates
  * Resolved conflict
  * docs: more details about slack notifier
  * properly handle IN queries
  * docs: updates latest release for docs
  * changelog: improve description of closed issues
  * renderer: avoid redirect render requests
  * changelog: adds notes about 5.0.2
  * dashboard: fix import dashboard with alert rule
  * middleware: recover and retry on session start
  * alerting: supports extracting alerts from collapsed panels
  * join multivalue variables with ,
  * revert special handling for IN
  * put values for IN in parens
  * dont quote where constraints
  * docker: add test dashboard for mssql for visualizing data
    generated by fake-data-gen
  * add regex operators
  * mssql datasource: support for timeGroup macro function
  * Added Kilopascals(kPa) under pressure
  * Added W/m2(energy) and l/h(flow)
  * folders: should be possible to browse folder using only
    uid
  * remove unused setting
  * dashboards: should be possible to browse dashboard using
    only uid
  * mssql datasource: additional data type tests
  * docker: add mssql block
  * Added icon for iOS web app
  * changelog: add note about closing #8151
  * alerting: adds back the link to grafana.
  * Fix CI
  * Modify Grafana Pagerduty notifier to use Pagerduty API V2
  * graph: minor refactor of histogram mode PR #8613
  * changelog: adds note about closing #11220
  * style: dont expose func outside package
  * teams: removes quota on route
  * changelog: adds note about closing #11143
  * changelog: adds note about closing #11107
  * Second to HH:mm:ss formatter (#11105)
  * changelog: adds note about closing #10009
  * docs: fix an outdated link to Prometheus's doc
  * Added concentration units and 'Normal cubic metre'
  * Corrected work for graphs created before this feature.
  * Replaced array values to variables yLeft and yRight for
    easy reading code.
  * Rename test file according module name.
  * prometheus: fix bug introduced by #9859 (httpMethod is
    undefined)
  * prometheus: add tests for heatmap mode
  * prometheus: datasource refactor
  * Fix urls in plugin update_checker logs
  * changelog: adds note about closing #10029
  * docs: add team api link from http api reference page
  * added test for sorting and filtering
  * changelog: adds note about closing #9859
  * Refactoring
  * set default value of httpMethod
  * support POST for query and query_range
  * cleanup where segment handling
  * remove limit
  * handle variables in where constraints
  * Adding Timeticks unit
  * properly quote where constraint parts
  * quote schema and table
  * docs: minor fix for dashboard http api documentation
  * build: cleanup
  * build: removes custom work dir in deploy.
  * build: upgrades build pipeline from CircleCI 1.0 -&gt; 2.0
    (#11162)
  * github: test new issue tempalte
  * dev: update dev prometheus2 to 2.2.0
  * changelog: adds note about closing #10925
  * docs: update latest to 5.0.1
  * push 5.0.1 to package cloud
  * changelog: adds release date for 5.0.1
  * bump master build to 5.1.0-pre1
  * move quota to dedicated service
  * Fix indent
  * docker: add prometheus/example-golang-random to
    docker-compose blocks
  * Fix the code to match the documentation.
  * rename Context to ReqContext
  * fix, set default highResolution setting
  * changelog: note about closing #11145 and #11127
  * docs: adds note about closing #10632
  * removes commented code
  * removes unused variables
  * upgrade to go 1.10
  * alerting: fixes validation error when saving alerts in
    dash
  * add csv templating format
  * docs: note about closing #11046
  * docs: adds note about #10942
  * heatmap: add explanation of Time series buckets mode
  * Add color to prefix and postfix in singlestat
  * replaced if with classNames
  * heatmap: able to set upper/lower bucket bound manually
  * heatmap: refactor
  * added media breakpoint to legend-right
  * Documentation: path '~/go' to '$GOPATH'
  * Update ROADMAP.md
  * add panel to list now copy, started on jest
  * docs: improves docs for alert rules
  * heatmap: fix Y axis and tooltip decimals and units issues
  * Append test to check not zero level.
  * Add bs-tooltip to Y-Align element.
  * move Context and session out of middleware
  * only use jwt token if it contains an email address
  * scrolling: faster wheelspeed
  * docs: improves provisioning description
  * changelog: adds note about closing #10975.
  * changelog: adds note about closing #7107
  * changelog: adds note about closing #11103
  * changed background for mobile menu background on light
    theme, increased font size in and added border-right in
    menu
  * heatmap: fix tooltip count and bucket bound format
  * alerting: Limits telegram captions to 200 chars.
  * changelog: note about closing #11097
  * hide row actions for viewers
  * fixes invalid link to profile pic when gravatar is
    disabled
  * changelog: adds note about closing #11016
  * fix: restores white resize handle for panels, fixes #11103
  * changelog: adds note about closing #11063
  * fix typo in heatmap rendering.ts (#11101)
  * docs: add v5.1 to versions
  * docs: fill for mysql/postgres
  * ignore iteration property when checking for unsaved
    changes
  * changelog: notes for #11055 and #9487
  * use net/url to generate postgres connection url
  * made drop-menu into link
  * heatmap: sort series before converting to heatmap.
  * use metricColumn in query builder
  * set rawSQL when rendering query builder query
  * fix group by column
  * clean up aggregation functions
  * fix variable interpolation
  * rename field to column
  * Fix Prometheus 2.0 stats (#11048)
  * docs: removed beta notice in whats new article
  * remove spaces around arguments of macros
  * remove spaces around arguments before calling macro
    expansion
  * docs: update current version to 5.0
  * docs: update install pages for v5.0.0
  * update version to 5.0.1-pre1
  * changelog update for 5.0.0 stable
  * Add metrics that triggered alert to description
  * build: updated version
  * heatmap: hide unused Y axis controls for tsbuckets mode
  * heatmap: format numeric tick labels in tsbuckets mode
  * heatmap: add rendering tests for tsbuckets mode
  * Fix Github OAuth not working with private Organizations
    (#11028)
  * login: hide sign up if configured so. Fixes #11041
  * permissions: fix validation of permissions before update
  * dashboard: add permission check for diff api route
  * permissions: remove client validation and handle server
    validation
  * dashboards: change dashboard/folder permission error
    messages
  * dashboards: handle new guardian error responses and update
    tests
  * folders: handle new guardian error responses and add tests
  * dashboards: don't allow override of permissions with a
    lower precedence
  * Alerting: Fix OK state doesn't show up in Microsoft Teams
    (#11032)
  * grammar fix, add dir, and remove redundant info
  * heatmap: use series names as top or bottom bounds, depends
    of datasource
  * heatmap: refactor
  * heatmap: add few tests for histogram converter
  * fix: changed react-grid-layout to use grafana fork to a
    commit before
    https://github.com/STRML/react-grid-layout/commit/15503084fb7b0af826427c8c0706901e5745a39f,
    this fixes all the panel movement bugs, fixes #10831
  * heatmap: fix Y bucket size calculation for 'tsbuckets'
    mode
  * gave scroll-canvas-dashboard 100% height in kiosk-mode,
    fixes #11010 (#11017)
  * docs: update to install pages for beta5
  * changelog: update for v5.0.0-beta5
  * added admin icon and permission member
    definitions(role,team,user)
  * build: update to version 5.0.0-beta5
  * [doc] Fix extra alerting options in
    installation-&gt;configuration
  * yarn: update lock file with tarball change
  * build: use tarball instead of git commit for tether drop
  * improve maintainability
  * docs: fix type in datasource http api
  * docs: adds accesskey and secret to securejsonfields
  * support [[variable:type]] syntax
  * offer template variables for tags
  * feature for issue #9911
  * Added radiation units
  * docs: update shortcut docs
  * dashboards: remove non-supported keyboard shortcuts for
    delete/collapse row
  * dashboards: fix keyboard shortcut for expand/collapse rows
  * dashboards: fix keyboard shortcut for remove panel
  * snapshots: fixes cleanup of old snapshots
  * docs: minor folder http api changes
  * Update ROADMAP.md
  * Update ROADMAP.md
  * heatmap: fix bucket labels shift
  * heatmap tooltip: fix bucket bounds for 'tsbuckets' mode
  * heatmap tooltip: fix count decimals
  * heatmap: fix tooltip histogram for 'tsbuckets' mode
  * heatmap: use buckets from histogram with 'tsbuckets' mode
  * dashboards: created/updated and createdby/updatedby should
    be set before save
  * Add unit tests.
  * Refactoring code
  * Fix save as dashboard from folder to General folder
    (#10988)
  * changed name of copy tab to paste
  * added no copies div
  * prometheus: tests for heatmap format
  * dashboards: cleanup
  * folders: use folder api for retrieving folder
  * dashboards: fix batch dashboard/folder delete response
  * fix: elasticsearch terms size now allows custom values
    again, fixes #10124
  * added highlighter, fixed setState and changed back flex to
    spacea around
  * folders: fix create folder in folder picker
  * added tabs and searchfilter to addpanel, fixes#10427
  * snapshots: change to snapshot list query
  * prometheus: initial heatmap support
  * docs: update http api index
  * docs: dashboard and folder permissions http api
  * docs: folder http api
  * permissions: use updated api endpoint for dashboard
    permissions
  * fix typos in api, acl to permissions
  * folders: rename folder_acl in api to folder_permission
  * dashboards: change api route for dashboard permissions
  * folders: fix typo
  * folders: extend folder service tests
  * dev: docker-compose setup for prom2.
  * folders: folder api tests
  * fix: scrollbar position now to max right pos, fixes #10982
  * Fixes for heatmap panel in Grafana 5 (#10973)
  * docs: updated cloudwatch docs add dimension filter as a
    option for dimension_values query.
  * folders: folder permissions api tests
  * dashboards: make fake dashboard guardian available to
    other packages
  * fix: added new known data source plugins, and minor
    migration fix for v1 dashboards
  * folders: folder permission api routes
  * folders: fix api error mapping
  * folders: basic integration tests for folders
  * folders: use new folder service in folder api routes
  * folders: new folder service for managing folders
  * dashboards: created date should be set when creating a
    folder/dashboard
  * fix: fixes to signup flow, fixes #9816
  * Refactoring code. Change Y-Zero to Y-Level.
  * fix: fixed github oauth login with allowed orgs filter,
    fixes #10964, reverts #10851
  * fix: plugin dashboard did not get plugin id after import
  * feat(ldap): Allow use of DN in user attribute filter
    (#3132)
  * added scroll to org list modal (#10960)
  * added an if to check for null to sort null as 0 (#10961)
  * fix: alert history list now shows on graphs with manually
    added annotation events, fixes #10968
  * provisioning: dont ignore sample yaml files
  * docs: updated for changelog and docs with beta4
  * Correct typo in DashboardInputMissingError
  * build: updated build version to v5.0-beta4
  * graph: added 0.5 point radius option
  * Shouldn't be able to overwrite a dashboard if you don't
    have permissions (#10900)
  * influxdb: escape backslashes in tag values (for alerting)
  * [elasticsearch] Allow nested fields for annotation source
    (#10936)
  * changed m3 and dm3 to fixedUnit, fixes #10920 (#10944)
  * migrate panels in collapsed rows (#10948)
  * Share zero between Y axis.
  * Add hook processRange to flot plugin.
  * login: migration fix.
  * login: uses epochs for login throtting.
  * fix: fixed redirect after save, fixes #10946
  * fix: esc key now closes panel edit/view mode as usual,
    fixes #10945
  * docs: updated to beta3
  * alerts: refactoring tests
  * alerting: pausing alerts modifies updated.
  * test: added integration test for #10941
  * refactoring: alert rule query refactoring (#10941)
  * updated version to v5-beta3
  * db: reduce name column size in dashboard_provisoning
  * teams: adds some validation to the API
  * docs: status code changes for Team API
  * docker: add test dashboards for mysql and postgres for
    visualizing data generated by fake-data-gen
  * cli: download latest dependency by default
  * Revert 'removes dependencies install for plugins'
  * migrate minSpan (#10924)
  * Close modal with esc (#10929)
  * repeat row: fix panels placement bug (#10932)
  * docs: team API. Closes #10832
  * Update sample.ini
  * Update ldap.toml
  * Update ldap.md
  * Minor typo fix
  * plugins: update meta data for all core plugins
  * alert notifiers: better error messages.
  * support cloudwatch high resolution query
  * chore: adds comment for exported function
  * updated download links
  * docs: Updated changelog
  * updated package.json version
  * fix: more phantomjs fixes
  * fix: refactoring #10922
  * Fix phantomjs legend rendering issue, #10526
  * mark redirect_to cookie as http only
  * dashboard: whitelist allowed chars for uid
  * updates readmes for mysql and postgres (#10913)
  * Set default threshold axis to 'left' for panels created
    before this feature.
  * provisioning: adds setting to disable dashboard deletes
  * tech: dont print error message on 500 page
  * removes dependencies install for plugins
  * tests: makes sure we all migrations are working
  * provisioning: uses unix epoch timestamps. (#10907)
  * improve error message for invalid/unknown datatypes
    (#10834)
  * add AWS/States Rekognition (#10890)
  * Dashboard acl query fixes (#10909)
  * wip: dashboard acl ux2, #10747
  * permissions: refactoring of acl api and query
  * bug: return correct err message
  * initial fixes for dashboard permission acl list query,
    fixes #10864
  * provisioing: always skip sample.yaml files
  * provisioning: handle nil configs
  * sql: removes locale from test to mirror prod.
  * adds tests that validate that updated is correct
  * provisioning: code formating
  * provisioning: adds logs about deprecated config format
  * provisioning: support camelcase for dashboards configs
  * provisioning: support camcelCase provisioning files
  * API Integration Tests via jest (#10899)
  * ux: refactoring #10884
  * Invalid url in docs
  * Duplicate typo fixed
  * add 13-24 for min width (#10891)
  * sass/base: import from current dir in _fonts.scss (#10894)
  * fix: removed logging
  * fix: sql search permissions filter fix
  * provisioning: Warns the user when uid or title is re-used.
    (#10892)
  * Minor typo fix
  * new dashboard is now hidden from viewer, fixes #10815
    (#10854)
  * fixed bg gradient, fixes #10869 (#10875)
  * login: fix broken reset password form (#10881)
  * moved div in code
  * added buttons and text to empty dashboard list
  * docs: spelling.
  * docs: update dashboard permissions http api docs
  * Cloudwatch dimension_values add dimension filter.
  * dashboard: always make sure dashboard exist in dashboard
    acl http api (#10856)
  * Fix #10823 (#10851)
  * provisioning: better variable naming
  * ux: minor tweak to grid resize handle color
  * teams: use orgId in all team and team member operations
    (#10862)
  * permissions: might have a solution for search
  * Fixes for graphite tags editor (#10861)
  * fix: clear items list before fetching permissions list
  * provisioning: dont return error unless you want to cancel
    all operations
  * provisioning: createWalkFn doesnt have to be attached to
    the filereader anymore
  * provisioning: update sample config to use path
  * provisioning: avoid caching and use updated field from db
  * update README.md regarding running tests
  * update README.md regarding running tests
  * docs: minor docs update
  * docs: updated docs landing page
  * provisioning: delete dashboards before insert/update
  * user picker should only include users from current org
    (#10845)
  * Correct code style.
  * db test: allow use of env variable for database engine to
    run tests for
  * dashboard and folder search with permissions
  * provisioning: fixed bug in saving dashboards.
  * dashboard: fix delete of folder from folder settings tab.
  * append test to thresholds on right axis
  * Update logic for create/update dashboard, validation and
    plugin dashboard links (#10809)
  * added width class to add member choose (#10835)
  * add where constraint handling
  * add query_builder
  * docs: adds uid to dashboard.json reference docs
  * Fix #7107
  * fix: initial fix for #10822
  * fix: folder redirect after creation
  * dashfolders: fixes #10820
  * fix: fixed bug with redirect after new dashboard saved,
    related to buggy angularjs location path/url and base
    href, fixes #10817
  * docs: describe uid for dashboard provisioning
  * fix: removed old shortcut that does not exist, fixes
    #10802
  * build: fixed recovery test
  * fix: css fix, found a better way to fix #10772
  * fix: minor build fix
  * fix: error handling now displays page correctly, fixes
    #10777
  * heatmap tooltip: minor refactor
  * fix: changed dashboard title length to match slug length,
    will fix mysql index size issue, fixes #10779
  * docs: added graphite section
  * docs: minor update
  * graph panel: fix csv export (series as col) (#10769)
  * org-switcher: should redirect to home page (#10782)
  * embedded panel: hide side menu during init (#10788)
  * docs: update http api for api index, dashboard, folder and
    dashboard search
  * scroll: css for #10722
  * dashlist: scroll fix when no header
  * docs: video fix
  * Update changelog with deprecation notes of http api
  * redirect 'permission denied' requests to '/' (#10773)
  * docs: fix
  * scroll: use wheelpropagation. Ref #10772
  * docs: update dashboard model, persistent urls and api
    changes in what's new in v5
  * docs: fix download link
  * docs: minor update
  * docs: adds http api dashboard permissions
  * docs: updated whats new
  * docs: update dashboard model, new url structure and api
    changes in what's new in v5
  * build: updated publish script
  * docs: update docs with download links
  * build: increased version to beta1
  * fix: fixed permission list caching issue, fixes #10750
  * Stale permissions (#10768)
  * adds unique index for org_id+folder_id+title on dashboards
    (#10766)
  * docs: fix links in HTTP API Reference page
  * dashboards: render correct link for folder when searching
    for dashboards (#10763)
  * fix panel menu caret placement (#10759)
  * permissions: fix link to folder from permissions list
  * dashboard: fix loading of snapshot and scripted dashboard
    (#10755)
  * changes to new urlformat for home dashboard (#10738)
  * fix: alert list links did not work, changed dashboardUri
    to Url, this is breaking api change in alert api (#10756)
  * docs: typos and wording.
  * ux: hide sidemenu in kiosk mode, and while playlist is
    playing, fixes #107402
  * dashboard: fix redirect of legacy dashboard url's
  * make metricColumn functional
  * add metric column selector
  * docs: add spaces to timeseries example
  * fix: restored tags to search
  * fix frontend validation for creating new folder and import
    dashboard (#10737)
  * #10724 Fix whitespace
  * poc: merge sync
  * #10724 Fix finding the x bucket
  * docs: dashboard provisioning
  * handle new error message
  * removes uid when using 'save as'
  * dashfolders: rename Root folder to General. Closes #10692
  * Light theme icon color (#10730)
  * folders: use new folder api in frontend
  * folders: changes and updated tests after merging
    permissions and new url structure
  * folders: rename api files
  * dashboards: revert logic of returning 404 in dashboard api
    if it's a folder for now
  * db: fix failing integration tests for mysql and postgresql
  * docs: add examples for dashboard permissions
  * Update search datasource by name API path
  * fix for dashboard/folder url's when having a sub path in
    root_url config
  * ux: added max width to dashboard settings views
  * add gofmt as precommit hook
  * dashfolders: adds test for permission store
  * dashfolders: adds permission modal to dashboard settings
  * register handler for get dashboards by slug
  * make it easier for dashboards to generate ur;
  * changes dashboard url in alertlist
  * alert: use new url format
  * Improve logging in the phantomjs renderer (#10697)
  * route params from angular to view store should be updated
    on routeChangeSuccess
  * repeat panel: process repeats when row is expanding
    (#10712)
  * folders: changes needed due to merge
  * docs: removed section with session table sql, that is not
    needed anymore
  * ux: fix for responsive breakpoints and solo mode showing
    sidemenu
  * support multiple histogram series
  * docs: moved whats new article to master
  * ux: fixed issue with zoom on graph caused scroll, fixes
    #10696
  * dashboard: refactor logic for retrieving url for
    folder/dashboard
  * update text, fix a few typos
  * dashboards: update dashboard/folder url if browser url is
    not the same as from backend
  * dashboards: when restoring a dashboard to an older
    version, set current uid
  * dashboards: fix updating folder so that correct url is
    returned
  * dashboards: remove slug property in dashboard search
    responses
  * folders: change the front end route for browsing folders
  * dashboards: add validation to delete dashboard by slug
  * dashboards: new route for deleting dashboards by uid
  * plugins: return table with empty rows array insteaf of nil
  * retry uid generation
  * fix: use replace when redirecting to new url
  * ux: Change input width of UserPicker and TeamPicker in
    AddPermissions component #10676
  * viewstore: fix test after merge
  * tests: Add TeamPicker test and update
    TeamPicker/UserPicker snapshots so they match the latest
    classNames update #10676
  * dashfolders: fix for folder picker
  * ux: Add an optional className to the UserPicker and
    TeamPicker #10676
  * dashfolders: fixes #10671. Allow Editors default access to
    Root.
  * docs: added redirect from old provision page, #10691
  * tests: Move tests from Permissions to AddPermissions
    #10676
  * tests: Update tests in PermissionsStore and rem out the
    Permissions-tests for now #10676
  * docs: added permissions page and updated folder docs
  * dashfolders: text change
  * dashfolders: special case for folders in root
  * add groupby to querybuilder remove unused aggregations
  * gofmt...
  * spelling
  * Verifies requirement of id in dashboards.
  * ux: POC - Update 'Add permissions' design and add a fancy
    animation #10676
  * ensure dashboard title is unique in folder
  * docs: Remove obsolete Ansible rule (#10689)
  * docs: Fix outdated provisioning link (#10690)
  * Renamed 'Period' to 'Min period' in CloudWatch query
    editor (#10665)
  * created cta-bg variable and changed bg color on light
    theme (#10693)
  * Repeat panels when row is expanding (#10679)
  * dashboards: make scripted dashboards work using the old
    legacy urls
  * dashboards: redirect from old url used to load dashboard
    to new url
  * docs: updated whats new
  * playlist: fixes #10254
  * dashboards: add new default frontend route for rendering a
    dashboard panel
  * alerting: small refactoring
  * dashfolders: POC - Use separate component for 'Add
    permission' #10676
  * removes uniqnes check on slug when saving dashboards
  * Drops unique index orgid_slug from dashboards.
  * plugins: return empty tables array insteaf of nil
  * url: fix for boolean querystring parameters
  * moved icon (#10681)
  * docs: updated whatsnew
  * docs: progress on whats new article
  * docs: updated version
  * docs: fixed order of sidemenu
  * test: fixes failing test in go1.10
  * dashboards: fix links to recently viewed and starred
    dashboards
  * dashboards: use new *url* prop from dashboard search for
    linking to dashboards
  * dashboards: when saving dashboard redirect if url changes
  * dashboards: add new default frontend route for loading a
    dashboard
  * dashboards: return url in response to save dashboard.
    #7883
  * dashboards: ensure that uid is returned from
    getSaveModelClone
  * alertlist: disable pause button when user does not have
    permission
  * dashboards: revert adding api for retrieving uid by slug
  * util: remove retry logic in shortid_generator
  * dashboards: add url property to dashboard meta and search
    api responses
  * dashboards: api for retrieving uid by slug. #7883
  * dashboards: add support for retrieving a dashboard by uid
  * dashboard: change unique index for uid to include org_id
  * dashboards: return uid in response to creating/updating a
    dashboard. #7883
  * dashboards: extract short uid generator to util package.
    #7883
  * dashboard: fix failing test. #7883
  * dashboard: generate and include uid in dashboard model.
    #7883
  * db: add migrations for creating a unique index for uid.
    #7883
  * db: add migrations for generating uid for existing
    dashboards. #7883
  * db: add new column uid to the dashboard table. #7883
  * enhance render function
  * add postgres_query.ts
  * moved icon (#10681)
  * dashfolders: remove inline styles
  * fixed width of images and removed gifs and fixed text a
    bit in search
  * docs: fixed order of sidemenu
  * test: fixes failing test in go1.10
  * new gifs for search
  * docs: adds more info about whats new in v5
  * docs: updated versions.json
  * alerting: add permission check in api for pausing alerts
  * query builder changes
  * dashfolders: adds comment for dashboard api tests
  * more query builder components
  * docs: added versions file
  * dashfolders: adds comment for dashboard acl test
  * api: extract api test code to common_test.go
  * repeat panel: minor refactor
  * WIP: folder api. #10630
  * changed img for shortcuts
  * replaced img in export_import and sharing
  * Fix horizontal panel repeat. Fix #10672.
  * dashfolders: Add min-width to align icons in permissions
    list and some margin between icon and text #10275
  * ui: Fix Firefox align issue in dropdowns #10527 (#10662)
  * fix: InfluxDB Query Editor and selecting template variable
    in where clause caused issue, fixes #10402, fixes #10663
  * dashfolders: link to folder for inherited permissions
  * test: Update Tooltip test to check for className support
  * changed img-link for timerange imgs and some text
  * fix: remove repeated rows when repeat was disabled.
    (#10653)
  * test: Update Popover test to check for className support
  * dashfolders: Get rid of unused import #10275
  * dashfolders: Use grafana's question mark instead of FA's
    and use the react tooltip instead of angular's #10275
  * dashfolders: Add className to Tooltip component
  * fix: don't show manually hidden sidemenu after view mode
    toggle (#10659)
  * dashfolders: css class as parameter for Picker
  * dashfolders: select with description for permissions
  * fix: show sidebar after mouse wheel scrolling (#10657)
  * fix: tweak of PR #10635
  * ux: minor tweak of #10634
  * plugins: only set error if errorstring is not empty
  * Revert 'Fix typeahead to avoid generating new backend
    request on each keypress. (#10596)'
  * call render in query
  * dashfolders: add help popover. Add folder title for
    inherited permissions
  * dashfolders: use react component for dashboard permissions
  * added hash rate units for monitoring mining processes
  * replaced input with gf-form-dropdown
  * reverted media queries
  * graphite: fix nested alerting queries (#10633)
  * fix for sm
  * added media break for md and sm
  * dashfolders: add disabled Admin permission to list
  * tech: upgrade to golang 1.9.3
  * Locks down prometheus1 to v1.8.2 in live-test.
  * fix typo in parameter. (#10613)
  * dashfolders: autosave permissions on change (remove update
    button)
  * changelog: move all 4.7 changes into 5.0
  * changed some img-links, updated text for annotated img,
    more work on whats new in v5.0
  * changelog: be more explicit about backwards compatibility
  * WIP: Protect against brute force (frequent) login attempts
    (#10031)
  * dashfolders: fix tests for ViewStore after merge
  * Fix typeahead to avoid generating new backend request on
    each keypress. (#10596)
  * fix vertical panel repeat (#10619)
  * graph: fix series sorting issue (#10617)
  * dashfolders: New snapshot since we changed from
    defaultValue to value per latest React documentation
    #10275
  * refactor: Replace _.find with Array.prototype.find()
  * dashfolders: Convert mobx observable to js objects and
    remove the observer() since we want to use the component
    outside the react/mobx world #10275
  * dashfolders: Clean up more variables and move newType,
    aclTypes and permissionOptions to the store #10275
  * dashfolders: Remove variables not used and pass in the
    real dashboardId #10275
  * dashfolders: Remove those 2-line-components from
    PageHeader to make it easier to read and make sure
    components listening to the mobx state are wrapped with
    observer() #10275
  * dashfolders: Add support for breadcrumbs in NavStore
    #10275
  * dashfolders: Rename UserPicker folder =&gt; Picker. Inject
    the permission-store in the FolderPermissions-container
    instead of the Permissions component, add the
    PermissionsStore to the RootStore and and the
    error-message to the Permissions-store #10275
  * dashfolders: Add Permissions information box #10275
  * dashfolders: Fix page max width #10275
  * dashfolders: Update jest tests with backendSrv #10275
  * dashfolders: Add a Team Picker component and use it on the
    dashboard permissions page #10275
  * dashfolders: Working user picker on the dashboard
    permissions page  #10275
  * dashfolders: Send down backendSrv to the react components
    #10275
  * dashfolders: Re-use the API of the angular user picker
    instead, which is reusable #10275
  * provisioning: delete dashboards from db when file is
    missing
  * dashfolders: Remove the PermissionsInner-strategy since we
    have a container for this route now #10275
  * dashfolders: Permissions are injected via MST so it needs
    to be defined as optional #10275
  * dashfolders: Add FolderPermissions container and make sure
    isFolder is passed to PermissionsStore #10275
  * dashfolders: Always get dashboardid and backendsrv from
    props #10275
  * dashfolders: Rem code to avoid tests to fail #10275
  * wip: More on the permissions. Left are team picker and
    user picker, tests and error messages #10275
  * fix: mobx-react-devtools is a dev dependancy #10275
  * dashfolder: wip: More wip on acl.html2permissions.tsx
    #10275
  * dashfolders: wip - Move Permissions into React #10275
  * variables: lint fix
  * variables: fix when datasource returns error
  * fixes broken phantomjs rendering
  * added varibale to table hover, lightend colors for table
    light theme, fixes #10609 (#10611)
  * added whats new v5, changed link in notifications, removed
    row from getting started
  * fixes minor typo
  * provsioning: dont stop grafana due to missing
  * Disable prefix and postfix font size when gauge mode is
    enabled (#10573)
  * docs: improve docs for image uploaders
  * cfg: remove local as default image uploader
  * docs: Add haproxy example for running behind reverse-proxy
  * provisioning: enables title changes for dashboards
  * Cloudwatch: add support for multi instances (#10570)
  * ux: minor change, added import dashboard link to dashboard
    search side view
  * tech: adds/removes in vendor folder according to dep
    0.4.0.
  * docker: sync local time and timezone to mysql_tests block
  * dashfolder: fix for sqlite test
  * dashfolder: fix for mysql test
  * mysql: pin the mysql dependency
  * tech: ignore /public and /node_modules
  * tech: ignore /data folder for dep
  * docs: first draft of dashboard folders docs
  * plugins: map error property on query result
  * stats: send amount of stars as stats
  * tech: avoid using deprecated functions
  * style: minor code style changes
  * dashboards: save provisioning meta data
  * provisioing: add lookup table provisioned dashboards
  * refactor: minor css class naming change of #10505
  * refactor: minor refactoring of PR #10560
  * cloudwatch: fix ebs_volume_ids by create a client-session
    before call ec2:DescribeInstances. (#10566)
  * docker: use mysql and postgres from latest fake-data-gen
  * Update OpsGenie Notifier to support different api domains.
  * 10583 panel resize icon fix (#10585)
  * dashboards: Fix issue with first click when expanding
    folder in search
  * cfg: adds info about local img uploader to docs
  * docs: adds info about local img uploader
  * changelog: adds note about closing #6922
  * changelog: note about closing #9664
  * changelog: adds note about closing #9770
  * start query builder ui
  * Disable instead of hide mode options when line/points is
    unchecked
  * dashfolders: show folders use can save to in picker
  * dashfolders: fix bug in save as modal
  * Add lumens unit
  * add docs for configuring OAuth with Auth0 and Azure AD
  * install dep instead of govendor on setup
  * remove unused code from vendor
  * migrate from govendor to dep
  * fix: cloudwatch corrected error handling so original error
    is not thrown away
  * go fmt
  * support for decoding JWT id tokens
  * ds: updated ds nav
  * feat: ds edit fix
  * feat: ds edit nav
  * Generic Oauth Support for ADFS (#9242)
  * Recommend a limit on database query
  * Adjusted the border color on the buttons in dashboard nav,
    fixed alert email text area width, fixed padding-top issue
    on dashboard settings aside
  * dashfolders: stop user locking themselves out of a folder
  * dashfolders: add breadcrumbs to NavStore
  * codestyle: extract code into methods
  * mysql: convert numbers to text for annotation tooltip
  * mysql: update to use ColumnTypes interface in new version
  * mysql: update mysql driver to latest master
  * gofmt my dear friend
  * ux: updated react-layout-grid
  * plugins: send secureJsonData unencrypted
  * Make file_reader follow symlinks
  * dashboards as cfg: property path replaces folder
  * moves datasource plugin model to
    grafana/grafana_plugin_model
  * Update package.json
  * fix: fixed build issue
  * fix: multi valued query variables did not work correctly,
    fixes #10539
  * move graphite /functions parsing into gfunc.ts
  * remove duplicate sass rules
  * fix tests &amp; some display issues
  * fix: graphite func editor fixes, this component is messy
    and ugly as hell
  * fix: minor fixes
  * fix: restored previous behavior of form_dropdown, this
    fixes all my observerd bugs with the dropdown behavior
  * fix: query editor needs to wait for function definitions
    to load
  * fix issue with metric find &amp; functions being loaded
    multiple times
  * interpolate variables in tags &amp; values during autocomplete
  * fix typo
  * update rst2html
  * fix line length, run jscs &amp; jshint in precommit
  * function description formatting
  * tooltips for function definitions
  * support specifying tag_values('&lt;tag&gt;') as graphite
    template query
  * use typeahead value in graphite find requests
  * send prefix when auto-completing tags
  * add button to trigger evaluation of tag queries
  * sync function categories with graphite-web
  * work on tag dropdown behavior
  * support for loading function definitions from graphite
  * Update building_from_source.md
  * Update README.md
  * Update default_task.js
  * Clearer naming for dashboard provisioning config.
  * ux: dashboard nav and settings tweaks
  * Tag filters in search (#10521)
  * fix: save as enter key now works and folder selection also
    works, fixes #10464
  * use context over golang.org/x/net/context
  * docs: small update to IIS proxy docs
  * added a variable for grid color and if statment to switch
    colors, fixes #10509 (#10517)
  * dashboards as cfg: logs error when trying to import
    dashboard with id
  * code style fixes
  * dashfolders: bugfix after rename
  * dashfolders: bugfix after rename
  * Adds Table in backend datasource contract.
  * fix: share snapshot controller was missing ngInject
    comment, fixes #10511
  * Use URLEncoding instead of StdEncoding to be sure state
    value will be corectly decoded (#10512)
  * Optimize metrics and notifications docs
  * Optimize cli and provisioning docs
  * imguploader: Add support for new internal image store
    (#6922)
  * docs: Guide for IIS reverse proxy
  * changelog: adds note about closing #9645
  * telegram: Send notifications with an inline image
  * telegram: Switch to using multipart form rather than JSON
    as a body
  * telegram: Fix a typo in variable name
  * dashfolder: refactor breadcrumbs in PageHeader
  * dashfolders: convert folder settings to React
  * Adds Tables types to protobuf
  * fix: alert list pause/start toggle was not working
    properly
  * fix template variable selector overlap by the panel
    (#10493)
  * Review tsdb protobuf contract
  * dashboard: Close/hide 'Add Panel' before saving a
    dashboard (#10482)
  * supports windows compatible plugin binaries
  * fix: removed unused param
  * Fix variables values passing when both repeat rows and
    panels is used (#10488)
  * moved angular-mocks out of dependencies
  * ux: minor change to alert list page
  * ux: minor word change to alert list
  * fix: updated snapshot test
  * moves plugin proxy to plugin package
  * Add eu-west-3 in cloudwatch datasource default's region
    (#10477)
  * fix: Make sure orig files are not added to git again
    #10289
  * improves name for plugin logger
  * fix: Remove conflict file #10289
  * text panel: fix $apply already in progress error (#10486)
  * uses pluginmanagers log instead of global
  * 10389 react tooltip components (#10473)
  * test: Updated snapshot for UserPicker jest test #10289
  * ux: When adding a new panel we should scroll to top until
    we figure o… (#10417)
  * removes commented code
  * naming fixes and added test file
  * makes datasource handshake more explicit
  * backend plugins: improves logging
  * dashfolders: show/hide create folder or dashboard buttons
  * dashfolders: fix mergeconflict error
  * dashfolders: prettify
  * dashfolders: check permissions for new dashboard
  * dashfolders: allow any signed in user to get list of teams
  * fix gofmt warning
  * dashfolders: permissions for saving annotations
  * dashfolders: disable save button after save of acl
  * dashfolders: on folder page, hide tabs if not has admin
    permission
  * dashfolders: remove role requirements on dashboard routes
  * dashfolders: must have admin permission to save/see dash
    acl
  * dashfolders: prettify on tests file
  * dashfolders: permissions tab in dashboard settings
  * dashfolders: permissions tab for dashboard folders
  * fix for unsaved changes popup on tab close/refresh
  * fix: Clean up logging and remove unused css #10289
  * fix: Rename directive user-pickerr (yes two r's) to
    select-user-picker
  * fix: Accidently added the conflict files (#10289)
  * test: Add snapshot tests for UserPicker and
    UserPickerOption (#10289)
  * fix: Add interface for props to UserPickerOption (#10289)
  * ux: POC on new select box for the user picker (#10289)
  * dashboard: fix opening links in new tab (#10465)
  * alert list: fix rendering timeout when share panel
    (#10467)
  * fix missing profile icon (#10469)
  * More fixes for relative urls when running Grafana under a
    different sub path (#10470)
  * put this.props.search in the Highlighter
  * moved state handling for search to store
  * Delete CopyQuery.png
  * Delete tgr288gear_line6.pdf
  * fix: added back colors to rootScope, fixes #10462
  * fixed the subUrl bugs from
    https://community.grafana.com/t/suburl-not-work-at-some-links-and-buttons/4701
    with folder/settings/teams etc.
  * added /** @nginject */
  * Fix typo in error message
  * updated snapshot
  * styling fix
  * added highlight to search
  * Updates go-stack to v1.7.0.
  * docs: adds note about tlsSkipVerify to docs
  * fixed regex issue
  * made a view of filtered list
  * updated jest file and snapshot
  * Remove silly noise
  * Update tests to match new reality, and rejig the
    implementation a bit to truly work as desired
  * Align queries to prometheus with the step to ensure 'rate'
    type expressions get consistent results
  * plugin: fix path for app plugins on windows
  * added search function
  * new styling and markup
  * cleanup: removed unused typescript typings import
  * new add alert notification channel icon
  * mobx: poc in using each store as individual prop on the
    react containers (#10414)
  * fix: Change max size of panel JSON editor so button is
    shown on smaller screens, #10346 (#10415)
  * poc: began react panel experiments, step2
  * poc: began react panel experiments, step2
  * Add AWS/AmazonMQ namespace metrics to CloudWatch tsdb
    (#10407)
  * add docs for using oauth login with OneLogin (#10385)
  * Update built_in_plugins.ts
  * poc: began react panel experiments
  * added empty list cta to notification channels, fixes 10393
    (#10400)
  * mobx: fixed issue with view store, and added missing
    snapshot
  * tech: enzyme container test working
  * tech: enzyme container test working
  * react: trying to get enzyme and mobx tests working
  * tech: url and query mobx store so now react components and
    containers can read and modify url path and query via mobx
    store
  * tech: alert list react migration progress
  * fix info popover, #10302 (#10377)
  * fix move dashboard variables, #10347 (#10375)
  * dashfolders: relative links should work when root_path is
    specified (#10363)
  * fix mixed datasource add query button, #10316 (#10361)
  * tech: react mobx progress
  * Doc version and schemaVersion properties of dashboards
  * tech: began reworking alerting list to mobx
  * tech: progress on react pages
  * prom: fixes broken test
  * prom: make $__$interval the first suggested range vector
  * fixes log typo
  * imguploader: log if the configuration is invalid
  * changelog: adds note about closing #8955
  * renderer: avoid calling Handle twice
  * migrated file to ts
  * dashboards as cfg: moves dashcash into its own file
  * dashboards as cfg: create dashboard folders if missing
  * fixed error
  * migrated files to ts
  * tests: for skipping with hidden folders
  * Implement Azure Blob external image uploader
  * migrated datasource to ts
  * tech: minor progress on mobx state tree &amp; react
    containers, working on unit testing
  * Fix tooltip unit when legend isn't shown (#10348)
  * refactor: minor refactoring of PR #10236
  * don't save dashboard on make editable, #10236
  * fix scripted dashboard loader, #10350 (#10351)
  * new aws region cn-northwest-1 (#10353)
  * Dashboard: View JSON improvements  (#10327)
  * refactor: tried to simplify and also minimize scope a bit
    for #10323
  * ignore trailing whitespace (#10344)
  * (prometheus) show label name in paren after
    by/without/on/ignoring/group_left/group_right
  * dont spawn new subprocess while shutting down
  * Fix small singlestat value display
  * fix: fixed issue with optimized build, fixes #10333
  * migrated file to ts (#10328)
  * plugins: restart killed plugins
  * query result should be a map
  * prom: removes limitation of one query per tsdb call
  * changelog: adds note about closing #10222
  * pagerduty: fixes invalid default value
  * fix: remove unused code
  * dashboard: copy panel to clipboard
  * pagerduty: adds test for reading auto resolve setting
  * code formatting fix
  * migrated files to ts + fixed specfile
  * tech: cleaned up unused stuff
  * ux: removed unused stuff form style guide
  * prettier: ran on all files again, sorry. now settings are
    defined in package.json
  * tech: mobx tests
  * Add avatar to team and team members page (#10305)
  * Various dashboard folders improvements (#10309)
  * mobx: progress on poc
  * test for plugin path builder
  * merge backend datasources and datasources
  * use int64 for timestamps
  * fixes invalid valud/timestamp order
  * fix: unit test fixed
  * prettier: change to single quoting
  * ux: minor name change to search sections
  * db: fix postgres regression when comparing boolean
    columns/values (#10303)
  * dashboard: delete row improvements
  * poc: mobx test
  * fix missing comma in documentation output example
  * fix broken link (#10291)
  * minor fixes and formatting after review
  * dashfolders: use validation service for folder creation
    and dashboard import. #10197
  * dashfolders: support creating new folder when moving
    dashboards. #10197
  * dashfolders: support creating new folder when saving a
    dashboard. #10197
  * dashfolders: support creating new folder in dashboard
    settings. #10197
  * dashfolders: support creating new folder from the folder
    picker. #10197
  * poc: mobx poc
  * tech: ran prettier on all scss files
  * tech: ran pretttier on all typescript files
  * search: closes dash search when selecting current
    dashboard (#10285)
  * fix: Original dashboard link from snapshot should be an
    a-tag, not a button (#10269) (#10283)
  * dashboard: fixes #10262
  * added new to new dahsboard and folder
  * test: Update test with new component signature
  * pushover: update default message
  * delete unused icon files
  * fix: The /logout route should always full page reload
    (#10277)
  * tech: added prettier to precommit
  * ux: Add icon to selected option in PageHeader navigation
    on small screens, update select boxes for Firefox so the
    arrow to the right is aligned with the other select boxes
    (#10190)
  * ux: Fix color picker positioning when scrolled down to the
    bottom of a page (#10258) (#10271)
  * test: remove unused code
  * alerting: make alert extractor backwards compatible
  * alerting: move test json into files
  * Use strings.TrimPrefix to make sure relative url doesn't
    start with forward slash
  * Update README.md
  * fix: Navigation on small screens when Grafana is installed
    in a sub directory (#10252) (#10261)
  * cloudwatch: fixed optimized build issue, fixes #10174
  * fix text panel rows limit (#10246)
  * use ace editor in panel edit (#10245)
  * docs: mysql example with macro
  * docs: mysql macros update
  * fix: reduced team name column length, fixes #10244
  * ux: Add missing icon for login with grafana-com, fixes
    #10238 (#10249)
  * Kinesis Metric Capitalization
  * merge backend-datasource and datasource type
  * dashfolder: nginject fix
  * teams: missing nginject attribute
  * grid: disable resize and drag on non editable dashboards,
    closes #10235
  * logging: removed logging from panel loader
  * menu: fixed create default url
  * fix: dont show settings for viewers
  * prometheus: change default resolution to 1/1
  * fix: viewers can edit now works correctly
  * fix: fixed minor ux and firefox issues, fixes #10228
  * ux: minor fixes
  * profile: use name or fallback for profile page
  * fix: sidemenu profile main text is now username instead of
    name
  * build: update master version to 5.0.0-pre1
  * dashfolder: change to migration text
  * ux:s sidemenu icon rules
  * teams: add team count when searching for team
  * changed background color for infobox and new blues in
    light theme, light theme now uses blue-dark in panel query
    (#10211)
  * ux: fixed navbar issue when sidemenu closes
  * ux: minor position change for layout selector, fixes
    #10217
  * fix: view json from share modal now works, #10217
  * ux: used new add data sources icon
  * dashfolders: styling of selected filters
  * dashfolders: styling of selected filters
  * dashfolders: fix moving plugin dashboard to folder
  * changelog: adds note about closing #9170
  * dashfolders: fix folder selection dropdown in dashboard
    settings
  * fix for merge conflict
  * add links for large cta
  * resolve merge conflict
  * dashfolders: bulk move/delete improvements
  * snapshots: fixed snapshot issues, fixes #10214
  * docs: include all notifiers type
  * replaced old table with filter-table, removed edit button,
    made whole rows to links
  * playlist: fixed playlist buttons in dashboard header,
    fixes #10213
  * docs: update latest version to 4.6.3
  * ux: minor changes to search input
  * Magnifying glass on search fields #10188 (#10206)
  * templating: made templateSrv globally accessable as ES6
    module, DashboardRow can not interpolate row title
  * fix: ignore row clones in schema migration
  * proxyds: delete cookies except those listed in keepCookies
  * dshttpsettings: Move whitelisted cookies to end of config
    page
  * proxyds: failing test for keepCookies
  * dshttpsettings: add field for cookies that should be kept
  * dashfolders: /dashboards should render index page with a
    200 OK
  * update version for packagecloud
  * dashfolders: bulk move/delete improvements
  * add release date for 4.6.3
  * fix: after removed file
  * dashfolder: fix after backendSrv change
  * dashboard: fix test after merge conflict
  * orgswitcher: update test
  * Avoid ID validation before provisioning dashboards
  * annotation icon fix
  * udpate dark json icon
  * dashboard settings icons
  * replace icon on dashboard list (fa-th-large - looked
    squished) with a smaller version of dashbord icon. This
    may not be the best way to do the css, so it's a separate
    commit
  * new icons created and added to nav
  * changelog: adds note about closing #7481
  * fixes broken unit test
  * alertmanager: endAt should only be used if we have the
    correct value
  * alertmanager: code style
  * alerting: reduce log level for notifiers
  * Alertmanager notifier: add 'metric' labels if no tags
  * Alertmanager notifier: make it match the new notifier
    interface
  * support alertmanager
  * Replace Read Only Editor role with ViewersCanEdit setting
    (#10166)
  * dashfolders: bulk move dashboards synchronously
  * dashfolders: remove error message when moving to the same
    folder. #10135
  * teams: Fixes to edit team page
  * ux: minor text change to #10177
  * made template link look like input (#10198)
  * minor tweaks
  * execute process directly instead of creating sub shell
  * Dashboard grid fixes (#10194)
  * refactor: minor change to #10199
  * fix broken 'd r' shortcut (refresh dashboard) (#10199)
  * ux: updated login page
  * fixes switching org when url contains orgId querystring
    param
  * build: fixed build issue
  * ux: refactoring login page change
  * navmodel: fix for signout link on pref page
  * change protip to go to manage dashboards
  * search: worked on search results
  * added select-wrapper to where it was missing for unified
    look
  * changelog: adds note about closing #10151
  * ux: wip - Login animation POC (#9879)
  * changelog: adds note about closing #9318
  * ux: Move 'Sign up' and 'Reset password' to its own pages -
    and remove all inline styling (#9879)
  * fixes broken alert eval when first condition is using OR
  * ux: org user management changes
  * removes unused property
  * fixed edit team header, fixes #10172
  * changed width to input fields (#10184)
  * ux: added search box to ds list page, closes #10106
  * ux: change members to users
  * plugins: fixed plugin edit page and plugin page
  * dashfolders: Minor css fixes for bulk edit
  * dashfolders: Minor css fixes for bulk edit
  * docs: SSL Mode config settings for Postgres
  * dashfolder: settings page for folder
  * removes verbose logging
  * fix: FolderId and IsFolder when saving dashboard
  * ux: fixed inactive view mode and removed animation
  * removed unused declaration
  * updated dashlink editor, now has list
  * fix: Handle state when no password is entered on
    registration page (#9879)
  * adding support for sgl native time datatypes
  * added missing cases for DATETIME datatype
  * ux: move add member into its own page (#10167)
  * Add a per-notifier ShouldNotify()
  * minor fix for #10136
  * Fix graph legend scroll (#10169)
  * fix colorpicker colors order (width issue) (#10170)
  * graphite: remove check so that query is sent even for
    possible non leaf nodes
  * fix: fixed build failure
  * ux: Use the previously renamed classes (#9879)
  * fix: fixed dashboard api tests
  * fix: don't detect graphite version before it's saved
  * updated new dashboard folder
  * ux: style tweaks
  * ux: Update ui of login buttons via third parties and add
    link to sign up page (#9879)
  * redesigning links editor
  * ux: search look update
  * tech: updated version for react-grid item
  * build: fixed unit test failure
  * Extracted row matching function and added comments
  * allow overriding dashboards from api
  * redesigning links editor
  * graphite: minor fix for PR #10142 the query was being sent
    for every segmen t you selected before you completed the
    metric path
  * build: fixed broken test
  * refactor: minor change to panel json fix PR #10156
  * Move panel JSON editor to modal dialog (#10156)
  * ux: minor updates to dashboard settings
  * ux: dashboard settings updated
  * new dashboard and folder in search (#10152)
  * avatar: avoid concurrent map writes
  * redesign dashlinks
  * fix: fixed issue with optimized build grid directive
    missing ngInject comment, fixes #10161
  * annotations: allows template variables to be used in tag
    filter
  * Add default message for Pushover notifications
  * refactor: format files by gofmt
  * ux: Adjust margins when external auth providers are
    enabled (#9879)
  * ux: dashboard settings progress
  * ux: dashboard settings work progress
  * dashfolders: new dashboard with folder selected
  * ux: wip - Push pixels for new login, remove inline
    styling, change so we use media queries using min-width
    instead of max-width and make sure it looks ok across all
    screen sizes (#9879)
  * ux: dashboard settings work progress
  * backend plugins: manage plugins lifecycle with context
  * ux: dashboard settings progress
  * ux: dashboard settings progress
  * ux: dashboard settings progress
  * backend plugins: dont swallow errors
  * fix: fixed failing test
  * backend plugins: cleanup protobuf files
  * ux: dashboard settings progress
  * backend plugins: add more datasource params
  * Type-agnostic row merge in table transform for multiple
    queries
  * ux: dashboard settings progress
  * ux: fixed navbar and sidemenu z-index issue and improved
    responsive rules
  * code style
  * implement upstream changes
  * fix: fixed build failure
  * changelog: adds note about closing #10131
  * Explicitly specify default region in CloudWatch datasource
    (#9440)
  * add encoding param
  * wait for all sub routines to finish
  * fix function re-ordering broken in #9436
  * add missing value fill code to mysql datasource
  * hyphenhyphen
  * support metric trees of varying depth, never send '.select
    metric' to graphite
  * simplify function parameter addition
  * ux: dashboard settings progress
  * fix typo
  * ux: minor changes
  * implement missing value fill functionality for postgres
  * allow optional 3rd argument to timeGroup to control
    filling missing values
  * ux: navbar progress
  * improve handling of query references
  * build: fix for tslint
  * ux: form styles polish, improvement but can be better
  * pass tsdbQuery to transformToTimeSeries and
    transformToTable to get access to selected frontend
    timerange
  * demonstrate parseTarget issue
  * fix: fixed panel size rerendering issues
  * pass Query to MacroEngine Interpolate
  * ux: work on dashboard settings views
  * dashfolders: Do not allow loading a folder as a dashboard
  * fix: Remove console.log
  * dashfolders: Folder picker should set correct default
    values. Fixes #10135
  * refactor: user groups to teams, replace rest mentions
  * refactor: user groups to teams, rename backend files
  * refactor: user groups to teams, rename frontend files
  * refactor: rename User Groups to Teams
  * changelog: adds ntoe about closing #10111
  * ux: forms style font size change
  * ux: dashboard settings progress
  * postgres: change $__timeGroup macro to include 'AS time'
    column alias (#10119)
  * new timepicker is working
  * dashfolders: Create nav model for folder page client side
    #10083
  * ux: minor change to new folder page
  * fix for search dropdown on small screen + icon overlapping
    fix (#10091)
  * ux: added react scrollbar component and added it to add
    panel panel
  * tech: updated ngreact and with custom PR applied
  * refactoring: #10130
  * Revert 'Don't animate panels on initial render (#10130)'
  * Don't animate panels on initial render (#10130)
  * refactoring: fixing bug when all values are null
  * fixes broken test
  * dashfolders: Hide search input area when showing CTA.
    #10083
  * ux: graph legend refactoring
  * improve error handling for datasources as cfg
  * improve sample datasource.yaml
  * make gitignore more generic
  * grid css transforms: minor refactor (#10128)
  * dashboard grid: enable CSS transforms (#10125)
  * fixes issue with datasource/dash as cfg and gitignore
  * refactoring: changing how graph height and legend height
    is calculated, using flex box seems to actually work,
    #10079
  * dashfolders: create folder page
  * refactor: removed graph height from legend decimal calc
  * dashfolders: css fix
  * fixes failing tests
  * dashfolders: New Dashboard Folder page
  * fix: move components tests to specs folder
  * Fix go fmt
  * kill plugin processes when grafana shuts down
  * fix: v5 sidemenu &amp; link to shortcuts now works, fixes
    #10087
  * separate plugin impl and proto files
  * correct comments
  * add hclog wrapper for grafanas logger in plugins
  * add go-plugin deps to vendor
  * initial version of proto files
  * changelog: breaking regardless what your running
  * changelog: better styling
  * removes last pieces of dashboard.json
  * refactor: sidemenu toggle &amp; hiding logic
  * changelog: note about closing #5269 and #9654
  * dashboards as cfg: update docs to use /provisioning
  * dashboards as cfg: move dash/ds config files to
    /provisioning/*
  * dashboards as cfg: copy dash/ds files if missing
  * dashboards as cfg: include cfg files in dist packages
  * dashboards as cfg: avoid walking fs in parallel
  * dashboards as cfg: type
  * dashboards as cfg: disable loading dashboards from disk by
    default
  * dashboards as cfg: wire up dashboard repo
  * dashboards as cfg: use gocache for caching
  * dashboards as cfg: expose dashboard service as interface
  * dashboards as cfg: move saving logic for dashboards into
    its own service
  * dashboards as cfg: revert minor changes
  * dashboards as cfg: move dashboard saving into its own
    service
  * dashboards as cfg: minor tweaks
  * dashboards as cfg: make dashboard none editable by default
  * dashboards as cfg: more tests
  * dashboards as cfg: code cleanup
  * dashboards as cfg: read first cfg version
  * removed row to center footer (#10115)
  * ux: minor cleanup
  * mysql: pass timerange for template variable queries
    (#10071)
  * dashboard: fix edge case with keyboard nav in dashboard
    search. #10100
  * Solves problem with Github authentication restriction by
    organization membership when the organization's access
    policy is set to 'Access restricted'. 'Access restricted'
    policy should not stop user to authenticate.
  * graph: fix legend height calculation
  * postgres: pass timerange for template variable queries
    (#10069)
  * graph: move auto decimals calc to ticks.ts and use it for
    legend values format.
  * Resolves grafana/grafana:#9309
  * dashboard: fix linting and formating - #10100
  * dashboard: keyboard nav in dashboard search - closes
    #10100
  * graph: refactor (don't render twice)
  * handle native postgres datetime types in annotation
    queries (#9986)
  * treat any text column in timeseries query as metric name
    unless column (#9985)
  * Fixing tabs for Grafana 5 - #10082 (#10103)
  * other panels now hidden, fixes 10088 (#10102)
  * fixed 404 for grafana5 + now responsive (#10101)
  * dashboard: fix search results tests #10083
  * dashboard: Show CTA for empty lists/folders #10083
  * dashboard: Dashboard folder page wip #10083
  * prom: enable min interval per panel
  * Fix merge issue on multi-query table transforms
  * graph: fix karma tests
  * graph: render legend before graph
  * added tooltip, fixes #10092 (#10097)
  * graph: refactor
  * graph: convert legend.js to typescript
  * fixing a few fromattings
  * adding mssql docs
  * docs: link from cfg page to provisioning
  * reduce app icon by 3px on home dashboard - wasn't lining
    up properly with starred/recently viewed dasboard list
    properly
  * ux: minor style tweaks to cards and sidemenu icons for
    white theme
  * ux: tweaked light theme and made page container more fluid
  * dashboard: dashboard search results component. closes
    #10080
  * docs: added utm_source for link from ds list page to docs
    page
  * updating the query editor's syntax highlighting mode to
    sqlserver
  * fixed grey colors in light-theme, added new variables,
    played a bit with blue
  * v5: removed permissions from dashboard cog dropdown,
    closes #10068
  * nav: updated nav item id for manage dashboards
  * refactoring PR #10068
  * dashboard: migrations for repeat rows (#10070)
  * Backwards-compat for multi-query table transform
  * graph: make legend scrollable
  * removes unused properties
  * Making the multi-query table transform the default table
    transform
  * ux: updated padding
  * ux: Add CTA for empty lists
  * move import menu item to the original place
  * move DashboardImportCtrl tests to jest
  * Move import dashboard from modal to the page
  * refactor: minor refactoring of  #10027
  * new grays for light theme
  * sidemenu: responsive sidemenu view for smallest breakpoint
  * add _tests for mssql data source
  * ux: tabs update
  * Tests for multi-query table transform
  * ux: updated modal header design
  * ux: progress on time picker dropdown version
  * fix templating undefined error (#10004)
  * tweaks to add panel panels
  * ux: updated dashboard nav
  * MSSQL Data Source
  * add server only build target 'build-srv'
  * ux: dashboard setings progres
  * add Cloud Alchemy Ansible role
  * started on dashboard settings refactor
  * ux: add new panel and dash nav improvements
  * Added basic table transformer test
  * typo :boom:
  * influxdb: pass tags to alerting from influxdb client
  * ux: dashboard nav update
  * ux: new dashnav design
  * ignore /conf/**/custom.yaml files
  * repeat row: refactor
  * Fix dashboard menu overlapping (#10044)
  * Add multiquery_table table transform
  * typo :boom:
  * move systemd ready notification to server.go
  * changelog: adds note about closing #10024
  * page header now on 99% of pages
  * navigation: more progress on new page header
  * ux: new page-header design, most pages beside admin done
  * fixed sass warnings
  * ux: made plugins page work
  * Use systemd notification where applicable
  * progress on page header
  * tweaked color on heatmap. still not there, but more
    vibrant
  * ux: new page header progress
  * added bundled dashboards
  * ux: progress on new page header
  * dashboard: when changing route, scroll to top
  * grafana-10039: fix query time range ends in the past
  * ux: work on page header
  * Revert 'prometheus nested query support'
  * ux: updating header design for pages
  * fix: when navigating, scroll to top
  * repeat row: add more tests
  * ux: new page header design
  * tweak background size
  * new test svg background, minor form tweaks
  * ux: search filter box
  * ux: changed body default font size to 13px
  * test: fix failing postgres test
  * Added border radius and tightened up the folder boxes.
    Still needs to have the bottom margin expanded to 8px when
    in opened state (this needs @torkelo)
  * test: speedup mysql and postgres integration tests by
    10-20x
  * repeat row: expose scopedVars to row panels
  * ux: search design update
  * repeat row: handle collapsed rows
  * notifier: Fixes path for uploaded image for Slack notifier
  * formatting in build file
  * dashboard: initial repeat row implementation
  * prometheus nested query support
  * fix render http[get] params error
  * test: close file before deleting
  * Restore Page Footer after migration to new scrollbar #9652
  * export view json now templatized, fixes #10001
  * dashfolders: Add a helper for creating a dashboard folder
  * dashfolders: revert automatic creation of folders for
    plugins
  * styling changes for light theme
  * grid: use single column layout for mobile devices (#9999)
  * fix panel solo mode (#10002)
  * dashlist: handle recent dashboards removed from backend
  * dashfolders: don't create app folder on dashboard import
    if already exists
  * dashfolders: create app folder on dashboard import
  * datasource: fix merge conflict - restore dashboards tab
  * search fix and update buttons on dashboard list page
  * fix: removed table background
  * build: fixed lint issue
  * fixed link i specs-file
  * Improve dashboard grid layout migration WIP (#9943)
  * test fix
  * updated libs and fixed new typescript errors
  * dashlist: Support for clear all filters
  * migrated viewstatesrv to ts
  * added yarn.lock file back
  * ux: table design work
  * panel: open panel menu by click on header
  * ux: search progress
  * worked on search
  * migrated four files from js to ts
  * migrated four files to ts, addd some code to config to
    make it work (#9980)
  * Update NOTICE.md
  * Update LICENSE.md
  * ux breadcrumb work
  * ux: sass fixes and polish
  * dashlist: Support for check/uncheck all
  * Migrate gfunc to ts (#9973)
  * migrated admin files to ts (#9975)
  * migration of org files from js to ts (#9974)
  * sass tweaks
  * dashlist: When searching should reset checked state to
    false
  * More js to ts (#9966)
  * dashlist: change scrollbar to new perfect scroll directive
  * docs: Improve delete snapshot documentation
  * ux: fixed sass issue
  * sass refactoring and updating styles for list item
    elements
  * dashlist: style list to be same as dash search
  * css tweaks and cleanup
  * removing gemini scrollbar and replacing with perfect
    scrollbar, muuuch better
  * dashlist: starred filter search
  * ux: tweaked panel color and dashboard background is same
    as page background
  * removed call to unused function in panel_ctrl
  * scrollable panels works better with perfect-scrollbar
  * Update latest.json
  * Optimized number of lines fetching in log file
    initialisation
  * work on scrollable panels
  * converted 3 .js files to .ts (#9958)
  * docs: adds docs for pausing all alerts
  * Removing file that got committed by accident
  * scrollable panels: fix initial content size (#9960)
  * Delete LICENSE.txt
  * dashlist: adds tag filter select (GitHub style)
  * [GCS] Support for gcs path
  * dashlist: toggle folders
  * dashboard: fix test for folderIds
  * allows head requests for /api/health endpoint
  * dashlist: fix tag filtering and some css
  * fix: fixed issue with metric segment introduced in
    graphite tags query editor PR
  * progress on  scrollable panels work
  * mysql: add data source support for Azure MySql
  * fixed unit tests
  * fix: alert list panel now works correctly after adding
    manual annotation on dashboard, fixes #9951
  * Elasticsearch max_concurrent_shard_requests parameter for
    es 5.6+
  * prom: add prom2 dashboard as bundled dashboard
  * show top 5 max scrape durations by job, and fix legend
    format
  * fix scrape duration, add rule eval iteration stats, and
    reorg a bit
  * fix data source var and remove node_exporter dependency
  * First draft of a Prometheus 2.0 Stats dashboard
  * prom: initial docker block for prometheus 2
  * tweak tabs:
  * color fix
  * make grays cooler
  * dashlist: started fixing js/css after design changes
  * updated search
  * more work on search
  * minor update to dashboard search
  * converted test-files to jest
  * improved search srv
  * converted influx-series to TS, converted test to jest
  * dashboard search
  * working on dashboard search
  * Move the loading flag to PanelCtrl (#9929)
  * graph: disable zoom in non-timeseries modes (#9914)
  * changed padding to pixels, fixes #9916 (#9924)
  * Use correct moments format for Showing last us time
    instead of value test (#9923)
  * Don't import JSON dashboards from hidden directories.
  * new design for login
  * fix: build &amp; tests
  * search: add expanded folders
  * influxdb: another minor refactor of #9474
  * refactor: refactoring InfluxDB query builder with policy
    PR #9473
  * refactor: refactoring InfluxDB query builder with policy
    PR #9473
  * docs: added versions_to_keep to config docs, #9671
  * refactoring: minor refactor of clean up dashboard history
    PR #9882
  * fix: fix for avatar images when gzip is turned on, fixes
    #5952
  * elasticsearch: default version to 5.x
  * Adding a user in a specified organisation uses the admin
    API
  * panels: add css tweaks for scrollable panels
  * dashboard history clean up: avoid potential SQL injections
  * search: refactor search sql into a builder class
  * changelog: note about closing #9798
  * removes invalid comment
  * api: fix so that datasources functions returns Response
  * changelog: note about closing #1789
  * fix: Use Response as return type
  * fix: return id from api when creating new
    annotation/graphite annotation, fixes #9798
  * datasources as cfg: adds docs for all jsondata and
    secure_json fields
  * graphite: minor changes
  * text panel: make scrollable
  * panels: general property which makes panel scrollable
  * datasources as cfg: convert yaml map into json for
    jsonData
  * fix: fix cloudwatch metricFindQuery error that stopped it
    working completely, fixes #9876
  * dashlist: css adjustments for scrollbar
  * dashlist: fix resizing after mode switching
  * dashlist: add scrollbar
  * dashlist: fix panel resizing
  * docs: update metrics api path
  * changelog: adds note about closing #1871
  * fixes: #1871 Dropdown starred (#9490)
  * dont loose subsecond precision when dealing with timestamp
    or (#9851)
  * graphite: progress on new query editor
  * datasource as cfg: fixes typos
  * docs: format cfg mgt tools as table
  * docs: adds more info about provisioning
  * datasource as cfg: update docs to include globbig
  * datasource as cfg: show deletes first in example
  * datasource as cfg: support globbing
  * datasource as cfg: enable editable ds's
  * datasource as cfg: add org_id to example config
  * tweak docs
  * datasource as cfg: adds readonly datasources
  * datasource as cfg: refactor to use bus
  * datasource as cfg: test for reading all properties
  * datasource as cfg: adds provisioning docs
  * datasource as cfg: rename feature to provisioning
  * datasource as cfg: improve name for this feature
  * datasource as cfg: refactor tests to use yaml files
  * datasource as cfg: ignore datasource all ready exist for
    inserts
  * datasource as cfg: add support for securedata field
  * datasource as cfg: setting for purging datasources not in
    cfg
  * datasources as cfg: tests for insert/updating datasources
  * datasource as cfg: basic implementation
  * More energy units (#9743)
  * Add feet to the length menu (#9889)
  * middleware: recovery handles panics in all handlers
  * sql: small fix to error handling
  * graphite: progress on new query editor
  * changelog: make prom fixes more explicit
  * dashboard history clean up: add tests
  * tech: ignore debug.test file created by VS Code
  * dashboard history: refactor after review
  * changelog: adds note about closing #9777
  * prom: add support for default step param (#9866)
  * properly escape components of connection string (#9850)
  * refactor: changed string slicing to strings.TrimPrefix,
    #9862
  * dashboard history: clean up dashboard version history
  * build: fixed jshint error
  * sync documentation, add remark about to_timestamp and
    redshift (#9841)
  * fix: Html escaping caused issue in InfluxDB query editor,
    could not pick greater than or less then operators, fixes
    #9871
  * changelog: adds note about closing #8523
  * teams: removes print statement
  * Add Microsoft Teams notifier
  * docs: update building from source doc with node-gyp
  * heatmap: fix tooltip in 'Time series bucket' mode, #9332
    (#9867)
  * fix: Table panel now renders annotations correctly. Fixes
    #9842 (#9868)
  * build: fixes build and jest tests on Windows
  * fix cloudwatch ec2_instance_attribute (#9718)
  * graph: the stack &amp; legend sort sync was not working
    correctly, the z-index sorting that happened in after the
    legend sort order was applied and messed with the order
    even though the sort function returned zero for all
    entries, combined the sort function to one sort function,
    fixes #9789 (#9797)
  * not ok option to alert list, fixes: #9754
  * changelog: note about closing #9661
  * return empty array for no datapoints
  * fix query inspector for cloudwatch
  * Add AWS/NetworkELB to cloudwatch definitions
  * changelog: note about closing #9784
  * test: adds tests for password encodiing
  * use SHOW RETENTIONS to test influxdb connection (#9824)
  * Use hex.EncodeToString to encode to hex
  * Added missing documentation for auth.proxy (#9796)
  * fix date test (#9811)
  * docker: expose statsd endpoint for graphite block
  * update lib/pq (#9788)
  * Update the config key to database_log_queries so it is
    more descriptive, as suggested in #9785.
  * graph: don't change original series name in histogram
    mode, #8886 (#9782)
  * MySQL Performance when using GF_DATABASE_URL Set
    MaxIdleConn and MaxOpenConn when using the GF_DATABASE_URL
    configuration. Also added GF_DATABASE_DEBUG flag to print
    SQL statements and SQL execution times. See #9784 for the
    details.
  * Update postgres.md
  * colorpicker: fix color string change #9769 (#9780)
  * refactor: alert list panel fixes and no alerts message,
    rewrite of PR #9721
  * feat: refactoring hide time picker PR #9756
  * search: began writing test for new search
  * changed class name for no-alerts
  * chore(docs): update the search Query Example
  * ux: search progress
  * dashfolders: fix for dashlist nav
  * reduce docker-compose header version
  * ux: progress on new search
  * ux: minor changes
  * ignore docker-compose.yaml
  * docs: update latest release to 4.6.1
  * packages: update published package version
  * option to hide Time picker, fixes #2013
  * fix: panel view now wraps, no scrolling required, fixes
    #9746
  * changelog: set release date for 4.6.1
  * changelog: adds note about closing #9707
  * fix default alias
  * add period alias
  * plugins: fix for loading external plugins behind auth
    proxy, fixes #9509
  * testdata: added manual entry mode to test data
  * new design for no alerts in alert-list, fixes #9721
  * fix: fixed compiler error from #9676
  * converted ng_model_on_blur.js to ts,
    deletedkeyboard_manager.js (#9676)
  * docs: update testdata enable explanantion
  * MAINTAINER is deprecated, now using LABEL
  * Update ROADMAP.md
  * Adding energy, area, and acceleration units (#9336)
  * tests: migrated tests for link_srv to jest, #9666
  * Transitioning fig to docker-compose v3
  * tests: migrated tests for link_srv to jest, #9666
  * fix for dashboard tag link bug, fixes #9737 (#9739)
  * github: dont require bug/fr in title
  * changelog: adds note about closing #9713
  * converted confirm_click.js to .ts (#9674)
  * Update codecov.yml
  * change default sslmode for postgres to verify-full (#9736)
  * fix: color picker bug at series overrides page, #9715
    (#9738)
  * Update ROADMAP.md
  * tech: switch to golang 1.9.2
  * always quote template variables for mysql when multi-value
    is allowed (#9712)
  * always quote template variables for postgres when
    multi-value or include (#9714)
  * fix: dashboard links dropdown toggle did not update view,
    fixes #9732
  * docs: adds prom grafana dashboard
  * graphite: tag is required for values autocomplete
  * dashfolders: bulk edit tag filtering
  * Correct help message of
    api_dataproxy_request_all_milliseconds
  * changelog: adds note about closing #9645
  * changelog: adds note about closing #9698
  * ace editor for text panel
  * dashboards: bulk edit delete
  * tech: add missing include
  * dashboards: fix link to bulk edit
  * sql: remove title from annotation help
  * changelog: adds note about closing #9681
  * fix: undefined is not an object evaluating this., #9538
  * [Bug Fix] Opentsdb Alias issue (#9613)
  * fix: graphite annotation tooltip included undefined, fixes
    #9707
  * Alertlist: Inform when no alerts in current time range
  * save as should only delete threshold for panels with
    alerts
  * graphite: tags and values autocomplete based on @DanCech
    PR to graphite-web
  * changelog: note for #9596
  * add __timeGroup macro for mysql (#9596)
  * updated icons
  * docs: fix link
  * ux: testing 3px panel border radius
  * more link fixes
  * fixed link issues
  * renamed file
  * converted inspect_ctrl.js to ts (#9673)
  * converted dashboard_loaders.js to .ts (#9672)
  * declared any to info in declaration
  * converted analytics.js to ts, minor code formatting fix to
    timer.ts (#9663)
  * docs: updated download links
  * docs: update alerting with new data sources
  * changelog: spelling
  * plugins: added backward compatible path for rxjs
  * ux: updated singlestat default colors
  * prometheus: fixed unsaved changes warning when changing
    time range due to step option on query model was changed
    in datasource.query code, fixes #9675
  * docs: updated changelog
  * fix: firefox can now create region annotations, fixes
    #9638
  * changelog: adds note about closing #9639
  * set release date for 4.6.0
  * grid: work in progress on row repeats
  * dashfolders: rough draft of bulk edit
  * converted linkSrv.js to linkSrv.ts
  * docs: update docker installation docs
  * grid: minor changes
  * converted outline.js to outline.ts (#9658)
  * converted timer.js to timer.ts (#9656)
  * datasource as cfg: typo
  * Create codecov.yml
  * datasource as cfg: explain why cmd.version can be higher
  *   #edit_grafana_organisation_apis_doc (#9651)
  * add a phantomjs execution status to log if errors happens,
    e.g. OOM killer kills it (#9644)
  * grid: worked on row options modal and row removal
  * dashboard: fix home dashboard getting started panel
  * Fix typo in template help tab
  * replace store.js with store.ts, test for store.ts (#9646)
  * tests: added test for DashboardRow
  * docs: update first page with data source guides
  * docs: document annotations for postgres/mysql
  * docs: update for template variables
  * changelog: spelling
  * Allow for multiple auto interval template variables
    (#9216)
  * changelog: adds note about closing #9645
  * tech: remove rabbitmq event publisher
  * changelog: note for #9030
  * dont quote variables for mysql and postgres datasource
    (#9611)
  * asscoiate comment with name
  * Update development.md
  * ux: row collapse / expand starting to work
  * changelog: adds note about closing #9640
  * alerting: only editors can pause rules
  * prom: adds pre built grafana dashboard
  * changelog: adds note about closing #9636
  * fix: another fix for playlist view state, #9639
  * ux: updated icons
  * shore: migrating config/settings.js to typescript
  * fix: fixed playlist controls and view state, fixes #9639
  * Fixed #9636
  * shore: removed unused old system conf file
  * Use d3 from node_modules (#9625)
  * update log15 (#9622)
  * docs: update whats-new-in
  * changelog: small text change
  * changelog: v4.6.0-beta3 released
  * tech: annotations refactor, add tests for regions
    processing (#9618)
  * Move #9527 to 4.6.0-beta3
  * build: disable jest on precommit hook -windows fix
  * build: fix all npm run commands for Windows
  * plugins: fixes path issue on Windows
  * build: tryingt of fix windows build issue
  * tests: removes commented tests
  * graph: invert order when sorting by legend
  * fix: escape series name in graph legend, added
    aliasEscaped to time series model to reuse escape, fixes
    #9615
  * build: fixed gofmt issue and addd mock response feature
  * prometheus: enable gzip for /metrics endpoint
  * build: split circle test shell scripts
  * datasources: change to optimisic concurrency
  * build: reduced webpack log output and remove race flag
    from go tests
  * build: set max workers to 2 for jest
  * build: log heap usage
  * build: another build fix
  * tests: migrated two more tests to jest
  * build: fixed build failure
  * build: reworking pre commit hook
  * build: added precommit
  * fix: fixed tslint validation error
  * test: added first react snapshot test
  * docs: another docs fix
  * docs: fix docs redirect for older datasources index page,
    fixes #9609
  * [Tech]: Start migrating to Jest for tests (#9610)
  * Fix typo in init.d script
  * graphite: auto detect version
  * graphite: improved version comparison
  * graphite: split tags and functions into 2 rows when
    seriesByTag used
  * graphite: add tags to dropdown and switch to tag editor if
    selected
  * plugins: expose dashboard impression store
  * ux: minor ux tweaks
  * Sort series in the same order as legend in graph panel
    (#9563)
  * fix: fixed save to file button in export modal, fixes
    #9586
  * mysql: add usage stats for mysql
  * run go fmt
  * Add a setting to allow DB queries
  * note for #9527
  * modify $__timeGroup macro so it can be used in select
    clause (#9527)
  * Fix heatmap Y axis rendering (#9580)
  * prometheus: add builtin template variable as range vectors
  * Note for #5457
  * fix: fixed prometheus step issue that caused browser
    crash, fixes #9575
  * changelog: adds note about closing #9551
  * fix: getting started panel and mark adding data source as
    done, fixes #9568
  * pluginloader: esModule true for systemjs config
  * Fixes for annotations API (#9577)
  * ux: new fixes
  * Grafana5 light (#9559)
  * When Messasge field is set for an alert, map it to the
    output field in a Sensu check result. If Message is empty,
    send 'Grafana Metric Condition Met'
  * ux: work on rows
  * fix vector range
  * allow ':' character for metric name
  * build: added imports of rxjs utility functions
  * grid: row work
  * fix template variable expanding
  * annotations: quote reserved fields (#9550)
  * fix: fixed color pickers that were broken in minified
    builds, fixes #9549
  * ux: align alert and btn colors
  * docs: doc updates
  * remove duplicative prometheus function
  * remove label match operator from keyword.operator
  * remove label match operator from keyword.operator
  * remove extra state push
  * fix typo
  * newgrid: row progress
  * styleguide: fix link in index
  * api: fix for dashboard version history
  * textpanel: fixes #9491
  * graphite: datasource refactor
  * csv: fix import for saveAs shim
  * grid: minor progress on new row concept
  * ux: add panel progress
  * alert_tab: clear test result when testing rules
  * ux: worked on add panel function
  * plugins: expose more util and flot dependencies
  * (cloudwatch) fix cloudwatch query error over 24h (#9536)
  * Add autofocus tag for username field on login.html (#9526)
  * show error message when cloudwatch datasource can't add
  * ux: minor button changes
  * CloudWatch: Add ALB RequestCountPerTarget metric
  * ux: color tweaks
  * ux: testing out new icons
  * set nightly version to v4.7.0-pre1
  * changelog: adds release date for v4.6.0-beta1
  * ux: minor fixes
  * grid: fixed grid width issues
  * grid: repeat refactoring and unit tests
  * Missing dot in aws credentials path
  * newgrid: added constants, changed grid to 24 cols, added
    tests for panel repeats
  * docs: doc updates
  * grid: minor progress on panel repeats
  * changed name back to use underscore instead of camelcase,
    need to think more about this
  * fixed dashboard sorting
  * newgrid: worked panel duplicate
  * fix: various fixes for new grid
  * dashgrid: fix or skip tests for repeat rows
  * dashboardgrid: disable dynamic_dashboard_srv for now
  * ux: style tweaks
  * newgrid: various fixes
  * If retention policy is set for influxDB, preprend that to
    the measurement name for exploration queries.
  * newgrid: fixed migration code to new grid
  * docker: updated our graphite docker container
  * grid: edit/view now works
  * dashboard: fixes for panels without rows
  * webpack: changed devtools setting to stop exceptions
  * fix: ignore upgrading dashboard grid when there are no
    rows
  * grid: fixed migration for rows without height
  * ux: minor fix sidemenu
  * newgrid: progress on fullscreen/edit view modes
  * search: fix search to limit dashboards better
  * grid: fixed geting started panel pos
  * grid: progress on react grid
  * grid: progress on new grid, resize &amp; saving layouts works
  * grid: minor progress
  * tech: got angular component to load inside react grid
  * grid: need to find a way to add angular component inside
    react
  * ux: initial react grid poc
  * graphite-tags: refactor, improve performance - remove
    unnecessary parseTarget() calls
  * graphite-tags: add tests
  * graphite-tags: refactor, use &lt;gf-form-dropdown&gt; instead of
    &lt;metric-segment&gt;
  * graphite-tags: initial tag editor
  * Update kbn.js
  * Update kbn.js
  * fixes
  * Use B/s instead Bps for Bytes per second
  * fix merge issue
  * develop: fixed more broken tests, couple still failing
  * ux: alternative row design
  * newgrid: fixes to default home dashboard
  * ux: minor fixes
  * ux: new grid progress
  * grid: minor progres on new grid
  * grid: minor progres on new grid
  * ux: minor button changes
  * ux: minor updates
  * ux: changed cta button style
  * minor fix
  * ux: added scroll to two pages
  * minor fix for page-h1
  * grid work
  * progress on rows as panelsW
  * fixed unit tests
  * minor user avatar stuff
  * started on rows as panels in single grid
  * minor user list cahnge
  * users view update
  * ux: color tweaks
  * Moved around the columns a bit
  * ux: dashboard stuff
  * ux: minor changes
  * ux: sidemenu animation duration
  * ux: fixed sidenav issues
  * ux: sidemenu toggling
  * ux: sidenav fixes and dashboard search changes
  * ux: switching orgs now works through modal
  * ux: making org visibile in profile view
  * ux: more nav work
  * ux: nav fixes &amp; polish
  * ux: more nav work
  * ux: more nav work
  * ux: navigation work
  * ux: sidenav fixes and dashboard search changes
  * ux: more work on sidemenu
  * Silly gradient added a placeholder. no more
    experimentation to be done here until Trent has a pass at
    it
  * ux: scrollbar stuff
  * Added drop shadown for sticky scrolling, moved colors into
    dark and light variables
  * Reduced size of breadcrumbs, additional form styling.
    Colors still need to be adjusted
  * Starting to play with new form styles
  * ux: minor scroll fix
  * ux: removed custom scrollbar look
  * ux: reduced size of sidemenu icons a bit
  * ux: testing fixed sidemenu and breadcrumbs
  * ux: minor navbar update
  * ux: new breadcrumb progress
  * ux: wip
  * ux: new page header look wip
  * ux: testing roboto font
  * ux: use flexbox for sidenav, put logo in sidenav
  * moving panels betwen rows are starting to work
  * grid: progress on row support
  * grid: new grid fixes
  * new-grid: fixed destory issues
  * grid: remove panel works
  * grid: updated gridstack to use grafana fork
  * feat: new grid fixes
  * minor fixes
  * updated
  * feat: new grid system progressW
  * ux: minor panel menu fix
  * ux: minor panel menu tweaks
  * ux: tweaks to new panel menu
  * updated
  * dashfolders: inherited permissions for dashboards
  * dashfolders: handle permission changes when saving/moving
    dashboards
  * added code from #8504, and #8021
  * dashboard folder search fix
  * dashfolders: fix user group picker + cleanup
  * dashfolders: rename refactor
  * dashfolders: validation for duplicates in acl modal
  * minor update
  * ux: style tweaks, trying out non italic headers
  * ux: nav changes
  * added sidemeu stuff
  * dashfolders: use canadmin permission in settings menu
  * dashfolders: tests for permission modal
  * dashboard acl fixes
  * acl fixes
  * dashfolders: new admin permission needed to view/change
    acl
  * acl: more acl work
  * dashfolders: filter search based on child dash permissions
  * dashfolders: allows phantomjs rendering for alerting
  * dashfolders: allow overflow-y for modals
  * dashfolders: security for png rendering
  * dashboard acl stuff
  * dashboard acl work
  * dashboard acl
  * working on dashbord acl stuff
  * WIP: first draft of permissionlist panel
  * dashboard acl
  * dashboard acl work
  * WIP: fix js tests for acl
  * WIP: fix folder-picker for dashlist
  * dashboard acl work
  * refactoring: dashboard folders
  * dashboard acl modal
  * WIP: adding roles - not finished
  * refactoring: moving dashboards acl migrations to its own
    folder
  * WIP: fix acl route
  * refactoring: renaming
  * folders: changed api urls for dashboard acls
  * refactoring more renaming
  * refactoring renaming dashboard folder operations
  * dashboard_folders refactoring
  * refactoring dashboard folder security checks
  * dashboard guardian refactoring starting to work
  * dashboard folders acl work
  * refactoring dashoard folder guardian
  * WIP: refactor user group modal
  * refactoring: Dashboard guardian
  * WIP: remove unused test file
  * WIP: refactor dash search and remove extra query
  * WIP: move guardian logic for search into the sql query
  * WIP: remove dashboard children on delete
  * dashboard_folders: refactoring picker and folder selection
    in dashboard settings &amp; save as menu
  * WIP: adds API check to stop folders being included in
    folders
  * use gf-form-dropdown in user picker
  * WIP: add test for add user group permission
  * WIP: can edit dashboard permission
  * WIP: clean up after user and org user delete
  * WIP: remove permissions when deleting global user
  * dashboard_folders: updated
  * WIP: delete dependent permissions on user group delete
  * dashboard_folders: fixes to user picker &amp; group picker
  * dashboard_folders: fixes to user &amp; group picker
  * minor update
  * WIP: permission checking for dash version api methods
  * ux: gridstack poc
  * Gridstack: testing
  * WIP: check permissions for delete/post dashboard
  * WIP: fixes after version history merge
  * ux: nav experiments
  * WIP: add permission check for GetDashboard
  * ux: side nav experiments
  * WIP: fix test after merge conflict
  * WIP: fix go fmt error
  * WIP: user + user-group pickers for permissions
  * WIP: API - add dash permission
  * WIP: user-picker directive
  * WIP: Permission Type as string in permission query
  * WIP: fixes after navbar changes
  * WIP: dashlist in template for new folder
  * WIP: refactor folder-picker for dashlist
  * WIP: dashboard search by folder + toggle for list or tree
    mode
  * WIP: adds folder-picker to save as dialog
  * WIP: use metric-segment for folder picker
  * WIP: add dummy root folder to folder picker
  * WIP: Create new dashboard button in dash search
  * WIP: permissions moved to settings tab. Adds folder
    dropdown to general settings tab
  * WIP: add parentid to getdashboard query result
  * WIP: dashboard search by type (folder or dash)
  * WIP: fix after upstream sqlstore refactoring
  * WIP: rollback
  * WIP: delete permission in API
  * WIP: user group additions
  * WIP: remove browse mode for dashboard search
  * WIP: get Dashboard Permissions
  * WIP: add open/closed folders icons for dash search
  * WIP: Can remove dashboard permission - sql
  * WIP: limit GetAllowedDashboards sql query with a where in
  * WIP: Add or update Dashboard ACL
  * WIP: guardian service for search
  * dashboard: sort search with dash folder first
  * WIP: add some TS types
  * WIP: edit user group page
  * WIP: API methods for add/remove members to user group
  * WIP: add update user group command
  * WIP: add new group, needs to be redone
  * WIP: add user group search
  * WIP: add usergroup commands and queries
  * WIP: rough prototype of dashboard folders
  * ux: very early start to new sidemenu
  * ux: very early start to new sidemenu
  * ux: minor tweak to faintness of icons of panel menu caret
  * ux: minor progress on panel title menu makover
  * use the original options parameter
  * use targets[0] as the options
  * pass the options along with a _seriesQuery
  * pass database parameter in the options
  * allow setting the database
  * ux: more work on panel menu
  * ux: panel title ux improvements poc
  * Sending image
  * Discord integration

Changes in grafana-natel-discrete-panel:
- Add recompress source service
- Add set_version source service
- Enable changesgenerate for tar_scm source service
- Update to version 0.0.9:
  * split commands
  * put back the history

Changes in openstack-aodh:
- Add %_tmpfilesdir to %files

Changes in openstack-barbican:
- Add %_tmpfilesdir to %files

Changes in openstack-cinder:
- Add %_tmpfilesdir to %files

Changes in openstack-gnocchi:
- Add %_tmpfilesdir to %files

Changes in openstack-heat:
- Add %_tmpfilesdir to %files

Changes in openstack-ironic:
- Add %_tmpfilesdir to %files

Changes in openstack-magnum:
- Add %_tmpfilesdir to %files

Changes in openstack-manila:
- Add %_tmpfilesdir to %files

Changes in openstack-monasca-agent:
- Add dependency:
  * fdupes
  * pwdutils and shadow-utils for useradd/groupadd
- remove rpm-packaging integration

- Add %_tmpfilesdir to %files

Changes in openstack-murano:
- Add %_tmpfilesdir to %files

Changes in openstack-neutron:
- Add %_tmpfilesdir to %files

Changes in openstack-neutron-vpnaas:
- Add %_tmpfilesdir to %files

Changes in openstack-nova:
- Add 0014-Provide-VIR_MIGRATE_PARAM_PERSIST_XML-during-live-migration.patch
  - (bsc#1175484, CVE-2020-17376)

- Add 0001-rbd_utils-increase-_destroy_volume-timeout.patch (bsc#1154434)
  - Fix for https://bugs.launchpad.net/nova/+bug/1856845

Changes in openstack-sahara:
- Add %_tmpfilesdir to %files

Changes in python-google-api-python-client:

- Add pr-201.patch . This enables also older oauth2client
  versions.

- update to 1.5.0:
  - Release to support oauth2client &gt;= 2.0.0.
  - Fix file stream recognition in Python 3 (#141)
  - Fix non-resumable binary uploads in Python 3 (#147)
  - Default to 'octet-stream' if mimetype detection fails (#157)
  - Handle SSL errors with retries (#160)
  - Fix incompatibility with oauth2client v2.0.0 (#182)
  - Add automatic caching for the discovery docs.
  - Add the googleapiclient.discovery.Resource.new_batch_http_request method.
  - Python 3 support.
  - Small bugfix release.
  - Fix an infinite loop for downloading small files.
  - Fix a unicode error in error encoding.
  - Better handling of `content-length` in media requests.
  - Add support for methodPath entries containing colon.
  - Quick release for a fix around aliasing in v1.3.
  - Add support for the Google Application Default Credentials.
  - Require python 2.6 as a minimum version.
  - Update several API samples.
  - Finish splitting out oauth2client repo and update tests.
  - Various doc cleanup and bugfixes.
  - We've added `googleapiclient` as the primary suggested import
    name, and kept `apiclient` as an alias, in order to have a more
    appropriate import name. At some point, we will remove `apiclient`
    as an alias.
  - Due to an issue around in-place upgrades for Python packages,
    it's not possible to do an upgrade from version 1.2 to 1.3. Instead,
    setup.py attempts to detect this and prevents it. Simply remove
    the previous version and reinstall to fix this.
  - The use of the gflags library is now deprecated, and is no longer a
    dependency. If you are still using the oauth2client.tools.run() function
    then include gflags as a dependency of your application or switch to
    oauth2client.tools.run_flow.
  - Samples have been updated to use the new apiclient.sample_tools, and no
    longer use gflags.
  - Added support for the experimental Object Change Notification, as found in
    the Cloud Storage API.
  - The oauth2client App Engine decorators are now threadsafe.
  - Use the following redirects feature of httplib2 where it returns the
    ultimate URL after a series of redirects to avoid multiple hops for every
    resumable media upload request.
  - Updated AdSense Management API samples to V1.3
  - Add option to automatically retry requests.
  - Ability to list registered keys in multistore_file.
  - User-agent must contain (gzip).
  - The 'method' parameter for httplib2 is not positional. This would cause
    spurious warnings in the logging.
  - Making OAuth2Decorator more extensible. Fixes Issue 256.
  - Update AdExchange Buyer API examples to version v1.2.
  - Add PEM support to SignedJWTAssertionCredentials (used to only support
    PKCS12 formatted keys). Note that if you use PEM formatted keys you can use
    PyCrypto 2.6 or later instead of OpenSSL.
  - Allow deserialized discovery docs to be passed to build_from_document().
  - Make ResumableUploadError derive from HttpError.
  - Many changes to move all the closures in apiclient.discovery into real
    classes and objects.
  - Make from_json behavior inheritable.
  - Expose the full token response in OAuth2Client and OAuth2Decorator.
  - Handle reasons that are None.
  - Added support for NDB based storing of oauth2client objects.
  - Update grant_type for AssertionCredentials.
  - Adding a .revoke() to Credentials. Closes issue 98.
  - Modify oauth2client.multistore_file to store and retrieve credentials
    using an arbitrary key.
  - Don't accept 403 challenges by default for auth challenges.
  - Set httplib2.RETRIES to 1.
  - Consolidate handling of scopes.
  - Upgrade to httplib2 version 0.8.
  - Allow setting the response_type in OAuth2WebServerFlow.
  - Ensure that dataWrapper feature is checked before using the 'data' value.
  - HMAC verification does not use a constant time algorithm.
- Fix description
- Update BuildRequires and Requires
- Use Source from pypi

Changes in python-Pillow:
- Add 0019-FLI-overflow-error-fix-and-testcase.patch
   * From upstream, backported
   * Fixes CVE-2016-0775, bsc#965582
- Add 0020-Fix-OOB-reads-in-FLI-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10177, bsc#1173413
- Add 0021-Fix-bounds-overflow-in-JPEG-2000-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10994, bsc#1173418
- Add 0022-Fix-bounds-overflow-in-PCX-decoding.patch
   * From upstream, backported
   * Fixes CVE-2020-10378, bsc#1173416

Changes in rubygem-crowbar-client:
- Update to 3.9.3
  - Enable restricted commands for Cloud 7 (bsc#1117080, CVE-2018-17954)

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154434">SUSE bug 1154434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173413">SUSE bug 1173413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173416">SUSE bug 1173416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173418">SUSE bug 1173418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175484">SUSE bug 1175484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965582">SUSE bug 965582</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18623/">CVE-2018-18623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18624/">CVE-2018-18624</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18625/">CVE-2018-18625</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10177/">CVE-2020-10177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10378/">CVE-2020-10378</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10994/">CVE-2020-10994</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11110/">CVE-2020-11110</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12052/">CVE-2020-12052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17376/">CVE-2020-17376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79641" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-4_2 (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172186" ref_url="https://bugzilla.suse.com/1172186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007578.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activesupport-4_2 fixes the following issues:

- CVE-2020-8165: Fixed deserialization of untrusted data in MemCacheStore potentially resulting in remote code execution (bsc#1172186)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-15"/>
	<updated date="2020-10-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595950" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79642" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595951" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595952" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551770" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79643" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595953" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551772" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595954" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551774" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595955" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551776" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595956" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551778" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595957" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79644" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595958" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595959" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595960" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79645" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595961" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551784" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595962" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551786" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595963" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551788" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595964" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551790" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595965" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551792" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595966" comment="libndr0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551794" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595967" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551796" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595968" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551798" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595969" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551800" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595970" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551802" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595971" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551804" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595972" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551806" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595973" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551808" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595974" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551810" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595975" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551812" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595976" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551814" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595977" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551816" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595978" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551818" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595979" comment="samba-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595980" comment="samba-client-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551821" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595981" comment="samba-libs-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551823" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595982" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551825" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79646" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-core, crowbar-openstack, openstack-neutron-fwaas, rubygem-crowbar-client (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1117080" ref_url="https://bugzilla.suse.com/1117080" source="BUGZILLA"/>
		<reference ref_id="1160048" ref_url="https://bugzilla.suse.com/1160048" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954/" source="CVE"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006446.html" source="SUSE-SU"/>
		<description>
This update for crowbar-core, crowbar-openstack, openstack-neutron-fwaas, rubygem-crowbar-client  contains the following fixes:

Security fixes for rubygem-crowbar-client:

- CVE-2018-17954: Fixed an issue where crowbar was leaking the secret admin passwords to all nodes (bsc#1117080)

Changes in crowbar-core:
- Update to version 4.0+git.1578392992.fabfd186c:
  * Avoid nil crash when provisioner attributes are not set (bsc#1160048)

- Update to version 4.0+git.1578294389.acc7385d5:
  * Adding CVE-2019-16770 to the ignore list, regarding SOC-10999.

Changes in crowbar-openstack:
- Update to version 4.0+git.1579171175.d53ab6363:
  * tempest: tempest run filters as templates (SOC-11052)
  * Add tempest filters based on services (SOC-9801)

Changes in openstack-neutron-fwaas:
- Remove the patch that was deleting the tempest entry point and enable tempest tests.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-03"/>
	<updated date="2020-02-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160048">SUSE bug 1160048</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595983" comment="crowbar-core-4.0+git.1578392992.fabfd186c-9.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595984" comment="crowbar-core-branding-upstream-4.0+git.1578392992.fabfd186c-9.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595985" comment="crowbar-openstack-4.0+git.1579171175.d53ab6363-9.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595986" comment="openstack-neutron-fwaas-9.0.2~dev5-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595987" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595988" comment="python-neutron-fwaas-9.0.2~dev5-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595989" comment="ruby2.1-rubygem-crowbar-client-3.9.1-7.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79647" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79648" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1175476" ref_url="https://bugzilla.suse.com/1175476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14562: Fixed an overflow in DxeImageVerificationHandler (bsc#1175476).  
- CVE-2019-14559: Fixed a memory leak in ArpOnFrameRcvdDpc() (bsc#1163927).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531453" comment="ovmf-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531454" comment="ovmf-tools-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531455" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79649" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-15708: Added a  note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009595991" comment="libvirt-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595992" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595993" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595994" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595995" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595996" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595997" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595998" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595999" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596000" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596001" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596002" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596003" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596004" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596005" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596006" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596007" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596008" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596009" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79650" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79651" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issue:
	  
Security issue fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).

Other issue addressed: 

- Fixed an issue with rendering animated gifs (QTBUG-55141).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596010" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596011" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596012" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596013" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596014" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596015" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596016" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596017" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596018" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596019" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596020" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596021" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596022" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596023" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596024" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79652" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79653" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596029" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551866" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596030" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551868" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596031" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551870" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596032" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551872" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596033" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551874" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596034" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551876" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596035" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551878" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596036" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551880" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596037" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551882" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596038" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596039" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525349" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596040" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551886" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79654" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79655" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596041" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551888" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596042" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596043" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551891" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596044" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551893" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596045" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596046" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79656" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79657" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596051" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551901" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596052" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596053" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596054" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596055" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79658" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596056" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596057" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596058" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79659" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host (bsc#1161181).
- CVE-2019-19579: Device quarantine for alternate pci assignment methods (bsc#1157888).
- CVE-2019-19581: find_next_bit() issues (bsc#1158003).
- CVE-2019-19583: VMentry failure with debug exceptions and blocked states (bsc#1158004).
- CVE-2019-19578: Linear pagetable use / entry miscounts (bsc#1158005).
- CVE-2019-19580: Further issues with restartable PV type change operations (bsc#1158006).
- CVE-2019-19577: dynamic height for the IOMMU pagetables (bsc#1158007).
- CVE-2019-18420: VCPUOP_initialise DoS (bsc#1154448).
- CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation (bsc#1154456).
- CVE-2019-18421: Issues with restartable PV type change operations (bsc#1154458).
- CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment (bsc#1154461).
- CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue) (bsc#1155945).
- CVE-2019-11135: TSX Asynchronous Abort (TAA) issue (bsc#1152497).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-06"/>
	<updated date="2020-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79660" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596059" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596060" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551911" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596061" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596062" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596063" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596064" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596065" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596066" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596067" comment="postgresql94-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596068" comment="postgresql94-contrib-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531565" comment="postgresql94-docs-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596069" comment="postgresql94-plperl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596070" comment="postgresql94-plpython-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596071" comment="postgresql94-pltcl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596072" comment="postgresql94-server-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596073" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596074" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596075" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596076" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596077" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596078" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79661" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596079" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79662" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79663" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="1169947" ref_url="https://bugzilla.suse.com/1169947" source="BUGZILLA"/>
		<reference ref_id="1178038" ref_url="https://bugzilla.suse.com/1178038" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper fixes the following issues:

libzypp fixes the following security issue:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).

zypper was updated to fix the following issues:

- Fixed an issue, where zypper crashed when the system language is set to Spanish and the user
  tried to patch their system with 'zypper patch --category security' (bsc#1178038)
- Fixed a typo in man page (bsc#1169947)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-18"/>
	<updated date="2020-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169947">SUSE bug 1169947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178038">SUSE bug 1178038</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596080" comment="libzypp-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596081" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596082" comment="zypper-1.13.57-18.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79664" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596083" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551935" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596084" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596085" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596086" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596087" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596088" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596089" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79665" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596090" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596091" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596092" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596093" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596094" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596095" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79666" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596096" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596097" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596098" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596099" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596100" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596101" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79667" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1131277" ref_url="https://bugzilla.suse.com/1131277" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176922" ref_url="https://bugzilla.suse.com/1176922" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).

The following non-security bugs were fixed:

- btrfs: fix race with relocation recovery and fs_root setup (bsc#1131277).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277).
- btrfs: btrfs_init_new_device should use fs_info-&gt;dev_root (bsc#1131277, bsc#1176922).
- btrfs: btrfs_test_opt and friends should take a btrfs_fs_info (bsc#1131277, bsc#1176922).
- btrfs: call functions that always use the same root with fs_info instead (bsc#1131277, bsc#1176922).
- btrfs: call functions that overwrite their root parameter with fs_info (bsc#1131277, bsc#1176922).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277, bsc#1176922).
- btrfs: pull node/sector/stripe sizes out of root and into fs_info (bsc#1131277, bsc#1176922).
- btrfs: Remove fs_info argument of btrfs_write_and_wait_transaction (bsc#1131277, bsc#1176922).
- btrfs: remove root parameter from transaction commit/end routines (bsc#1131277, bsc#1176922).
- btrfs: remove root usage from can_overcommit (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, access fs_info-&gt;delayed_root directly (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, add fs_info convenience variables (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, btrfs_calc_{trans,trunc}_metadata_size (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, update_block_group{,flags} (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, use fs_info-&gt;dev_root everywhere (bsc#1131277, bsc#1176922).
- btrfs: split btrfs_wait_marked_extents into normal and tree log functions (bsc#1131277, bsc#1176922).
- btrfs: struct btrfsic_state-&gt;root should be an fs_info (bsc#1131277, bsc#1176922).
- btrfs: take an fs_info directly when the root is not used otherwise (bsc#1131277, bsc#1176922).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131277">SUSE bug 1131277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176922">SUSE bug 1176922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79668" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79669" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596106" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596107" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79670" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79671" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596111" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596112" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79672" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596113" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596114" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79673" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79674" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596115" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596116" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596117" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596118" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596119" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79675" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007909.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- Add wheel subpackage with the generated wheel for this package
  (bsc#1176262, CVE-2019-20916).
- Make wheel a separate build run to avoid the setuptools/wheel build
  cycle.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525278" comment="python-pip-10.0.1-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79676" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596120" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596121" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596122" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79677" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-openstack, grafana, influxdb, python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1005886" ref_url="https://bugzilla.suse.com/1005886" source="BUGZILLA"/>
		<reference ref_id="1170479" ref_url="https://bugzilla.suse.com/1170479" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1178243" ref_url="https://bugzilla.suse.com/1178243" source="BUGZILLA"/>
		<reference ref_id="1178988" ref_url="https://bugzilla.suse.com/1178988" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611/" source="CVE"/>
		<reference ref_id="CVE-2019-20933" ref_url="https://www.suse.com/security/cve/CVE-2019-20933/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2020-24303" ref_url="https://www.suse.com/security/cve/CVE-2020-24303/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<description>
This update for crowbar-openstack, grafana, influxdb, python-urllib3 contains the following fixes:

Security fixes included in this update:

openstack-glance
- CVE-2016-8611: Added rate limiting for glance api (bnc#1005886)

grafana
- CVE-2020-24303: Fixed an XSS via a query alias for the ElasticSearch datasource (#bnc#1178243)

influxdb
- CVE-2019-20933: Fixed an authentication bypass (bnc#1178988)

python-urlib3
- CVE-2019-9740: Fixed a CRLF injection in urllib3 (bnc#1129071).
- CVE-2020-26137: Fixed a CRLF injection via HTTP request method (bnc#1177120)

memcached
- CVE-2018-1000115: Fixed a issue where a UDP server allowed spoofed traffic amplification DoS (bnc#1083903).

Non-security fixes included in this update:

Changes in crowbar-openstack:
- Update to version 4.0+git.1604938545.30c10db18:
  * rabbitmq: Fix crm running check (SOC-11240)

Changes in grafana:
- Fix bnc#1178243 CVE-2020-24303 by adding
  25401-Fix-XSS-vulnerability-with-series-overrides.patch

Changes in influxdb:
- Add CVE-2019-20933.patch (bnc#1178988, CVE-2019-20933) to
  fix authentication bypass_
- Declare license files correctly

- Version 1.2.4:
  * The stress tool influx_stress will be removed in a subsequent
    release.
  * Remove the override of GOMAXPROCS.
  * Uncomment section headers from the default configuration file.
  * Improve write performance significantly.
  * Prune data in meta store for deleted shards.
  * Update latest dependencies with Godeps.
  * Introduce syntax for marking a partial response with chunking.
  * Use X-Forwarded-For IP address in HTTP logger if present.
  * Add support for secure transmission via collectd.
  * Switch logging to use structured logging everywhere.
  * [CLI feature request] USE retention policy for queries.
  * Add clear command to cli.
  * Adding ability to use parameters in queries in the v2 client
    using the Parameters map in the Query struct.
  * Allow add items to array config via ENV
  * Support subquery execution in the query language.
  * Verbose output for SSL connection errors.
  * Cache snapshotting performance improvements

- Partially revert previous change to fix build for Leap

Changes in python-urllib3:
- Update urllib3-fix-test-urls.patch. Adjust to match upstream solution.

- Add urllib3-fix-test-urls.patch. Fix tests failing on python checks for
  CVE-2019-9740.

- Add urllib3-cve-2020-26137.patch. Don't allow control chars in request
  method. (bnc#1177120, CVE-2020-26137)

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005886">SUSE bug 1005886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170479">SUSE bug 1170479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178243">SUSE bug 1178243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178988">SUSE bug 1178988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20933/">CVE-2019-20933</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24303/">CVE-2020-24303</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596123" comment="crowbar-openstack-4.0+git.1604938545.30c10db18-9.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596124" comment="grafana-6.7.4-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596125" comment="influxdb-1.2.4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596126" comment="python-urllib3-1.16-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79678" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1171550" ref_url="https://bugzilla.suse.com/1171550" source="BUGZILLA"/>
		<reference ref_id="1175596" ref_url="https://bugzilla.suse.com/1175596" source="BUGZILLA"/>
		<reference ref_id="1177472" ref_url="https://bugzilla.suse.com/1177472" source="BUGZILLA"/>
		<reference ref_id="1178428" ref_url="https://bugzilla.suse.com/1178428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<description>
This update for mariadb includes the following fixes:

Security fixes included in this update:

- CVE-2020-2752: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2814: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-2760: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-13249: Fixed an improper validation of the content of an OK packet received from a server.
- CVE-2020-14812: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-14765: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-14776: Fixed an issue which could have resulted in unauthorized ability of accessing data.
- CVE-2020-14789: Fixed an issue which could have resulted in unauthorized ability to cause denial of service.
- CVE-2020-15180: Fixed an issue in Galera which could have led to remote code execution.


Non Security fixes included in this update:

- Update to 10.2.36 GA [bsc#1177472] and [bsc#1178428]
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10236-release-notes
    https://mariadb.com/kb/en/library/mariadb-10236-changelog
    https://mariadb.com/kb/en/library/mariadb-10235-release-notes
    https://mariadb.com/kb/en/library/mariadb-10235-changelog
    https://mariadb.com/kb/en/library/mariadb-10234-release-notes
    https://mariadb.com/kb/en/library/mariadb-10234-changelog
  * fixes for the following security vulnerabilities:
    10.2.36: none
    10.2.35: CVE-2020-14812, CVE-2020-14765, CVE-2020-14776,
             CVE-2020-14789
    10.2.34: CVE-2020-15180
- update suse_skipped_tests.list

- Update to 10.2.33 GA [bsc#1175596]
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10233-release-notes
    https://mariadb.com/kb/en/library/mariadb-10233-changelog
  * fixes for the following security vulnerabilities: none
- refresh mariadb-10.2.4-fortify-and-O.patch
- tune the testsuite to avoid randomly failing tests
- update suse_skipped_tests.list

- Update to 10.2.32 GA [bsc#1171550]
  * Fixes for the following security vulnerabilities:
    CVE-2020-2752, CVE-2020-2812, CVE-2020-2814, CVE-2020-2760,
    CVE-2020-13249
  * release notes and changelog:
    https://mariadb.com/kb/en/library/mariadb-10232-release-notes
    https://mariadb.com/kb/en/library/mariadb-10232-changelog
- refresh mariadb-10.2.4-fortify-and-O.patch
- drop specfile 'hacks' as things work correctly in upstream now:
  * renaming tmpfiles.conf -&gt; mariadb.conf
  * installing pam_user_map.so to /lib64/security for non 32bit
    architectures
  * sysusers.conf was renamed to mariadb.conf
- update suse_skipped_tests.list
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175596">SUSE bug 1175596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79679" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596132" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596133" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79680" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596134" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596135" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79681" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596136" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79682" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79683" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596137" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596138" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551984" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596139" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596140" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79684" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596141" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551989" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596142" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551991" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596143" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551993" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596144" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596145" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596146" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596147" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596148" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596149" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596150" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79685" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596151" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596152" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596153" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79686" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596154" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596155" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596156" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596157" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596158" comment="libspice-controller0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596159" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596160" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79687" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79688" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79689" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79690" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79691" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596165" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552013" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596166" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552015" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596167" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596168" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552018" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596169" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552020" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596170" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552022" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596171" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552024" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79692" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596172" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596173" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596174" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596175" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596176" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596177" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596178" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596179" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596180" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596181" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79693" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issue:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596182" comment="sudo-1.8.10p3-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79694" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1138743" ref_url="https://bugzilla.suse.com/1138743" source="BUGZILLA"/>
		<reference ref_id="1154849" ref_url="https://bugzilla.suse.com/1154849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Security issue fixed:

- CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers 
  to cause denial of service via DHCP response creation (bsc#1154849)

Other issue addressed:  

- Removed cache size limit (bsc#1138743).

		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1138743">SUSE bug 1138743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596183" comment="dnsmasq-utils-2.78-18.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79695" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596184" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596185" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596186" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79696" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596187" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549062" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79697" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596188" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596189" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552028" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596190" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552030" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596191" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79698" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs6 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1163102" ref_url="https://bugzilla.suse.com/1163102" source="BUGZILLA"/>
		<reference ref_id="1163103" ref_url="https://bugzilla.suse.com/1163103" source="BUGZILLA"/>
		<reference ref_id="1163104" ref_url="https://bugzilla.suse.com/1163104" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<description>
This update for nodejs6 fixes the following issues:

Security issues fixed:

- CVE-2019-15604: Fixed a remotely triggerable assertion in the TLS server via a crafted certificate string (CVE-2019-15604, bsc#1163104).
- CVE-2019-15605: Fixed an HTTP request smuggling vulnerability via malformed Transfer-Encoding header (CVE-2019-15605, bsc#1163102).
- CVE-2019-15606: Fixed the white space sanitation of HTTP headers (CVE-2019-15606, bsc#1163103).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163102">SUSE bug 1163102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163103">SUSE bug 1163103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163104">SUSE bug 1163104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596192" comment="nodejs6-6.17.1-11.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79699" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596193" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79700" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1077330" ref_url="https://bugzilla.suse.com/1077330" source="BUGZILLA"/>
		<reference ref_id="1094291" ref_url="https://bugzilla.suse.com/1094291" source="BUGZILLA"/>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1163959" ref_url="https://bugzilla.suse.com/1163959" source="BUGZILLA"/>
		<reference ref_id="1163969" ref_url="https://bugzilla.suse.com/1163969" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2018-0739: Update openssl to 1.0.2o to limit ASN.1 constructed types recursive definition depth (bsc#1094291).
- CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
- CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
- CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).

Bug fixes:

- Only use SLES-UEFI-CA-Certificate-2048.crt for the SUSE flavor to provide the better compatibility. (bsc#1077330)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077330">SUSE bug 1077330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163959">SUSE bug 1163959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163969">SUSE bug 1163969</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538002" comment="ovmf-2015+git1462940744.321151f-19.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538003" comment="ovmf-tools-2015+git1462940744.321151f-19.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538004" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79701" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79702" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596199" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549071" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596200" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596201" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596202" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596203" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79703" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79704" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1015203" ref_url="https://bugzilla.suse.com/1015203" source="BUGZILLA"/>
		<reference ref_id="1022804" ref_url="https://bugzilla.suse.com/1022804" source="BUGZILLA"/>
		<reference ref_id="1084682" ref_url="https://bugzilla.suse.com/1084682" source="BUGZILLA"/>
		<reference ref_id="1087920" ref_url="https://bugzilla.suse.com/1087920" source="BUGZILLA"/>
		<reference ref_id="1153451" ref_url="https://bugzilla.suse.com/1153451" source="BUGZILLA"/>
		<reference ref_id="1153459" ref_url="https://bugzilla.suse.com/1153459" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

Security issues fixed:

- CVE-2019-17041: Fixed a heap overflow in the parser for AIX log messages (bsc#1153451).
- CVE-2019-17042: Fixed a heap overflow in the parser for Cisco log messages (bsc#1153459).

Non-security issues fixed:

- Handle multiline messages correctly when using the imfile module. (bsc#1015203)
- Fix a race condition in the shutdown sequence in wtp that was causing rsyslog not to
  shutdown properly. (bsc#1022804)
- Fixed a rsyslogd SIGABORT crash if a path does not exists (bsc#1087920).
- Fixed an issue where configuration templates where not consistently flushed (bsc#1084682).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015203">SUSE bug 1015203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022804">SUSE bug 1022804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084682">SUSE bug 1084682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087920">SUSE bug 1087920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596207" comment="rsyslog-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596208" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596209" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596210" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596211" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596212" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596213" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596214" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596215" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596216" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79705" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596217" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596218" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79706" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79707" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596219" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79708" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596220" comment="python-PyYAML-5.1.2-26.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525286" comment="python-jsonpatch-1.1-10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525287" comment="python-jsonpointer-1.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522746" comment="python-pyparsing-2.2.0-7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525297" comment="python3-jsonpointer-1.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522749" comment="python3-pyparsing-2.2.0-7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79709" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596221" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79710" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596222" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596223" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596224" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596225" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596226" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596227" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79711" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79712" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79713" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79714" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596236" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596237" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549104" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596238" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596239" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596240" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596241" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596242" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596243" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79715" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79716" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79717" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596247" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596248" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596249" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596250" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596251" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79718" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-core, crowbar-openstack, openstack-horizon-plugin-monasca-ui, openstack-monasca-api, openstack-monasca-log-api, openstack-neutron, rubygem-puma, rubygem-rest-client (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1157028" ref_url="https://bugzilla.suse.com/1157028" source="BUGZILLA"/>
		<reference ref_id="1157482" ref_url="https://bugzilla.suse.com/1157482" source="BUGZILLA"/>
		<reference ref_id="1158675" ref_url="https://bugzilla.suse.com/1158675" source="BUGZILLA"/>
		<reference ref_id="917802" ref_url="https://bugzilla.suse.com/917802" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3448" ref_url="https://www.suse.com/security/cve/CVE-2015-3448/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<description>
This update for crowbar-core, crowbar-openstack, openstack-horizon-plugin-monasca-ui, openstack-monasca-api, openstack-monasca-log-api, openstack-neutron, rubygem-puma, rubygem-rest-client contains the following fixes:

Security issue fixed for rubygem-puma:

- CVE-2019-16770: Fixed a potential denial of service  in Puma's reactor (bsc#1158675, jsc#SOC-10999)

Security issue fixed for rubygem-rest-client:

- CVE-2015-3448: Fixed a plain text local password disclosure. (bsc#917802)

Updates for crowbar-core:
- Update to version 4.0+git.1574788924.e4a6aeb0c:
  * Allow pacemaker remotes for upgrade (SOC-10133)

- Update to version 4.0+git.1574713660.972029d1a:
  * Ignore CVE-2019-13117 in CI builds (bsc#1157028)

Updates for crowbar-openstack:
- Update to version 4.0+git.1574869671.9c7bade2d:
  * tempest: configure Kibana version (SOC-10131)

- Update to version 4.0+git.1574764112.c260c70e5:
  * horizon: install lbaas horizon dashboard (SOC-10883)

Updates for openstack-horizon-plugin-monasca-ui:
- Refresh allow-raw-grafana-links.patch
- update to version 1.5.5~dev3
  * Replace openstack.org git:// URLs with https://
  * Fix the partial missing metrics in Create Alarm Definition flow
  * import zuul job settings from project-config
  * Fix incorrect splitting of dimension in ProxyView
  * Fix Alarm status Panel on Overview page
  * Change IntegerField to ChoiceField for notification period
  * Imported Translations from Zanata
  * Display unique metric names for alarm
  * Fix Alarm Details section in Alarm History view
  * Fix validators for creating and editing notifications
  * Center the text for the button Deterministic
  * Adding title to Filter Alarms pop-up
  * Fix misleading validation error
  * Fix nit found in monasca-ui
  * Fix Breadcrumbs
  * Fix description for name field
  * Fixing 'Create Alarm Definition' for IE11
  * Imported Translations from Zanata

Updates to openstack-monasca-api:
- added fix-metric-name-offset.patch (SOC-10131)
- removed 0001-Fix-InfluxDB-repository-list_dimension_values-to-sup.patch
  (merged upstream)
- update to version 1.7.1~dev18
  * Replace openstack.org git:// URLs with https://
  * import zuul job settings from project-config
  * Upgrade Apache Storm to 1.0.6
  * Zuul: Remove project name

Updates to openstack-monasca-log-api:
- added fix-tempest-region.patch (SOC-10131)
- update to version 1.4.3~dev3
  * Replace openstack.org git:// URLs with https://
  * import zuul job settings from project-config
  * Avoid tox\_install.sh for constraints support

Updates to openstack-neutron:
- neutron: Remove stop action from ovs-cleanup (bsc#1157482)
  backport of https://review.opendev.org/#/c/695867/
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157482">SUSE bug 1157482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158675">SUSE bug 1158675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917802">SUSE bug 917802</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3448/">CVE-2015-3448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596252" comment="crowbar-core-4.0+git.1574788924.e4a6aeb0c-9.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596253" comment="crowbar-core-branding-upstream-4.0+git.1574788924.e4a6aeb0c-9.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596254" comment="crowbar-openstack-4.0+git.1574869671.9c7bade2d-9.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596255" comment="grafana-monasca-ui-drilldown-1.5.5~dev3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596256" comment="openstack-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596257" comment="openstack-monasca-api-1.7.1~dev18-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596258" comment="openstack-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596259" comment="openstack-neutron-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596260" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596261" comment="openstack-neutron-doc-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596262" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596263" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596264" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596265" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596266" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596267" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596268" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596269" comment="openstack-neutron-server-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596270" comment="python-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596271" comment="python-monasca-api-1.7.1~dev18-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596272" comment="python-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596273" comment="python-neutron-9.4.2~dev21-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596274" comment="ruby2.1-rubygem-puma-2.16.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79719" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596275" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596276" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79720" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1077717" ref_url="https://bugzilla.suse.com/1077717" source="BUGZILLA"/>
		<reference ref_id="1156669" ref_url="https://bugzilla.suse.com/1156669" source="BUGZILLA"/>
		<reference ref_id="1160878" ref_url="https://bugzilla.suse.com/1160878" source="BUGZILLA"/>
		<reference ref_id="1160883" ref_url="https://bugzilla.suse.com/1160883" source="BUGZILLA"/>
		<reference ref_id="1160895" ref_url="https://bugzilla.suse.com/1160895" source="BUGZILLA"/>
		<reference ref_id="1160912" ref_url="https://bugzilla.suse.com/1160912" source="BUGZILLA"/>
		<reference ref_id="1162388" ref_url="https://bugzilla.suse.com/1162388" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.2.31 GA fixes the following issues:

MariaDB was updated to version 10.2.31 GA (bsc#1162388 and bsc#1156669).

Security issues fixed:

- CVE-2020-2574: Fixed a difficult to exploit vulnerability that allowed an attacker to crash the client (bsc#1162388).
- CVE-2019-18901: Fixed an unsafe path handling behavior in mysql-systemd-helper (bsc#1160895).
- CVE-2019-2737: Fixed an issue where could lead a remote attacker to cause denial of service 
- CVE-2019-2938: Fixed an issue where could lead a remote attacker to cause denial of service 
- CVE-2019-2740: Fixed an issue where could lead a local attacker to cause denial of service
- CVE-2019-2805: Fixed an issue where could lead a local attacker to cause denial of service
- CVE-2019-2974: Fixed an issue where could lead a remote attacker to cause denial of service
- CVE-2019-2758: Fixed an issue where could lead a local attacker to cause denial of service
  or data corruption
- CVE-2019-2739: Fixed an issue where could lead a local attacker to cause denial of service 
  or data corruption
- Enabled security hardenings in MariaDB's systemd service, namely ProtectSystem, ProtectHome and UMask (bsc#1160878).
- Fixed a potental symlink attack (bsc#1160912).
- Fixed a permissions issue in /var/lib/mysql (bsc#1077717).
- Used systemd-tmpfiles for a cleaner and safer creation of /run/mysql (bsc#1160883).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-31"/>
	<updated date="2020-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077717">SUSE bug 1077717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160878">SUSE bug 1160878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160883">SUSE bug 1160883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160912">SUSE bug 1160912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79721" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596282" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596283" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596284" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596285" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596286" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79722" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596287" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549127" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596288" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549129" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596289" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549131" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596290" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549133" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596291" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549135" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596292" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549138" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596293" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549140" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596294" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549143" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596295" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79723" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596296" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596297" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552051" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79724" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596298" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596299" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596300" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79725" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1167240" ref_url="https://bugzilla.suse.com/1167240" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006687.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-4_2 fixes the following issues:

- CVE-2020-5267: Fixed an XSS vulnerability in ActionView (bsc#1167240).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-08"/>
	<updated date="2020-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596301" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79726" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596302" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596303" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596304" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79727" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596305" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531809" comment="git-doc-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596306" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596307" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596308" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596309" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79728" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008609.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-09"/>
	<updated date="2021-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531815" comment="fwupdate-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531816" comment="fwupdate-efi-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531817" comment="libfwup0-0.5-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79729" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1159548" ref_url="https://bugzilla.suse.com/1159548" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008616.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

- CVE-2019-16782: Possible Information Leak / Session Hijack Vulnerability in Rack (bsc#1159548)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596310" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79730" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008658.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431)	  
- Fixed  an issue where xenstored was crashing with segfault (bsc#1182155).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531818" comment="xen-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531819" comment="xen-doc-html-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531820" comment="xen-libs-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531821" comment="xen-libs-32bit-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531822" comment="xen-tools-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531823" comment="xen-tools-domU-4.7.6_14-43.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79731" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-4_2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1185715" ref_url="https://bugzilla.suse.com/1185715" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008791.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-4_2 fixes the following issues:

- CVE-2021-22885: Fixed possible information disclosure / unintended method execution in Action Pack (bsc#1185715).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185715">SUSE bug 1185715</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596311" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79732" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79733" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596314" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596315" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552055" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79734" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596316" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596317" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596318" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596319" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79735" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008894.html" source="SUSE-SU"/>
		<description>
This update for python-httplib2 contains the following fixes:

Security fixes included in this update:
- CVE-2021-21240: Fixed a regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed an issue where an attacker could change request headers and body (bsc#1171998).

Non-security fixes included in this update:
- Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)

- update to 0.19.0:
  * auth: parse headers using pyparsing instead of regexp
  * auth: WSSE token needs to be string not bytes

- update to 0.18.1: (bsc#1171998, CVE-2020-11078)
  * explicit build-backend workaround for pip build isolation bug
  * IMPORTANT security vulnerability CWE-93 CRLF injection
  Force %xx quote of space, CR, LF characters in uri.
  * Ship test suite in source dist

- update to 0.17.3:
  * bugfixes

- Update to 0.17.1
  * python3: no_proxy was not checked with https
  * feature: Http().redirect_codes set, works after follow(_all)_redirects check
    This allows one line workaround for old gcloud library that uses 308
    response without redirect semantics.
  * IMPORTANT cache invalidation change, fix 307 keep method, add 308 Redirects
  * proxy: username/password as str compatible with pysocks
  * python2: regression in connect() error handling
  * add support for password protected certificate files
  * feature: Http.close() to clean persistent connections and sensitive data

- Update to 0.14.0:
  * Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError

- version update to 0.13.1
  0.13.1
   * Python3: Use no_proxy
     https://github.com/httplib2/httplib2/pull/140
  0.13.0
    * Allow setting TLS max/min versions
      https://github.com/httplib2/httplib2/pull/138
  0.12.3
    * No changes to library. Distribute py3 wheels.
  0.12.1
    * Catch socket timeouts and clear dead connection
      https://github.com/httplib2/httplib2/issues/18
      https://github.com/httplib2/httplib2/pull/111
    * Officially support Python 3.7 (package metadata)
      https://github.com/httplib2/httplib2/issues/123
  0.12.0
    * Drop support for Python 3.3
    * ca_certs from environment HTTPLIB2_CA_CERTS or certifi
      https://github.com/httplib2/httplib2/pull/117
    * PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes required
      https://github.com/httplib2/httplib2/pull/115
    * Revert http:443-&gt;https workaround
      https://github.com/httplib2/httplib2/issues/112
    * eliminate connection pool read race
      https://github.com/httplib2/httplib2/pull/110
    * cache: stronger safename
      https://github.com/httplib2/httplib2/pull/101
  0.11.3
    * No changes, just reupload of 0.11.2 after fixing automatic release conditions in Travis.
  0.11.2
    * proxy: py3 NameError basestring
      https://github.com/httplib2/httplib2/pull/100
  0.11.1
    * Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info
      https://github.com/httplib2/httplib2/pull/97
  0.11.0
    * Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5
      https://github.com/httplib2/httplib2/pull/91
    * python3 proxy support
      https://github.com/httplib2/httplib2/pull/90
    * If no_proxy environment value ends with comma then proxy is not used
      https://github.com/httplib2/httplib2/issues/11
    * fix UnicodeDecodeError using socks5 proxy
      https://github.com/httplib2/httplib2/pull/64
    * Respect NO_PROXY env var in proxy_info_from_url
      https://github.com/httplib2/httplib2/pull/58
    * NO_PROXY=bar was matching foobar (suffix without dot delimiter)
      New behavior matches curl/wget:
      - no_proxy=foo.bar will only skip proxy for exact hostname match
      - no_proxy=.wild.card will skip proxy for any.subdomains.wild.card
      https://github.com/httplib2/httplib2/issues/94
    * Bugfix for Content-Encoding: deflate
      https://stackoverflow.com/a/22311297
- deleted patches
    httplib2 started to use certifi and this is already bent to
    use system certificate bundle.

- handle the case when validation is disabled correctly.
  The 'check_hostname' context attribute has to be
  set first, othewise a 'ValueError: Cannot set
  verify_mode to CERT_NONE when check_hostname
  is enabled.' exception is raised.

- handle the case with ssl_version being None correctly

- Use  ssl.create_default_context in the python2 case so that
  the system wide certificates are loaded as trusted again.

- Source url must be https.

- Spec file cleanups

- Update to 0.10.3
  *  Fix certificate validation on Python&lt;=2.7.8 without ssl.CertificateError
- Update to 0.10.2
  * Just a reupload of 0.10.1, which was broken for Python3
    because wheel distribution doesn't play well with our 2/3 split code base.
- Update to 0.10.1
  * Remove VeriSign Class 3 CA from trusted certs
  * Add IdenTrust DST Root CA X3
  * Support for specifying the SSL protocol version (Python v2)
  * On App Engine use urlfetch's default deadline if None is passed.
  * Fix TypeError on AppEngine “__init__() got an unexpected keyword argument 'ssl_version’”
  * Send SNI data for SSL connections on Python 2.7.9+
  * Verify the server hostname if certificate validation is enabled
  * Add proxy_headers argument to ProxyInfo constructor
  * Make disable_ssl_certificate_validation work with Python 3.5.
  * Fix socket error handling
- Remove httplib2-bnc-818100.patch, merged upstream.

- Project moved from code.google.com to GitHub, fix the url
  accordingly

- attempt to build multi-python

- update and cleanup of httplib2-use-system-certs.patch,
  so that the passthrough is clean for python2 and so that it does
  the right thing in python3
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525303" comment="python-httplib2-0.19.0-7.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79736" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79737" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79738" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180834" ref_url="https://bugzilla.suse.com/1180834" source="BUGZILLA"/>
		<reference ref_id="1183105" ref_url="https://bugzilla.suse.com/1183105" source="BUGZILLA"/>
		<reference ref_id="1183107" ref_url="https://bugzilla.suse.com/1183107" source="BUGZILLA"/>
		<reference ref_id="1183108" ref_url="https://bugzilla.suse.com/1183108" source="BUGZILLA"/>
		<reference ref_id="1185785" ref_url="https://bugzilla.suse.com/1185785" source="BUGZILLA"/>
		<reference ref_id="1185786" ref_url="https://bugzilla.suse.com/1185786" source="BUGZILLA"/>
		<reference ref_id="1185803" ref_url="https://bugzilla.suse.com/1185803" source="BUGZILLA"/>
		<reference ref_id="1185804" ref_url="https://bugzilla.suse.com/1185804" source="BUGZILLA"/>
		<reference ref_id="1185805" ref_url="https://bugzilla.suse.com/1185805" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2021-25287" ref_url="https://www.suse.com/security/cve/CVE-2021-25287/" source="CVE"/>
		<reference ref_id="CVE-2021-25288" ref_url="https://www.suse.com/security/cve/CVE-2021-25288/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922/" source="CVE"/>
		<reference ref_id="CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923/" source="CVE"/>
		<reference ref_id="CVE-2021-28675" ref_url="https://www.suse.com/security/cve/CVE-2021-28675/" source="CVE"/>
		<reference ref_id="CVE-2021-28676" ref_url="https://www.suse.com/security/cve/CVE-2021-28676/" source="CVE"/>
		<reference ref_id="CVE-2021-28677" ref_url="https://www.suse.com/security/cve/CVE-2021-28677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-25290: Fixed a negative-offset memcpy with an invalid size in TiffDecode.c (bsc#1183105).
- CVE-2021-27922,CVE-2021-27923: Fixed improper reported size of a contained image (bsc#1183108,bsc#1183107)  
- CVE-2020-35653: Fixed buffer over-read in PcxDecode when decoding a crafted PCX file (bsc#1180834).
- CVE-2021-25287: Fixed out-of-bounds read in J2kDecode in j2ku_graya_la (bsc#1185805).
- CVE-2021-25288: Fixed out-of-bounds read in J2kDecode in j2ku_gray_i (bsc#1185803).
- CVE-2021-28675: Fixed DoS in PsdImagePlugin (bsc#1185804).
- CVE-2021-28677: Fixed DoS in the open phase via a malicious EPS file (bsc#1185785).
- CVE-2021-28676: Fixed infinite loop in FliDecode.c (bsc#1185786).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180834">SUSE bug 1180834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183105">SUSE bug 1183105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183107">SUSE bug 1183107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183108">SUSE bug 1183108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185785">SUSE bug 1185785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185786">SUSE bug 1185786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185803">SUSE bug 1185803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185804">SUSE bug 1185804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185805">SUSE bug 1185805</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2021-25287/">CVE-2021-25287</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25288/">CVE-2021-25288</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28675/">CVE-2021-28675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28676/">CVE-2021-28676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28677/">CVE-2021-28677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79739" version="1" class="patch">
	<metadata>
		<title>Security update for crowbar-openstack, grafana, kibana, monasca-installer, python-Django, python-py, rubygem-activerecord-session_store (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1044849" ref_url="https://bugzilla.suse.com/1044849" source="BUGZILLA"/>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1181379" ref_url="https://bugzilla.suse.com/1181379" source="BUGZILLA"/>
		<reference ref_id="1183803" ref_url="https://bugzilla.suse.com/1183803" source="BUGZILLA"/>
		<reference ref_id="1184148" ref_url="https://bugzilla.suse.com/1184148" source="BUGZILLA"/>
		<reference ref_id="1185623" ref_url="https://bugzilla.suse.com/1185623" source="BUGZILLA"/>
		<reference ref_id="1186608" ref_url="https://bugzilla.suse.com/1186608" source="BUGZILLA"/>
		<reference ref_id="1186611" ref_url="https://bugzilla.suse.com/1186611" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11481" ref_url="https://www.suse.com/security/cve/CVE-2017-11481/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2019-25025" ref_url="https://www.suse.com/security/cve/CVE-2019-25025/" source="CVE"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358/" source="CVE"/>
		<reference ref_id="CVE-2021-28658" ref_url="https://www.suse.com/security/cve/CVE-2021-28658/" source="CVE"/>
		<reference ref_id="CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542/" source="CVE"/>
		<reference ref_id="CVE-2021-3281" ref_url="https://www.suse.com/security/cve/CVE-2021-3281/" source="CVE"/>
		<reference ref_id="CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203/" source="CVE"/>
		<reference ref_id="CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<description>
This update for crowbar-openstack, grafana, kibana, monasca-installer, python-Django, python-py, rubygem-activerecord-session_store contains the following fixes:

Security fixes included in this update:


crowbar-openstack:
- CVE-2016-8611: Added rate limiting for the '/images' API POST method
(bsc#1005886).

grafana:
- CVE-2021-27358: Fixed a denial of service via remote API call
(bsc#1183803)

kibana:
- CVE-2017-11499: Fixed a vulnerability in nodejs, related to the
HashTable implementation, which could cause a denial of service
(bsc#1044849)
- CVE-2017-11481: Fixed a cross site scripting vulnerability via via URL
fields (bsc#1044849)

python-Django:
- CVE-2021-3281: Fixed a directory traversal via archive.extract()
(bsc#1181379)
- CVE-2021-28658: Fixed a directory traversal via uploaded files
(bsc#1184148)
- CVE-2021-31542: Fixed a directory traversal via uploaded files with
suitably crafted file names (bsc#1185623)
- CVE-2021-33203:Fixed potential path-traversal via admindocs'
TemplateDetailView (bsc#1186608)
- CVE-2021-33571: Tighten validator checks to not allow leading zeros in
IPv4 addresses, which potentially leads to further attacks (bsc#1186611)

python-py:
- CVE-2020-29651: Fixed a denial of service via regular expressions
(bsc#1179805)

rubygem-activerecord-session_store:
- CVE-2019-25025: Fixed a timing attacks targeting the session id which
could allow an attack to hijack sessions (bsc#1183174)


Non-security fixes included in this update:

Changes in crowbar-openstack:
- Update to version 4.0+git.1616146720.44daffca0:
  * monasca: restart Kibana on update (bsc#1044849)

Changes in grafana_Update:
- Add CVE-2021-27358.patch (bsc#1183803, CVE-2021-27358)
  * Prevent unauthenticated remote attackers from causing a DoS through the
    snapshots API.

Changes in kibana_Update:
- Ensure /etc/sysconfig/kibana is present

- Update to Kibana 4.6.6 (bsc#1044849, CVE-2017-11499, ESA-2017-14,
  ESA-2017-16)
  * [4.6] ignore forked code for babel transpile build phase (#13483)
  * Allow more than match queries in custom filters (#8614) (#10857)
  * [state] don't make extra $location.replace() calls (#9954)
  * [optimizer] move to querystring-browser package for up-to-date api
  * [state/unhashUrl] use encode-uri-query to generate cleanly encoded urls
  * server: refactor log_interceptor to be more DRY (#9617)
  * server: downgrade ECANCELED logs to debug (#9616)
  * server: do not treat logged warnings as errors (#8746) (#9610)
  * [server/logger] downgrade EPIPE errors to debug level (#9023)
  * Add basepath when redirecting from a trailling slash (#9035)
  * [es/kibanaIndex] use unmapped_type rather than ignore_unmapped (#8968)
  * [server/shortUrl] validate urls before shortening them
- Add CVE-2017-11481.patch (bsc#1044849, CVE-2017-11481)
  * This fixes an XSS vulnerability in URL fields
- Remove %dir declaration from /opt/kibana/optimize to ensure
  no files owned by root end up in there
- Exclude /opt/kibana/optimize from %fdupes
- Restart service on upgrade
- Do not copy LICENSE.txt and README.txt to /opt/kibana
- Fix rpmlint warnings/errors
- Switch to explicit patch application
- Fix source URL
- Fix logic for systemd/systemv detection

Changes in monasca-installer_Update:
- Add support-influxdb-1.2.patch (SOC-11435)

Changes in python-Django_Update:
- Fixed potential path-traversal via admindocs' TemplateDetailView.(bsc#1186608, CVE-2021-33203)
-  Prevented leading zeros in IPv4 addresses. (bsc#1186611, CVE-2021-33571)
- Add delegate-os-path-filename-generation-to-storage.patch (bsc#1185623)
    * Needed for CVE-2021-31542.patch to apply
- Tightened path &amp; file name sanitation in file uploads. (bsc#1185623, CVE-2021-31542)
- Fixed potential directory-traversal via uploaded files. (bsc#1184148, CVE-2021-28658)
- Fixes a potential directory traversal when extracting archives. (bsc#1181379, CVE-2021-3281)

Changes in python-py_Update:
- Add CVE-2020-29651.patch (CVE-2020-29651, bsc#1179805)
  * svnwc: fix regular expression vulnerable to DoS in blame functionality
- Ensure /usr/share/licenses exists

Changes in rubygem-activerecord-session_store_Update:
- added CVE-2019-25025.patch (CVE-2019-25025, bsc#1183174)
  * This requires CVE-2019-16782.patch to be included in
    rubygem-actionpack-4_2 to work correctly.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181379">SUSE bug 1181379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183803">SUSE bug 1183803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184148">SUSE bug 1184148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185623">SUSE bug 1185623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186608">SUSE bug 1186608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186611">SUSE bug 1186611</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11481/">CVE-2017-11481</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-25025/">CVE-2019-25025</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28658/">CVE-2021-28658</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3281/">CVE-2021-3281</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79740" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79741" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyJWT (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1186173" ref_url="https://bugzilla.suse.com/1186173" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009037.html" source="SUSE-SU"/>
		<description>
This update for python-PyJWT fixes the following issues:

python-JWT was updated to 1.5.3. (bsc#1186173)

update to version 1.5.3:

  * Changed

    + Increase required version of the cryptography package to
      &gt;=1.4.0.

  * Fixed

    + Remove uses of deprecated functions from the cryptography
      package.
    + Warn about missing algorithms param to decode() only when verify
      param is True #281


update to version 1.5.2:

- Ensure correct arguments order in decode super call [7c1e61d][7c1e61d]
- Change optparse for argparse. [#238][238]
- Guard against PKCS1 PEM encododed public keys [#277][277]
- Add deprecation warning when decoding without specifying `algorithms` [#277][277]
- Improve deprecation messages [#270][270]
- PyJWT.decode: move verify param into options [#271][271]
- Support for Python 3.6 [#262][262]
- Expose jwt.InvalidAlgorithmError [#264][264]
- Add support for ECDSA public keys in RFC 4253 (OpenSSH) format [#244][244]
- Renamed commandline script `jwt` to `jwt-cli` to avoid issues with the script clobbering the `jwt` module in some circumstances. [#187][187]
- Better error messages when using an algorithm that requires the cryptography package, but it isn't available [#230][230]
- Tokens with future 'iat' values are no longer rejected [#190][190]
- Non-numeric 'iat' values now raise InvalidIssuedAtError instead of DecodeError
- Remove rejection of future 'iat' claims [#252][252]
- Add back 'ES512' for backward compatibility (for now) [#225][225]
- Fix incorrectly named ECDSA algorithm [#219][219]
- Fix rpm build [#196][196]
- Add JWK support for HMAC and RSA keys [#202][202]

		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186173">SUSE bug 1186173</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525305" comment="python-PyJWT-1.5.3-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79742" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-nokogiri (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1146578" ref_url="https://bugzilla.suse.com/1146578" source="BUGZILLA"/>
		<reference ref_id="1180507" ref_url="https://bugzilla.suse.com/1180507" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008244.html" source="SUSE-SU"/>
		<description>
This update for rubygem-nokogiri fixes the following issues:

- CVE-2019-5477: Fixed a command injection vulnerability (bsc#1146578).
- CVE-2020-26247: Fixed an XXE vulnerability in Nokogiri::XML::Schema (bsc#1180507).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-25"/>
	<updated date="2021-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596336" comment="ruby2.1-rubygem-nokogiri-1.6.1-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79743" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596337" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596338" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79744" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596339" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596340" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596341" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596342" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79745" version="1" class="patch">
	<metadata>
		<title>Security update for python-py (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1184505" ref_url="https://bugzilla.suse.com/1184505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009113.html" source="SUSE-SU"/>
		<description>
This update for python-py fixes the following issues:

- CVE-2020-29651: Fixed regular expression denial of service in svnwc.py (bsc#1179805, bsc#1184505).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184505">SUSE bug 1184505</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009560169" comment="python-py-1.8.1-11.12.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79746" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009114.html" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

- CVE-2020-13757: Proper handling of leading '\0' bytes during decryption of ciphertext (bsc#1172389)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-02"/>
	<updated date="2021-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525304" comment="python-rsa-3.1.4-12.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79747" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-27"/>
	<updated date="2021-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596343" comment="sudo-1.8.10p3-10.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79748" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596344" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596345" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596346" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79749" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1188574" ref_url="https://bugzilla.suse.com/1188574" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009243.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-34552: Fixed a buffer overflow in Convert.c (bsc#1188574)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188574">SUSE bug 1188574</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627134" comment="python-Pillow-2.8.1-4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79750" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1174514" ref_url="https://bugzilla.suse.com/1174514" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<description>

This update for python-PyYAML fixes the following issues:

- Update to 5.3.1.

- CVE-2020-14343: A vulnerability was discovered in the PyYAML library,
  where it was susceptible to arbitrary code execution when it processes
  untrusted YAML files through the full_load method or with the FullLoader
  loader. Applications that use the library to process untrusted input
  may be vulnerable to this flaw. This flaw allows an attacker to
  execute arbitrary code on the system by abusing the python/object/new
  constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628227" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79751" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008269.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.5.11 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
- datapath: Clear the L4 portion of the key for 'later' fragments
- datapath: Properly set L4 keys on 'later' IP fragments
- ofproto-dpif: Fix using uninitialised memory in user_action_cookie.
- stream-ssl: Fix crash on NULL private key and valid certificate.
- datapath: fix flow actions reallocation
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-03"/>
	<updated date="2021-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596347" comment="openvswitch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596348" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79752" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79753" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596351" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596352" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596353" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596354" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596355" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79754" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596356" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596357" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596358" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596359" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596360" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596361" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596362" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596363" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596364" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596365" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79755" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1070943" ref_url="https://bugzilla.suse.com/1070943" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could eventually have allowed attackers to cause a denial of service (memory consumption) (bnc#1157298 ).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79756" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008322.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596370" comment="openvswitch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596371" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79757" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596372" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79758" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008330.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2020-26116: Raise ValueError if method contains control characters and thus prevent CRLF injection into URLs (bsc#1177211).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596373" comment="python-urllib3-1.16-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79759" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596374" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79760" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596375" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79761" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596376" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596377" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596378" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552112" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596379" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79762" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596380" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596381" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596382" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79763" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596383" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596384" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79764" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596385" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596386" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596387" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596388" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79765" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008372.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Improve the speed of the 'urlize' filter by reducing regex
    backtracking. Email matching requires a word character at the start of the
    domain part, and only word characters in the TLD. (bsc#1181944)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530079" comment="python-Jinja2-2.8-22.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79766" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596389" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596390" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79767" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79768" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596391" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596392" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596393" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79769" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596394" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596395" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79770" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

grub2 was bumped to version 2.02, same as SUSE Linux Enterprise 12 SP3.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79771" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79772" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bug was fixed:

- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596402" comment="kernel-default-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596403" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596404" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596405" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79773" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596406" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79774" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596407" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596408" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596409" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596410" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596411" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596412" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596413" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596414" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596415" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79775" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596416" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596417" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596418" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596419" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596420" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596421" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596422" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596423" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596424" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596425" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79776" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596426" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596427" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596428" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79777" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596429" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596430" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596431" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596432" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596433" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596434" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79778" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79779" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- Fixed a potential crash on exit as a result of the fix of CVE-2021-3156 [bsc#1181090]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596435" comment="sudo-1.8.10p3-10.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79780" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596436" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79781" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596437" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79782" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596438" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596439" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596440" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596441" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79783" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE OpenStack Cloud 7</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009596442" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596443" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009596444" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79784" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007829" ref_url="https://bugzilla.suse.com/1007829" source="BUGZILLA"/>
		<reference ref_id="965748" ref_url="https://bugzilla.suse.com/965748" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00005.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- A defect in BIND's handling of responses containing a DNAME answer had
the potential to trigger assertion errors in the server remotely,
thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829).

- Fix BIND to return a valid hostname in response to ldapdump queries.
(bsc#965748)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-02"/>
	<updated date="2016-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965748">SUSE bug 965748</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549156" comment="bind-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549157" comment="bind-chrootenv-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532008" comment="bind-doc-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549158" comment="bind-libs-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547150" comment="bind-libs-32bit-9.9.9P1-49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549159" comment="bind-utils-9.9.9P1-49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79785" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005084" ref_url="https://bugzilla.suse.com/1005084" source="BUGZILLA"/>
		<reference ref_id="1005090" ref_url="https://bugzilla.suse.com/1005090" source="BUGZILLA"/>
		<reference ref_id="1005242" ref_url="https://bugzilla.suse.com/1005242" source="BUGZILLA"/>
		<reference ref_id="1006591" ref_url="https://bugzilla.suse.com/1006591" source="BUGZILLA"/>
		<reference ref_id="1006593" ref_url="https://bugzilla.suse.com/1006593" source="BUGZILLA"/>
		<reference ref_id="1006597" ref_url="https://bugzilla.suse.com/1006597" source="BUGZILLA"/>
		<reference ref_id="1006598" ref_url="https://bugzilla.suse.com/1006598" source="BUGZILLA"/>
		<reference ref_id="1006599" ref_url="https://bugzilla.suse.com/1006599" source="BUGZILLA"/>
		<reference ref_id="1006836" ref_url="https://bugzilla.suse.com/1006836" source="BUGZILLA"/>
		<reference ref_id="1006839" ref_url="https://bugzilla.suse.com/1006839" source="BUGZILLA"/>
		<reference ref_id="1007009" ref_url="https://bugzilla.suse.com/1007009" source="BUGZILLA"/>
		<reference ref_id="392410" ref_url="https://bugzilla.suse.com/392410" source="BUGZILLA"/>
		<reference ref_id="941919" ref_url="https://bugzilla.suse.com/941919" source="BUGZILLA"/>
		<reference ref_id="942553" ref_url="https://bugzilla.suse.com/942553" source="BUGZILLA"/>
		<reference ref_id="961886" ref_url="https://bugzilla.suse.com/961886" source="BUGZILLA"/>
		<reference ref_id="963983" ref_url="https://bugzilla.suse.com/963983" source="BUGZILLA"/>
		<reference ref_id="968373" ref_url="https://bugzilla.suse.com/968373" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<description>

This update for jasper to version 1.900.14 fixes several issues.

These security issues were fixed:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693 Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373) 
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553).
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)
- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887) (bsc#1006839)

For additional change description please have a look at the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-10"/>
	<updated date="2016-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79786" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1006592" ref_url="https://bugzilla.suse.com/1006592" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002404.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following issues:

- bsc#1006592: Fix a regression introduced in CVE-2013-5653 by which ps files couldn't be
  opened in okular/evince (kde#371887).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-16"/>
	<updated date="2016-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006592">SUSE bug 1006592</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549161" comment="ghostscript-9.15-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549162" comment="ghostscript-x11-9.15-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79787" version="1" class="patch">
	<metadata>
		<title>Security update for X Window System client libraries (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="1002995" ref_url="https://bugzilla.suse.com/1002995" source="BUGZILLA"/>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="1003000" ref_url="https://bugzilla.suse.com/1003000" source="BUGZILLA"/>
		<reference ref_id="1003002" ref_url="https://bugzilla.suse.com/1003002" source="BUGZILLA"/>
		<reference ref_id="1003012" ref_url="https://bugzilla.suse.com/1003012" source="BUGZILLA"/>
		<reference ref_id="1003017" ref_url="https://bugzilla.suse.com/1003017" source="BUGZILLA"/>
		<reference ref_id="1003023" ref_url="https://bugzilla.suse.com/1003023" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944/" source="CVE"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<reference ref_id="CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949/" source="CVE"/>
		<reference ref_id="CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950/" source="CVE"/>
		<reference ref_id="CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951/" source="CVE"/>
		<reference ref_id="CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952/" source="CVE"/>
		<reference ref_id="CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<description>

This update for the X Window System client libraries fixes a class of privilege escalation issues.

A malicious X Server could send specially crafted data to X clients, which allowed for triggering
crashes, or privilege escalation if this relationship was untrusted or crossed user or permission
level boundaries.

libX11, libXfixes, libXi, libXrandr, libXrender, libXtst, libXv, libXvMC were fixed, specifically:

libX11:
- CVE-2016-7942: insufficient validation of data from the X server allowed out of boundary memory
  read (bsc#1002991)

libXfixes:
- CVE-2016-7944: insufficient validation of data from the X server can cause an integer overflow
  on 32 bit architectures (bsc#1002995)

libXi:
- CVE-2016-7945, CVE-2016-7946: insufficient validation of data from the X server can cause out of
  boundary memory access or endless loops (Denial of Service) (bsc#1002998)

libXtst:
- CVE-2016-7951, CVE-2016-7952: insufficient validation of data from the X server can cause out of
  boundary memory access or endless loops (Denial of Service) (bsc#1003012)

libXv:
- CVE-2016-5407: insufficient validation of data from the X server can cause out of boundary memory
  and memory corruption (bsc#1003017)

libXvMC:
- CVE-2016-7953: insufficient validation of data from the X server can cause a one byte buffer read
  underrun (bsc#1003023)

libXrender:
- CVE-2016-7949, CVE-2016-7950: insufficient validation of data from the X server can cause out of
  boundary memory writes (bsc#1003002)

libXrandr:
- CVE-2016-7947, CVE-2016-7948: insufficient validation of data from the X server can cause out of
  boundary memory writes (bsc#1003000)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-17"/>
	<updated date="2016-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79788" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="951166" ref_url="https://bugzilla.suse.com/951166" source="BUGZILLA"/>
		<reference ref_id="983582" ref_url="https://bugzilla.suse.com/983582" source="BUGZILLA"/>
		<reference ref_id="984751" ref_url="https://bugzilla.suse.com/984751" source="BUGZILLA"/>
		<reference ref_id="985177" ref_url="https://bugzilla.suse.com/985177" source="BUGZILLA"/>
		<reference ref_id="985348" ref_url="https://bugzilla.suse.com/985348" source="BUGZILLA"/>
		<reference ref_id="989523" ref_url="https://bugzilla.suse.com/989523" source="BUGZILLA"/>
		<reference ref_id="991069" ref_url="https://bugzilla.suse.com/991069" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<description>

This update provides Python 3.4.5, which brings many fixes and enhancements.

The following security issues have been fixed:

- CVE-2016-1000110: CGIHandler could have allowed setting of HTTP_PROXY environment
  variable based on user supplied Proxy request header. (bsc#989523)
- CVE-2016-0772: A vulnerability in smtplib could have allowed a MITM attacker to
  perform a startTLS stripping attack. (bsc#984751)
- CVE-2016-5636: A heap overflow in Python's zipimport module. (bsc#985177)
- CVE-2016-5699: A header injection flaw in urrlib2/urllib/httplib/http.client.
  (bsc#985348)

The update also includes the following non-security fixes:

- Don't force 3rd party C extensions to be built with -Werror=declaration-after-statement.
  (bsc#951166)
- Make urllib proxy var handling behave as usual on POSIX. (bsc#983582)

For a comprehensive list of changes please refer to the upstream change log:
https://docs.python.org/3.4/whatsnew/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-18"/>
	<updated date="2016-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951166">SUSE bug 951166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983582">SUSE bug 983582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991069">SUSE bug 991069</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549178" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549179" comment="python3-3.4.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549180" comment="python3-base-3.4.5-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549181" comment="python3-curses-3.4.5-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79789" version="1" class="patch">
	<metadata>
		<title>Security update for libtcnative-1-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1004455" ref_url="https://bugzilla.suse.com/1004455" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:2871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002409.html" source="SUSE-SU"/>
		<description>

This update for libtcnative-1-0 fixes the following issues:

- Upgrade to libtcnative-1.1.34 (bugfix release) (bsc#1004455)
  See https://tomcat.apache.org/native-1.1-doc/miscellaneous/changelog.html
  * Unconditionally disable export Ciphers.
  * Improve ephemeral key handling for DH and ECDH. Parameter strength is by default derived from the
    certificate key strength.
  * APIs SSL.generateRSATempKey() and SSL.loadDSATempKey() are no longer supported.
  * Various bugfixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-22"/>
	<updated date="2016-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004455">SUSE bug 1004455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549182" comment="libtcnative-1-0-1.1.34-12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79790" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000345" ref_url="https://bugzilla.suse.com/1000345" source="BUGZILLA"/>
		<reference ref_id="1000346" ref_url="https://bugzilla.suse.com/1000346" source="BUGZILLA"/>
		<reference ref_id="1001151" ref_url="https://bugzilla.suse.com/1001151" source="BUGZILLA"/>
		<reference ref_id="1002116" ref_url="https://bugzilla.suse.com/1002116" source="BUGZILLA"/>
		<reference ref_id="1002549" ref_url="https://bugzilla.suse.com/1002549" source="BUGZILLA"/>
		<reference ref_id="1002550" ref_url="https://bugzilla.suse.com/1002550" source="BUGZILLA"/>
		<reference ref_id="1002557" ref_url="https://bugzilla.suse.com/1002557" source="BUGZILLA"/>
		<reference ref_id="1003612" ref_url="https://bugzilla.suse.com/1003612" source="BUGZILLA"/>
		<reference ref_id="1003613" ref_url="https://bugzilla.suse.com/1003613" source="BUGZILLA"/>
		<reference ref_id="1003878" ref_url="https://bugzilla.suse.com/1003878" source="BUGZILLA"/>
		<reference ref_id="1003893" ref_url="https://bugzilla.suse.com/1003893" source="BUGZILLA"/>
		<reference ref_id="1003894" ref_url="https://bugzilla.suse.com/1003894" source="BUGZILLA"/>
		<reference ref_id="1004702" ref_url="https://bugzilla.suse.com/1004702" source="BUGZILLA"/>
		<reference ref_id="1004706" ref_url="https://bugzilla.suse.com/1004706" source="BUGZILLA"/>
		<reference ref_id="1004707" ref_url="https://bugzilla.suse.com/1004707" source="BUGZILLA"/>
		<reference ref_id="1005353" ref_url="https://bugzilla.suse.com/1005353" source="BUGZILLA"/>
		<reference ref_id="1005374" ref_url="https://bugzilla.suse.com/1005374" source="BUGZILLA"/>
		<reference ref_id="1006536" ref_url="https://bugzilla.suse.com/1006536" source="BUGZILLA"/>
		<reference ref_id="1006538" ref_url="https://bugzilla.suse.com/1006538" source="BUGZILLA"/>
		<reference ref_id="1007263" ref_url="https://bugzilla.suse.com/1007263" source="BUGZILLA"/>
		<reference ref_id="1007391" ref_url="https://bugzilla.suse.com/1007391" source="BUGZILLA"/>
		<reference ref_id="1007493" ref_url="https://bugzilla.suse.com/1007493" source="BUGZILLA"/>
		<reference ref_id="1007494" ref_url="https://bugzilla.suse.com/1007494" source="BUGZILLA"/>
		<reference ref_id="1007495" ref_url="https://bugzilla.suse.com/1007495" source="BUGZILLA"/>
		<reference ref_id="1007769" ref_url="https://bugzilla.suse.com/1007769" source="BUGZILLA"/>
		<reference ref_id="1008148" ref_url="https://bugzilla.suse.com/1008148" source="BUGZILLA"/>
		<reference ref_id="998516" ref_url="https://bugzilla.suse.com/998516" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<description>
This update for qemu to version 2.6.2 fixes the several issues.

These security issues were fixed:
- CVE-2016-7161: Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allowed attackers to execute arbitrary code on the QEMU host via a large ethlite packet (bsc#1001151).
- CVE-2016-7170: OOB stack memory access when processing svga command (bsc#998516).
- CVE-2016-7466: xhci memory leakage during device unplug (bsc#1000345).
- CVE-2016-7422: NULL pointer dereference in virtqueu_map_desc (bsc#1000346).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1002550).
- CVE-2016-7995: Memory leak in ehci_process_itd (bsc#1003612).
- CVE-2016-8576: The xhci_ring_fetch function in hw/usb/hcd-xhci.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process (bsc#1003878).
- CVE-2016-8578: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation (bsc#1003894).
- CVE-2016-9105: Memory leakage in v9fs_link (bsc#1007494).
- CVE-2016-8577: Memory leak in the v9fs_read function in hw/9pfs/9p.c allowed local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation (bsc#1003893).
- CVE-2016-9106: Memory leakage in v9fs_write (bsc#1007495).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1004707).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002557).
- CVE-2016-9101: eepro100 memory leakage whern unplugging a device (bsc#1007391).
- CVE-2016-8668: The rocker_io_writel function in hw/net/rocker/rocker.c allowed local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size (bsc#1004706).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1006538).
- CVE-2016-8909: The intel_hda_xfer function in hw/audio/intel-hda.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position (bsc#1006536).
- CVE-2016-7994: Memory leak in virtio_gpu_resource_create_2d (bsc#1003613).
- CVE-2016-9104: Integer overflow leading to OOB access in 9pfs (bsc#1007493).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1004702).
- CVE-2016-7907: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1002549).

These non-security issues were fixed:
- Change kvm-supported.txt to be per-architecture documentation, stored in the
  package documentation directory of each per-arch package (bsc#1005353).
- Update support doc to include current ARM64 (AArch64) support stance (bsc#1005374).
- Fix migration failure when snapshot also has been done (bsc#1008148).
- Change package post script udevadm trigger calls to be device specific (bsc#1002116).
- Add qmp-commands.txt documentation file back in. It was inadvertently dropped.
- Add an x86 cpu option (l3-cache) to specify that an L3 cache is present and
  another option (cpuid-0xb) to enable the cpuid 0xb leaf (bsc#1007769).

For Leap 42.2 this update also enabled the smartcard support (bsc#1007263).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-22"/>
	<updated date="2016-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000345">SUSE bug 1000345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000346">SUSE bug 1000346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002116">SUSE bug 1002116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002549">SUSE bug 1002549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003612">SUSE bug 1003612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003613">SUSE bug 1003613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004706">SUSE bug 1004706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005353">SUSE bug 1005353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005374">SUSE bug 1005374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007263">SUSE bug 1007263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007769">SUSE bug 1007769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008148">SUSE bug 1008148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79791" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005522" ref_url="https://bugzilla.suse.com/1005522" source="BUGZILLA"/>
		<reference ref_id="1005523" ref_url="https://bugzilla.suse.com/1005523" source="BUGZILLA"/>
		<reference ref_id="1005524" ref_url="https://bugzilla.suse.com/1005524" source="BUGZILLA"/>
		<reference ref_id="1005525" ref_url="https://bugzilla.suse.com/1005525" source="BUGZILLA"/>
		<reference ref_id="1005526" ref_url="https://bugzilla.suse.com/1005526" source="BUGZILLA"/>
		<reference ref_id="1005527" ref_url="https://bugzilla.suse.com/1005527" source="BUGZILLA"/>
		<reference ref_id="1005528" ref_url="https://bugzilla.suse.com/1005528" source="BUGZILLA"/>
		<reference ref_id="988651" ref_url="https://bugzilla.suse.com/988651" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<description>

OpenJDK Java was updated to jdk8u111 (icedtea 3.2.0) to fix the following issues:

* Security fixes
    + S8146490: Direct indirect CRL checks
    + S8151921: Improved page resolution
    + S8155968: Update command line options
    + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
    + S8156794: Extend data sharing
    + S8157176: Improved classfile parsing
    + S8157739, CVE-2016-5554: Classloader Consistency Checking
      (bsc#1005523)
    + S8157749: Improve handling of DNS error replies
    + S8157753: Audio replay enhancement
    + S8157759: LCMS Transform Sampling Enhancement
    + S8157764: Better handling of interpolation plugins
    + S8158302: Handle contextual glyph substitutions
    + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
    + S8159495: Fix index offsets
    + S8159503: Amend Annotation Actions
    + S8159511: Stack map validation
    + S8159515: Improve indy validation
    + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
    + S8160090: Better signature handling in pack200
    + S8160094: Improve pack200 layout
    + S8160098: Clean up color profiles
    + S8160591, CVE-2016-5582: Improve internal array handling
      (bsc#1005527)
    + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
    + PR3206, RH1367357: lcms2: Out-of-bounds read in
      Type_MLU_Read()
    + CVE-2016-5556 (bsc#1005524)
* New features
    + PR1370: Provide option to build without debugging
    + PR1375: Provide option to strip and link debugging info after
      build
    + PR1537: Handle alternative Kerberos credential cache
      locations
    + PR1978: Allow use of system PCSC
    + PR2445: Support system libsctp
    + PR3182: Support building without pre-compiled headers
    + PR3183: Support Fedora/RHEL system crypto policy
    + PR3221: Use pkgconfig to detect Kerberos CFLAGS and libraries
* Import of OpenJDK 8 u102 build 14
    + S4515292: ReferenceType.isStatic() returns true for arrays
    + S4858370: JDWP: Memory Leak: GlobalRefs never deleted when
      processing invokeMethod command
    + S6976636: JVM/TI test ex03t001 fails assertion
    + S7185591: jcmd-big-script.sh ERROR: could not find app's Java
      pid.
    + S8017462: G1: guarantee fails with
      UseDynamicNumberOfGCThreads
    + S8034168: ThreadMXBean/Locks.java failed, blocked on wrong
      object
    + S8036006: [TESTBUG] sun/tools/native2ascii/NativeErrors.java
      fails: Process exit code was 0, but error was expected.
    + S8041781: Need new regression tests for PBE keys
    + S8041787: Need new regressions tests for buffer handling for
      PBE algorithms
    + S8043836: Need new tests for AES cipher
    + S8044199: Tests for RSA keys and key specifications
    + S8044772: TempDirTest.java still times out with -Xcomp
    + S8046339: sun.rmi.transport.DGCAckHandler leaks memory
    + S8047031: Add SocketPermission tests for legacy socket types
    + S8048052: Permission tests for setFactory
    + S8048138: Tests for JAAS callbacks
    + S8048147: Privilege tests with JAAS Subject.doAs
    + S8048356: SecureRandom default provider tests
    + S8048357: PKCS basic tests
    + S8048360: Test signed jar files
    + S8048362: Tests for doPrivileged with accomplice
    + S8048596: Tests for AEAD ciphers
    + S8048599: Tests for key wrap and unwrap operations
    + S8048603: Additional tests for MAC algorithms
    + S8048604: Tests for strong crypto ciphers
    + S8048607: Test key generation of DES and DESEDE
    + S8048610: Implement regression test for bug fix of 4686632
      in JCE
    + S8048617: Tests for PKCS12 read operations
    + S8048618: Tests for PKCS12 write operations.
    + S8048619: Implement tests for converting PKCS12 keystores
    + S8048624: Tests for SealedObject
    + S8048819: Implement reliability test for DH algorithm
    + S8048820: Implement tests for SecretKeyFactory
    + S8048830: Implement tests for new functionality provided in
      JEP 166
    + S8049237: Need new tests for X509V3 certificates
    + S8049321: Support SHA256WithDSA in JSSE
    + S8049429: Tests for java client server communications with
      various TLS/SSL combinations.
    + S8049432: New tests for TLS property jdk.tls.client.protocols
    + S8049814: Additional SASL client-server tests
    + S8050281: New permission tests for JEP 140
    + S8050370: Need new regressions tests for messageDigest with
      DigestIOStream
    + S8050371: More MessageDigest tests
    + S8050374: More Signature tests
    + S8050427: LoginContext tests to cover JDK-4703361
    + S8050460: JAAS login/logout tests with LoginContext
    + S8050461: Tests for syntax checking of JAAS configuration
      file
    + S8054278: Refactor jps utility tests
    + S8055530: assert(_exits.control()-&gt;is_top() ||
      !_gvn.type(ret_phi)-&gt;empty()) failed: return value must be
      well defined
    + S8055844: [TESTBUG]
      test/runtime/NMT/VirtualAllocCommitUncommitRecommit.java
      fails on Solaris Sparc due to incorrect page size being used
    + S8059677: Thread.getName() instantiates Strings
    + S8061464: A typo in CipherTestUtils test
    + S8062536: [TESTBUG] Conflicting GC combinations in jdk tests
    + S8065076: java/net/SocketPermission/SocketPermissionTest.java
      fails intermittently
    + S8065078: NetworkInterface.getNetworkInterfaces() triggers
      intermittent test failures
    + S8066871: java.lang.VerifyError: Bad local variable type -
      local final String
    + S8068427: Hashtable deserialization reconstitutes table with
      wrong capacity
    + S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs
      to be updated for JDK-8061210
    + S8069253: javax/net/ssl/TLS/TestJSSE.java failed on Mac
    + S8071125: Improve exception messages in URLPermission
    + S8072081: Supplementary characters are rejected in comments
    + S8072463: Remove requirement that AKID and SKID have to match
      when building certificate chain
    + S8072725: Provide more granular levels for GC verification
    + S8073400: Some Monospaced logical fonts have a different
      width
    + S8073872: Schemagen fails with StackOverflowError if element
      references containing class
    + S8074931: Additional tests for CertPath API
    + S8075286: Additional tests for signature algorithm OIDs and
      transformation string
    + S8076486: [TESTBUG]
      javax/security/auth/Subject/doAs/NestedActions.java fails if
      extra VM options are given
    + S8076545: Text size is twice bigger under Windows L&amp;F on Win
      8.1 with HiDPI display
    + S8076995: gc/ergonomics/TestDynamicNumberOfGCThreads.java
      failed with java.lang.RuntimeException: 'new_active_workers'
      missing from stdout/stderr
    + S8079138: Additional negative tests for XML signature
      processing
    + S8081512: Remove sun.invoke.anon classes, or move / co-locate
      them with tests
    + S8081771: ProcessTool.createJavaProcessBuilder() needs new
      addTestVmAndJavaOptions argument
    + S8129419: heapDumper.cpp: assert(length_in_bytes &gt; 0) failed:
      nothing to copy
    + S8130150: Implement BigInteger.montgomeryMultiply intrinsic
    + S8130242: DataFlavorComparator transitivity exception
    + S8130304: Inference: NodeNotFoundException thrown with deep
      generic method call chain
    + S8130425: libjvm crash due to stack overflow in executables
      with 32k tbss/tdata
    + S8133023: ParallelGCThreads is not calculated correctly
    + S8134111: Unmarshaller unmarshalls XML element which doesn't
      have the expected namespace
    + S8135259: InetAddress.getAllByName only reports 'unknown
      error' instead of actual cause
    + S8136506: Include sun.arch.data.model as a property that can
      be queried by jtreg
    + S8137068: Tests added in JDK-8048604 fail to compile
    + S8139040: Fix initializations before ShouldNotReachHere()
      etc. and enable -Wuninitialized on linux.
    + S8139581: AWT components are not drawn after removal and
      addition to a container
    + S8141243: Unexpected timezone returned after parsing a date
    + S8141420: Compiler runtime entries don't hold Klass* from
      being GCed
    + S8141445: Use of Solaris/SPARC M7 libadimalloc.so can
      generate unknown signal in hs_err file
    + S8141551: C2 can not handle returns with inccompatible
      interface arrays
    + S8143377: Test PKCS8Test.java fails
    + S8143647: Javac compiles method reference that allows results
      in an IllegalAccessError
    + S8144144: ORB destroy() leaks filedescriptors after
      unsuccessful connection
    + S8144593: Suppress not recognized property/feature warning
      messages from SAXParser
    + S8144957: Remove PICL warning message
    + S8145039: JAXB marshaller fails with ClassCastException on
      classes generated by xjc
    + S8145228: Java Access Bridge,
      getAccessibleStatesStringFromContext doesn't wrap the call to
      getAccessibleRole
    + S8145388: URLConnection.guessContentTypeFromStream returns
      image/jpg for some JPEG images
    + S8145974: XMLStreamWriter produces invalid XML for surrogate
      pairs on OutputStreamWriter
    + S8146035: Windows - With LCD antialiasing, some glyphs are
      not rendered correctly
    + S8146192: Add test for JDK-8049321
    + S8146274: Thread spinning on WeakHashMap.getEntry() with
      concurrent use of nashorn
    + S8147468: Allow users to bound the size of buffers cached in
      the per-thread buffer caches
    + S8147645: get_ctrl_no_update() code is wrong
    + S8147807: crash in libkcms.so on linux-sparc
    + S8148379: jdk.nashorn.api.scripting spec. adjustments,
      clarifications
    + S8148627: RestrictTestMaxCachedBufferSize.java to 64-bit
      platforms
    + S8148820: Missing @since Javadoc tag in Logger.log(Level,
      Supplier)
    + S8148926: Call site profiling fails on braces-wrapped
      anonymous function
    + S8149017: Delayed provider selection broken in RSA client key
      exchange
    + S8149029: Secure validation of XML based digital signature
      always enabled when checking wrapping attacks
    + S8149330: Capacity of StringBuilder should not get close to
      Integer.MAX_VALUE unless necessary
    + S8149334: JSON.parse(JSON.stringify([])).push(10) creates an
      array containing two elements
    + S8149368: [hidpi] JLabel font is twice bigger than JTextArea
      font on Windows 7,HiDPI, Windows L&amp;F
    + S8149411: PKCS12KeyStore cannot extract AES Secret Keys
    + S8149417: Use final restricted flag
    + S8149450: LdapCtx.processReturnCode() throwing Null Pointer
      Exception
    + S8149453: [hidpi] JFileChooser does not scale properly on
      Windows with HiDPI display and Windows L&amp;F
    + S8149543: range check CastII nodes should not be split
      through Phi
    + S8149743: JVM crash after debugger hotswap with lambdas
    + S8149744: fix testng.jar delivery in Nashorn build.xml
    + S8149915: enabling validate-annotations feature for xsd
      schema with annotation causes NPE
    + S8150002: Check for the validity of oop before printing it in
      verify_remembered_set
    + S8150470: JCK: api/xsl/conf/copy/copy19 test failure
    + S8150518: G1 GC crashes at
      G1CollectedHeap::do_collection_pause_at_safepoint(double)
    + S8150533: Test
      java/util/logging/LogManagerAppContextDeadlock.java times out
      intermittently.
    + S8150704: XALAN: ERROR: 'No more DTM IDs are available' when
      transforming with lots of temporary result trees
    + S8150780: Repeated offer and remove on ConcurrentLinkedQueue
      lead to an OutOfMemoryError
    + S8151064: com/sun/jdi/RedefineAddPrivateMethod.sh fails
      intermittently
    + S8151197: [TEST_BUG] Need to backport fix for
      test/javax/net/ssl/TLS/TestJSSE.java
    + S8151352: jdk/test/sample fails with 'effective library path
      is outside the test suite'
    + S8151431: DateFormatSymbols triggers this.clone() in the
      constructor
    + S8151535: TESTBUG: java/lang/invoke/AccessControlTest.java
      should be modified to run with JTREG 4.1 b13
    + S8151731: Add new jtreg keywords to jdk 8
    + S8151998: VS2010 ThemeReader.cpp(758) : error C3861: 'round':
      identifier not found
    + S8152927: Incorrect GPL header in StubFactoryDynamicBase.java
      reported
    + S8153252: SA: Hotspot build on Windows fails if make/closed
      folder does not exist
    + S8153531: Improve exception messaging for RSAClientKeyExchange
    + S8153641: assert(thread_state == _thread_in_native) failed:
      Assumed thread_in_native while heap dump
    + S8153673: [BACKOUT] JDWP: Memory Leak: GlobalRefs never
      deleted when processing invokeMethod command
    + S8154304: NullpointerException at
      LdapReferralException.getReferralContext
    + S8154722: Test gc/ergonomics/TestDynamicNumberOfGCThreads.java
      fails
    + S8157078: 8u102 L10n resource file updates
    + S8157838: Personalized Windows Font Size is not taken into
      account in Java8u102
* Import of OpenJDK 8 u111 build 14
    + S6882559: new JEditorPane('text/plain','') fails for null
      context class loader
    + S8049171: Additional tests for jarsigner's warnings
    + S8063086: Math.pow yields different results upon repeated
      calls
    + S8140530: Creating a VolatileImage with size 0,0 results in
      no longer working g2d.drawString
    + S8142926: OutputAnalyzer's shouldXXX() calls return this
    + S8147077: IllegalArgumentException thrown by
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
    + S8148127: IllegalArgumentException thrown by JCK test
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
      in opengl pipeline
    + S8150611: Security problem on sun.misc.resources.Messages*
    + S8153399: Constrain AppCDS behavior (back port)
    + S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
    + S8158734: JEditorPane.createEditorKitForContentType throws
      NPE after 6882559
    + S8158994: Service Menu services
    + S8159684: (tz) Support tzdata2016f
    + S8160904: Typo in code from 8079718 fix :
      enableCustomValueHanlde
    + S8160934: isnan() is not available on older MSVC compilers
    + S8161141: correct bugId for JDK-8158994 fix push
    + S8162411: Service Menu services 2
    + S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh
      failing after JDK-8155968
    + S8162511: 8u111 L10n resource file updates
    + S8162792: Remove constraint DSA keySize &lt; 1024 from
      jdk.jar.disabledAlgorithms in jdk8
    + S8164452: 8u111 L10n resource file update - msgdrop 20
    + S8165816: jarsigner -verify shows jar unsigned if it was
      signed with a weak algorithm
    + S8166381: Back out changes to the java.security file to not
      disable MD5
* Backports
    + S8078628, PR3208: Zero build fails with pre-compiled headers
      disabled
    + S8141491, PR3159, G592292: Unaligned memory access in Bits.c
    + S8157306, PR3121: Random infrequent null pointer exceptions
      in javac (enabled on AArch64 only)
    + S8162384, PR3122: Performance regression: bimorphic inlining
      may be bypassed by type speculation
* Bug fixes
    + PR3123: Some object files built without -fPIC on x86 only
    + PR3126: pax-mark-vm script calls 'exit -1' which is invalid
      in dash
    + PR3127, G590348: Only apply PaX markings by default on
      running PaX kernels
    + PR3199: Invalid nashorn URL
    + PR3201: Update infinality configure test
    + PR3218: PR3159 leads to build failure on clean tree
* AArch64 port
    + S8131779, PR3220: AARCH64: add Montgomery multiply intrinsic
    + S8167200, PR3220: AArch64: Broken stack pointer adjustment in
      interpreter
    + S8167421, PR3220: AArch64: in one core system, fatal error:
      Illegal threadstate encountered
    + S8167595, PR3220: AArch64: SEGV in stub code
      cipherBlockChaining_decryptAESCrypt
    + S8168888, PR3220: Port 8160591: Improve internal array
      handling to AArch64.
* Shenandoah
    + PR3224: Shenandoah broken when building without pre-compiled
      headers
- Build against system kerberos 
- Build against system pcsc and sctp 
- S8158260, PR2991, RH1341258: PPC64: unaligned Unsafe.getInt can
      lead to the generation of illegal instructions (bsc#988651)		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988651">SUSE bug 988651</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79792" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007501" ref_url="https://bugzilla.suse.com/1007501" source="BUGZILLA"/>
		<reference ref_id="1007766" ref_url="https://bugzilla.suse.com/1007766" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

- fix two security vulnerabilities that allowed users to bypass
  sudo's NOEXEC functionality:
  * noexec bypass via system() and popen() [CVE-2016-7032, bsc#1007766]
  * noexec bypass via wordexp() [CVE-2016-7076, bsc#1007501]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-23"/>
	<updated date="2016-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549197" comment="sudo-1.8.10p3-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79793" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007188" ref_url="https://bugzilla.suse.com/1007188" source="BUGZILLA"/>
		<reference ref_id="913058" ref_url="https://bugzilla.suse.com/913058" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002417.html" source="SUSE-SU"/>
		<description>

This update for tar fixes the following issues:

- Fix the POINTYFEATHER vulnerability - GNU tar archiver can be tricked into extracting
  files and directories in the given destination, regardless of the
  path name(s) specified on the command line [bsc#1007188]
  [CVE-2016-6321]
- Fix Amanda integration issue (bsc#913058)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-24"/>
	<updated date="2016-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913058">SUSE bug 913058</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549198" comment="tar-1.27.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516651" comment="tar-lang-1.27.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79794" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005070" ref_url="https://bugzilla.suse.com/1005070" source="BUGZILLA"/>
		<reference ref_id="1005072" ref_url="https://bugzilla.suse.com/1005072" source="BUGZILLA"/>
		<reference ref_id="1005076" ref_url="https://bugzilla.suse.com/1005076" source="BUGZILLA"/>
		<reference ref_id="986566" ref_url="https://bugzilla.suse.com/986566" source="BUGZILLA"/>
		<reference ref_id="989980" ref_url="https://bugzilla.suse.com/989980" source="BUGZILLA"/>
		<reference ref_id="998677" ref_url="https://bugzilla.suse.com/998677" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<description>

This update for libarchive fixes several issues.

These security issues were fixed:

- CVE-2016-8687: Buffer overflow when printing a filename (bsc#1005070).
- CVE-2016-8689: Heap overflow when reading corrupted 7Zip files (bsc#1005072).
- CVE-2016-8688: Use after free because of incorrect calculation in next_line (bsc#1005076).
- CVE-2016-5844: Integer overflow in the ISO parser in libarchive allowed remote attackers to cause a denial of service (application crash) via a crafted ISO file (bsc#986566).
- CVE-2016-6250: Integer overflow in the ISO9660 writer in libarchive allowed remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow (bsc#989980).
- CVE-2016-5418: The sandboxing code in libarchive mishandled hardlink archive entries of non-zero data size, which might allowed remote attackers to write to arbitrary files via a crafted archive file (bsc#998677).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005072">SUSE bug 1005072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005076">SUSE bug 1005076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986566">SUSE bug 986566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989980">SUSE bug 989980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998677">SUSE bug 998677</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79795" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1003952" ref_url="https://bugzilla.suse.com/1003952" source="BUGZILLA"/>
		<reference ref_id="984639" ref_url="https://bugzilla.suse.com/984639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4983" ref_url="https://www.suse.com/security/cve/CVE-2016-4983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002423.html" source="SUSE-SU"/>
		<description>

This update for dovecot22 fixes the following issues:

  - insecure SSL/TLS key and certificate file creation (CVE-2016-4983) (bnc #984639)
  - Fix LDAP based authentication for some setups (boo #1003952)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-25"/>
	<updated date="2016-11-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1003952">SUSE bug 1003952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984639">SUSE bug 984639</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4983/">CVE-2016-4983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549200" comment="dovecot22-2.2.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549201" comment="dovecot22-backend-mysql-2.2.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549202" comment="dovecot22-backend-pgsql-2.2.13-4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549203" comment="dovecot22-backend-sqlite-2.2.13-4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79796" version="1" class="patch">
	<metadata>
		<title>Recommended update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1001367" ref_url="https://bugzilla.suse.com/1001367" source="BUGZILLA"/>
		<reference ref_id="1003800" ref_url="https://bugzilla.suse.com/1003800" source="BUGZILLA"/>
		<reference ref_id="1004477" ref_url="https://bugzilla.suse.com/1004477" source="BUGZILLA"/>
		<reference ref_id="1005555" ref_url="https://bugzilla.suse.com/1005555" source="BUGZILLA"/>
		<reference ref_id="1005558" ref_url="https://bugzilla.suse.com/1005558" source="BUGZILLA"/>
		<reference ref_id="1005562" ref_url="https://bugzilla.suse.com/1005562" source="BUGZILLA"/>
		<reference ref_id="1005564" ref_url="https://bugzilla.suse.com/1005564" source="BUGZILLA"/>
		<reference ref_id="1005566" ref_url="https://bugzilla.suse.com/1005566" source="BUGZILLA"/>
		<reference ref_id="1005569" ref_url="https://bugzilla.suse.com/1005569" source="BUGZILLA"/>
		<reference ref_id="1005581" ref_url="https://bugzilla.suse.com/1005581" source="BUGZILLA"/>
		<reference ref_id="1005582" ref_url="https://bugzilla.suse.com/1005582" source="BUGZILLA"/>
		<reference ref_id="1006539" ref_url="https://bugzilla.suse.com/1006539" source="BUGZILLA"/>
		<reference ref_id="1008318" ref_url="https://bugzilla.suse.com/1008318" source="BUGZILLA"/>
		<reference ref_id="990890" ref_url="https://bugzilla.suse.com/990890" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<description>

This mariadb update to version 10.0.28 fixes the following issues (bsc#1008318):

Security fixes:
- CVE-2016-8283: Unspecified vulnerability in subcomponent Types (bsc#1005582)
- CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581)
- CVE-2016-5629: Unspecified vulnerability in subcomponent Federated (bsc#1005569)
- CVE-2016-5626: Unspecified vulnerability in subcomponent GIS (bsc#1005566)
- CVE-2016-5624: Unspecified vulnerability in subcomponent DML (bsc#1005564)
- CVE-2016-5616: Unspecified vulnerability in subcomponent MyISAM (bsc#1005562)
- CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558)
- CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer (bsc#1005555)
- CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367)

Bugfixes:
- mysql_install_db can't find data files (bsc#1006539)
- mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800)
- Remove useless mysql@default.service (bsc#1004477)
- Replace all occurrences of the string '@sysconfdir@' with '/etc' as it wasn't expanded properly (bsc#990890)
- Notable changes:
  * XtraDB updated to 5.6.33-79.0
  * TokuDB updated to 5.6.33-79.0
  * Innodb updated to 5.6.33
  * Performance Schema updated to 5.6.33
- Release notes and upstream changelog:
  * https://kb.askmonty.org/en/mariadb-10028-release-notes
  * https://kb.askmonty.org/en/mariadb-10028-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-28"/>
	<updated date="2016-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003800">SUSE bug 1003800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004477">SUSE bug 1004477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005562">SUSE bug 1005562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006539">SUSE bug 1006539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990890">SUSE bug 990890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79797" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1010685" ref_url="https://bugzilla.suse.com/1010685" source="BUGZILLA"/>
		<reference ref_id="988903" ref_url="https://bugzilla.suse.com/988903" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00046.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following security issues:

- Fixed CVE-2016-1248 an arbitrary command execution vulnerability
  (bsc#1010685)

This update for vim fixes the following issues:

- Fix build with Python 3.5. (bsc#988903)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-29"/>
	<updated date="2016-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988903">SUSE bug 988903</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549209" comment="gvim-7.4.326-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549210" comment="vim-7.4.326-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516672" comment="vim-data-7.4.326-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79798" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1001066" ref_url="https://bugzilla.suse.com/1001066" source="BUGZILLA"/>
		<reference ref_id="1007245" ref_url="https://bugzilla.suse.com/1007245" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823/" source="CVE"/>
		<reference ref_id="CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

- Memory allocation failure in AcquireMagickMemory (CVE-2016-8862) [bsc#1007245]
- update incomplete patch of CVE-2016-6823 [bsc#1001066]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549211" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549212" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79799" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005522" ref_url="https://bugzilla.suse.com/1005522" source="BUGZILLA"/>
		<reference ref_id="1005523" ref_url="https://bugzilla.suse.com/1005523" source="BUGZILLA"/>
		<reference ref_id="1005524" ref_url="https://bugzilla.suse.com/1005524" source="BUGZILLA"/>
		<reference ref_id="1005525" ref_url="https://bugzilla.suse.com/1005525" source="BUGZILLA"/>
		<reference ref_id="1005526" ref_url="https://bugzilla.suse.com/1005526" source="BUGZILLA"/>
		<reference ref_id="1005527" ref_url="https://bugzilla.suse.com/1005527" source="BUGZILLA"/>
		<reference ref_id="1005528" ref_url="https://bugzilla.suse.com/1005528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.8 - OpenJDK 7u121
  * Security fixes
    + S8151921: Improved page resolution
    + S8155968: Update command line options
    + S8155973, CVE-2016-5542: Tighten jar checks (bsc#1005522)
    + S8157176: Improved classfile parsing
    + S8157739, CVE-2016-5554: Classloader Consistency Checking
      (bsc#1005523)
    + S8157749: Improve handling of DNS error replies
    + S8157753: Audio replay enhancement
    + S8157759: LCMS Transform Sampling Enhancement
    + S8157764: Better handling of interpolation plugins
    + S8158302: Handle contextual glyph substitutions
    + S8158993, CVE-2016-5568: Service Menu services (bsc#1005525)
    + S8159495: Fix index offsets
    + S8159503: Amend Annotation Actions
    + S8159511: Stack map validation
    + S8159515: Improve indy validation
    + S8159519, CVE-2016-5573: Reformat JDWP messages (bsc#1005526)
    + S8160090: Better signature handling in pack200
    + S8160094: Improve pack200 layout
    + S8160098: Clean up color profiles
    + S8160591, CVE-2016-5582: Improve internal array handling
      (bsc#1005527)
    + S8160838, CVE-2016-5597: Better HTTP service (bsc#1005528)
    + PR3207, RH1367357: lcms2: Out-of-bounds read in
      Type_MLU_Read()
    + CVE-2016-5556 (bsc#1005524)
  * Import of OpenJDK 7 u121 build 0
    + S6624200: Regression test fails:
      test/closed/javax/swing/JMenuItem/4654927/bug4654927.java
    + S6882559: new JEditorPane('text/plain','') fails for null
      context class loader
    + S7090158: Networking Libraries don't build with javac -Werror
    + S7125055: ContentHandler.getContent API changed in error
    + S7145960: sun/security/mscapi/ShortRSAKey1024.sh failing on
      windows
    + S7187051: ShortRSAKeynnn.sh tests should do cleanup before
      start test
    + S8000626: Implement dead key detection for KeyEvent on Linux
    + S8003890: corelibs test scripts should pass TESTVMOPTS
    + S8005629: javac warnings compiling
      java.awt.EventDispatchThread and sun.awt.X11.XIconWindow
    + S8010297: Missing isLoggable() checks in logging code
    + S8010782: clean up source files containing carriage return
      characters
    + S8014431: cleanup warnings indicated by the -Wunused-value
      compiler option on linux
    + S8015265: revise the fix for 8007037
    + S8016747: Replace deprecated PlatformLogger isLoggable(int)
      with isLoggable(Level)
    + S8020708: NLS mnemonics missing in SwingSet2/JInternalFrame
      demo
    + S8024756: method grouping tabs are not selectable
    + S8026741: jdk8 l10n resource file translation update 5
    + S8048147: Privilege tests with JAAS Subject.doAs
    + S8048357: PKCS basic tests
    + S8049171: Additional tests for jarsigner's warnings
    + S8059177: jdk8u40 l10n resource file translation update 1
    + S8075584: test for 8067364 depends on hardwired text advance
    + S8076486: [TESTBUG]
      javax/security/auth/Subject/doAs/NestedActions.java fails if
      extra VM options are given
    + S8077953: [TEST_BUG]
      com/sun/management/OperatingSystemMXBean/TestTotalSwap.java
      Compilation failed after JDK-8077387
    + S8080628: No mnemonics on Open and Save buttons in
      JFileChooser
    + S8083601: jdk8u60 l10n resource file translation update 2
    + S8140530: Creating a VolatileImage with size 0,0 results in
      no longer working g2d.drawString
    + S8142926: OutputAnalyzer's shouldXXX() calls return this
    + S8143134: L10n resource file translation update
    + S8147077: IllegalArgumentException thrown by
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General
    + S8148127: IllegalArgumentException thrown by JCK test
      api/java_awt/Component/FlipBufferStrategy/indexTGF_General in
      opengl pipeline
    + S8150611: Security problem on sun.misc.resources.Messages*
    + S8157653: [Parfait] Uninitialised variable in awt_Font.cpp
    + S8158734: JEditorPane.createEditorKitForContentType throws
      NPE after 6882559
    + S8159684: (tz) Support tzdata2016f
    + S8160934: isnan() is not available on older MSVC compilers
    + S8162411: Service Menu services 2
    + S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh
      failing after JDK-8155968
    + S8162511: 8u111 L10n resource file updates
    + S8162792: Remove constraint DSA keySize &lt; 1024 from
      jdk.jar.disabledAlgorithms in jdk8
    + S8164452: 8u111 L10n resource file update - msgdrop 20
    + S8165816: jarsigner -verify shows jar unsigned if it was
      signed with a weak algorithm
    + S8166381: Back out changes to the java.security file to not
      disable MD5
  * Backports
    + S6604109, PR3162: 
      javax.print.PrintServiceLookup.lookupPrintServices fails
      SOMETIMES for Cups
    + S6907252, PR3162: ZipFileInputStream Not Thread-Safe
    + S8024046, PR3162: Test sun/security/krb5/runNameEquals.sh
      failed on 7u45 Embedded linux-ppc*
    + S8028479, PR3162: runNameEquals still cannot precisely detect
      if a usable native krb5 is available
    + S8034057, PR3162: Files.getFileStore and Files.isWritable do
      not work with SUBST'ed drives (win)
    + S8038491, PR3162: Improve synchronization in ZipFile.read()
    + S8038502, PR3162: Deflater.needsInput() should use
      synchronization
    + S8059411, PR3162: RowSetWarning does not correctly chain
      warnings
    + S8062198, PR3162: Add RowSetMetaDataImpl Tests and add column
      range validation to isdefinitlyWritable
    + S8066188, PR3162: BaseRowSet returns the wrong default value
      for escape processing
    + S8072466, PR3162: Deadlock when initializing MulticastSocket
      and DatagramSocket
    + S8075118, PR3162: JVM stuck in infinite loop during
      verification
    + S8076579, PR3162: Popping a stack frame after exception
      breakpoint sets last method param to exception
    + S8078495, PR3162: End time checking for native TGT is wrong
    + S8078668, PR3162: jar usage string mentions unsupported
      option '-n'
    + S8080115, PR3162: (fs) Crash in libgio when calling
      Files.probeContentType(path) from parallel threads
    + S8081794, PR3162: ParsePosition getErrorIndex returns 0 for
      TimeZone parsing problem
    + S8129957, PR3162: Deadlock in JNDI LDAP implementation when
      closing the LDAP context
    + S8130136, PR3162: Swing window sometimes fails to repaint
      partially when it becomes exposed
    + S8130274, PR3162: java/nio/file/FileStore/Basic.java fails
      when two successive stores in an iteration are determined to
      be equal
    + S8132551, PR3162: Initialize local variables before returning
      them in p11_convert.c
    + S8133207, PR3162: [TEST_BUG] ParallelProbes.java test fails
      after changes for JDK-8080115
    + S8133666, PR3162: OperatingSystemMXBean reports abnormally
      high machine CPU consumption on Linux
    + S8135002, PR3162: Fix or remove broken links in
      objectMonitor.cpp comments
    + S8137121, PR3162: (fc) Infinite loop FileChannel.truncate
    + S8137230, PR3162: TEST_BUG:
      java/nio/channels/FileChannel/LoopingTruncate.java timed out
    + S8139373, PR3162: [TEST_BUG]
      java/net/MulticastSocket/MultiDead.java failed with timeout
    + S8140249, PR3162: JVM Crashing During startUp If Flight
      Recording is enabled
    + S8141491, PR3160, G592292: Unaligned memory access in Bits.c
    + S8144483, PR3162: One long Safepoint pause directly after
      each GC log rotation
    + S8149611, PR3160, G592292: Add tests for
      Unsafe.copySwapMemory
  * Bug fixes
    + S8078628, PR3151: Zero build fails with pre-compiled headers
      disabled
    + PR3128: pax-mark-vm script calls 'exit -1' which is invalid
      in dash
    + PR3131: PaX marking fails on filesystems which don't support
      extended attributes
    + PR3135: Makefile.am rule
      stamps/add/tzdata-support-debug.stamp has a typo in
      add-tzdata dependency
    + PR3141: Pass $(CC) and $(CXX) to OpenJDK build
    + PR3166: invalid zip timestamp handling leads to error
      building bootstrap-javac
    + PR3202: Update infinality configure test
    + PR3212: Disable ARM32 JIT by default
  * CACAO
    + PR3136: CACAO is broken due to 2 new native methods in
      sun.misc.Unsafe (from S8158260)
* JamVM
    + PR3134: JamVM is broken due to 2 new native methods in
      sun.misc.Unsafe (from S8158260)
* AArch64 port
    + S8167200, PR3204: AArch64: Broken stack pointer adjustment
      in interpreter
    + S8168888: Port 8160591: Improve internal array handling to
      AArch64.
    + PR3211: AArch64 build fails with pre-compiled headers
      disabled
- Changed patch:
  * java-1_7_0-openjdk-gcc6.patch
    + Rediff to changed context

- Disable arm32 JIT, since its build broken
  (http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=2942)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79800" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="947494" ref_url="https://bugzilla.suse.com/947494" source="BUGZILLA"/>
		<reference ref_id="966891" ref_url="https://bugzilla.suse.com/966891" source="BUGZILLA"/>
		<reference ref_id="982331" ref_url="https://bugzilla.suse.com/982331" source="BUGZILLA"/>
		<reference ref_id="987176" ref_url="https://bugzilla.suse.com/987176" source="BUGZILLA"/>
		<reference ref_id="988361" ref_url="https://bugzilla.suse.com/988361" source="BUGZILLA"/>
		<reference ref_id="990531" ref_url="https://bugzilla.suse.com/990531" source="BUGZILLA"/>
		<reference ref_id="994399" ref_url="https://bugzilla.suse.com/994399" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002432.html" source="SUSE-SU"/>
		<description>

This update for util-linux fixes the following issues:

- Consider redundant slashes when comparing paths (bsc#982331,
  util-linux-libmount-ignore-redundant-slashes.patch, affects
  backport of util-linux-libmount-cifs-is_mounted.patch).

- Use upstream compatibility patches for --show-pt-geometry with
  obsolescence and deprecation warning (bsc#990531)

- Replace cifs mount detection patch with upstream one that covers
  all cases (bsc#987176).

- Reuse existing loop device to prevent possible data corruption
  when multiple -o loop are used to mount a single file
  (bsc#947494)

- Safe loop re-use in libmount, mount and losetup (bsc#947494)

- UPSTREAM DIVERGENCE!!!
  losetup -L continues to use SLE12 SP1 and SP2 specific meaning
  --logical-blocksize instead of upstream --nooverlap (bsc#966891).

- Make release-dependent conflict with old sysvinit-tools SLE
  specific, as it is required only for SLE 11 upgrade,
  and breaks openSUSE staging builds (bsc#994399).

- Extended partition loop in MBR partition table leads to DoS
  (bsc#988361, CVE-2016-5011)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-11-30"/>
	<updated date="2016-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947494">SUSE bug 947494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966891">SUSE bug 966891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982331">SUSE bug 982331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987176">SUSE bug 987176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990531">SUSE bug 990531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994399">SUSE bug 994399</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549217" comment="libblkid1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549218" comment="libblkid1-32bit-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549219" comment="libfdisk1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549220" comment="libmount1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549221" comment="libmount1-32bit-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549222" comment="libsmartcols1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549223" comment="libuuid1-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549224" comment="libuuid1-32bit-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549225" comment="python-libmount-2.28-42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549226" comment="util-linux-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517525" comment="util-linux-lang-2.28-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549227" comment="util-linux-systemd-2.28-42.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549228" comment="uuidd-2.28-42.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79801" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="933288" ref_url="https://bugzilla.suse.com/933288" source="BUGZILLA"/>
		<reference ref_id="933878" ref_url="https://bugzilla.suse.com/933878" source="BUGZILLA"/>
		<reference ref_id="936227" ref_url="https://bugzilla.suse.com/936227" source="BUGZILLA"/>
		<reference ref_id="942865" ref_url="https://bugzilla.suse.com/942865" source="BUGZILLA"/>
		<reference ref_id="957566" ref_url="https://bugzilla.suse.com/957566" source="BUGZILLA"/>
		<reference ref_id="957567" ref_url="https://bugzilla.suse.com/957567" source="BUGZILLA"/>
		<reference ref_id="957598" ref_url="https://bugzilla.suse.com/957598" source="BUGZILLA"/>
		<reference ref_id="957600" ref_url="https://bugzilla.suse.com/957600" source="BUGZILLA"/>
		<reference ref_id="960837" ref_url="https://bugzilla.suse.com/960837" source="BUGZILLA"/>
		<reference ref_id="971741" ref_url="https://bugzilla.suse.com/971741" source="BUGZILLA"/>
		<reference ref_id="972127" ref_url="https://bugzilla.suse.com/972127" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381/" source="CVE"/>
		<reference ref_id="CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382/" source="CVE"/>
		<reference ref_id="CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383/" source="CVE"/>
		<reference ref_id="CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389/" source="CVE"/>
		<reference ref_id="CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392/" source="CVE"/>
		<reference ref_id="CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393/" source="CVE"/>
		<reference ref_id="CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394/" source="CVE"/>
		<reference ref_id="CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<description>

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:

- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues 
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-02"/>
	<updated date="2016-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942865">SUSE bug 942865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972127">SUSE bug 972127</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549229" comment="libpcre1-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547214" comment="libpcre1-32bit-8.39-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549230" comment="libpcre16-0-8.39-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79802" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002991" ref_url="https://bugzilla.suse.com/1002991" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002441.html" source="SUSE-SU"/>
		<description>

libX11 was updated to fix a memory leak that was introduced with the
security fix for CVE-2016-7942.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-05"/>
	<updated date="2016-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549231" comment="libX11-6-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547226" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009516697" comment="libX11-data-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549232" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547228" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79803" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009026" ref_url="https://bugzilla.suse.com/1009026" source="BUGZILLA"/>
		<reference ref_id="1010395" ref_url="https://bugzilla.suse.com/1010395" source="BUGZILLA"/>
		<reference ref_id="1010401" ref_url="https://bugzilla.suse.com/1010401" source="BUGZILLA"/>
		<reference ref_id="1010402" ref_url="https://bugzilla.suse.com/1010402" source="BUGZILLA"/>
		<reference ref_id="1010404" ref_url="https://bugzilla.suse.com/1010404" source="BUGZILLA"/>
		<reference ref_id="1010410" ref_url="https://bugzilla.suse.com/1010410" source="BUGZILLA"/>
		<reference ref_id="1010422" ref_url="https://bugzilla.suse.com/1010422" source="BUGZILLA"/>
		<reference ref_id="1010427" ref_url="https://bugzilla.suse.com/1010427" source="BUGZILLA"/>
		<reference ref_id="1010517" ref_url="https://bugzilla.suse.com/1010517" source="BUGZILLA"/>
		<reference ref_id="992549" ref_url="https://bugzilla.suse.com/992549" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5 (bsc#1009026):

- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)  

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)

The Mozilla Firefox changelog was amended to document patched dropped in a previous update.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-05"/>
	<updated date="2016-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992549">SUSE bug 992549</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79804" version="1" class="patch">
	<metadata>
		<title>Security update for libXi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002998" ref_url="https://bugzilla.suse.com/1002998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945/" source="CVE"/>
		<reference ref_id="CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<description>

libXi was updated to fix two security issues.

These security issues were fixed:
- CVE-2016-7945: Integer overflows in libXI can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998).
- CVE-2016-7946: Insufficient validation of data in libXI can cause out of boundary memory access or endless loops (Denial of Service) (bsc#1002998).
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549243" comment="libXi6-1.7.4-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547236" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79805" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-3.60 (bsc#1009280) Fixing the following CVE's:
  CVE-2016-5568, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597, CVE-2016-5554,
  CVE-2016-5542

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79806" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012964" ref_url="https://bugzilla.suse.com/1012964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00024.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes security issues.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bbsc#1012964):

- CVE-2016-9079: Use-after-free in SVG Animation could be used for code execution (MFSA 2016-92 bsc#1012964)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549244" comment="MozillaFirefox-45.5.1esr-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549245" comment="MozillaFirefox-translations-45.5.1esr-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79807" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1008831" ref_url="https://bugzilla.suse.com/1008831" source="BUGZILLA"/>
		<reference ref_id="1011685" ref_url="https://bugzilla.suse.com/1011685" source="BUGZILLA"/>
		<reference ref_id="1012754" ref_url="https://bugzilla.suse.com/1012754" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical security fixes.

The following security bugs were fixed:

- CVE-2016-8655: A race condition in the af_packet packet_set_ring
  function could be used by local attackers to crash the kernel or gain
  privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in
  the Linux kernel did not validate the relationship between the minimum
  fragment length and the maximum packet size, which allowed local users to
  gain privileges or cause a denial of service (heap-based buffer overflow)
  by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
  the Linux kernel lacks chunk-length checking for the first chunk, which
  allowed remote attackers to cause a denial of service (out-of-bounds slab
  access) or possibly have unspecified other impact via crafted SCTP data
  (bnc#1011685).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-07"/>
	<updated date="2016-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549246" comment="kernel-default-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549247" comment="kernel-default-base-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549248" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549249" comment="kernel-default-man-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549250" comment="kernel-syms-4.4.21-84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79808" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1011283" ref_url="https://bugzilla.suse.com/1011283" source="BUGZILLA"/>
		<reference ref_id="1011284" ref_url="https://bugzilla.suse.com/1011284" source="BUGZILLA"/>
		<reference ref_id="1011285" ref_url="https://bugzilla.suse.com/1011285" source="BUGZILLA"/>
		<reference ref_id="1011286" ref_url="https://bugzilla.suse.com/1011286" source="BUGZILLA"/>
		<reference ref_id="1011287" ref_url="https://bugzilla.suse.com/1011287" source="BUGZILLA"/>
		<reference ref_id="1011288" ref_url="https://bugzilla.suse.com/1011288" source="BUGZILLA"/>
		<reference ref_id="1011289" ref_url="https://bugzilla.suse.com/1011289" source="BUGZILLA"/>
		<reference ref_id="1011290" ref_url="https://bugzilla.suse.com/1011290" source="BUGZILLA"/>
		<reference ref_id="1011291" ref_url="https://bugzilla.suse.com/1011291" source="BUGZILLA"/>
		<reference ref_id="1011292" ref_url="https://bugzilla.suse.com/1011292" source="BUGZILLA"/>
		<reference ref_id="1011293" ref_url="https://bugzilla.suse.com/1011293" source="BUGZILLA"/>
		<reference ref_id="1012021" ref_url="https://bugzilla.suse.com/1012021" source="BUGZILLA"/>
		<reference ref_id="1012022" ref_url="https://bugzilla.suse.com/1012022" source="BUGZILLA"/>
		<reference ref_id="1012023" ref_url="https://bugzilla.suse.com/1012023" source="BUGZILLA"/>
		<reference ref_id="1012024" ref_url="https://bugzilla.suse.com/1012024" source="BUGZILLA"/>
		<reference ref_id="1012025" ref_url="https://bugzilla.suse.com/1012025" source="BUGZILLA"/>
		<reference ref_id="1012026" ref_url="https://bugzilla.suse.com/1012026" source="BUGZILLA"/>
		<reference ref_id="1012027" ref_url="https://bugzilla.suse.com/1012027" source="BUGZILLA"/>
		<reference ref_id="1012028" ref_url="https://bugzilla.suse.com/1012028" source="BUGZILLA"/>
		<reference ref_id="1012029" ref_url="https://bugzilla.suse.com/1012029" source="BUGZILLA"/>
		<reference ref_id="1012030" ref_url="https://bugzilla.suse.com/1012030" source="BUGZILLA"/>
		<reference ref_id="1012031" ref_url="https://bugzilla.suse.com/1012031" source="BUGZILLA"/>
		<reference ref_id="1012032" ref_url="https://bugzilla.suse.com/1012032" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<description>

This update for w3m fixes the following issues:

- update to debian git version (bsc#1011293)
  addressed security issues:
         CVE-2016-9622: w3m: null deref (bsc#1012021)
         CVE-2016-9623: w3m: null deref (bsc#1012022)
         CVE-2016-9624: w3m: near-null deref (bsc#1012023)
         CVE-2016-9625: w3m: stack overflow (bsc#1012024)
         CVE-2016-9626: w3m: stack overflow (bsc#1012025)
         CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026)
         CVE-2016-9628: w3m: null deref (bsc#1012027)
         CVE-2016-9629: w3m: null deref (bsc#1012028)
         CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029)
         CVE-2016-9631: w3m: null deref (bsc#1012030)
         CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031)
         CVE-2016-9633: w3m: OOM (bsc#1012032)
         CVE-2016-9434: w3m: null deref (bsc#1011283)
         CVE-2016-9435: w3m: use uninit value (bsc#1011284)
         CVE-2016-9436: w3m: use uninit value (bsc#1011285)
         CVE-2016-9437: w3m: write to rodata (bsc#1011286)
         CVE-2016-9438: w3m: null deref (bsc#1011287)
         CVE-2016-9439: w3m: stack overflow (bsc#1011288)
         CVE-2016-9440: w3m: near-null deref (bsc#1011289)
         CVE-2016-9441: w3m: near-null deref (bsc#1011290)
         CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291)
         CVE-2016-9443: w3m: null deref (bsc#1011292)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79809" version="1" class="patch">
	<metadata>
		<title>Security update for gc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1011276" ref_url="https://bugzilla.suse.com/1011276" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002457.html" source="SUSE-SU"/>
		<description>

This update for gc fixes the following issues:

- integer overflow in GC_MALLOC_ATOMIC() (CVE-2016-9427, bsc#1011276)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-08"/>
	<updated date="2016-12-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011276">SUSE bug 1011276</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549252" comment="libgc1-7.2d-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79810" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000106" ref_url="https://bugzilla.suse.com/1000106" source="BUGZILLA"/>
		<reference ref_id="1003030" ref_url="https://bugzilla.suse.com/1003030" source="BUGZILLA"/>
		<reference ref_id="1003032" ref_url="https://bugzilla.suse.com/1003032" source="BUGZILLA"/>
		<reference ref_id="1004981" ref_url="https://bugzilla.suse.com/1004981" source="BUGZILLA"/>
		<reference ref_id="1005004" ref_url="https://bugzilla.suse.com/1005004" source="BUGZILLA"/>
		<reference ref_id="1005005" ref_url="https://bugzilla.suse.com/1005005" source="BUGZILLA"/>
		<reference ref_id="1007157" ref_url="https://bugzilla.suse.com/1007157" source="BUGZILLA"/>
		<reference ref_id="1007941" ref_url="https://bugzilla.suse.com/1007941" source="BUGZILLA"/>
		<reference ref_id="1009100" ref_url="https://bugzilla.suse.com/1009100" source="BUGZILLA"/>
		<reference ref_id="1009103" ref_url="https://bugzilla.suse.com/1009103" source="BUGZILLA"/>
		<reference ref_id="1009104" ref_url="https://bugzilla.suse.com/1009104" source="BUGZILLA"/>
		<reference ref_id="1009105" ref_url="https://bugzilla.suse.com/1009105" source="BUGZILLA"/>
		<reference ref_id="1009107" ref_url="https://bugzilla.suse.com/1009107" source="BUGZILLA"/>
		<reference ref_id="1009108" ref_url="https://bugzilla.suse.com/1009108" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1009111" ref_url="https://bugzilla.suse.com/1009111" source="BUGZILLA"/>
		<reference ref_id="1011652" ref_url="https://bugzilla.suse.com/1011652" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<description>

xen was updated to version 4.7.1 to fix 17 security issues.

These security issues were fixed:

- CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652).
- CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100).
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103).
- CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104).
- CVE-2016-9384: Guest 32-bit ELF symbol table load leaking host data to unprivileged guest users (bsc#1009105).
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107).
- CVE-2016-9377: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108).
- CVE-2016-9378: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108)
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109).
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111).
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed  guest administrators to obtain the contents of sensitive host files or delete the files  (bsc#1009111).
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032).

These non-security issues were fixed:

- bsc#1004981: Xen RPM didn't contain debug hypervisor for EFI systems
- bsc#1007941: Xen tools limited the number of vcpus to 256 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-09"/>
	<updated date="2016-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004981">SUSE bug 1004981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007941">SUSE bug 1007941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009105">SUSE bug 1009105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79811" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002639" ref_url="https://bugzilla.suse.com/1002639" source="BUGZILLA"/>
		<reference ref_id="1007853" ref_url="https://bugzilla.suse.com/1007853" source="BUGZILLA"/>
		<reference ref_id="1007854" ref_url="https://bugzilla.suse.com/1007854" source="BUGZILLA"/>
		<reference ref_id="1007855" ref_url="https://bugzilla.suse.com/1007855" source="BUGZILLA"/>
		<reference ref_id="1007857" ref_url="https://bugzilla.suse.com/1007857" source="BUGZILLA"/>
		<reference ref_id="1007858" ref_url="https://bugzilla.suse.com/1007858" source="BUGZILLA"/>
		<reference ref_id="1010893" ref_url="https://bugzilla.suse.com/1010893" source="BUGZILLA"/>
		<reference ref_id="1011805" ref_url="https://bugzilla.suse.com/1011805" source="BUGZILLA"/>
		<reference ref_id="1011812" ref_url="https://bugzilla.suse.com/1011812" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<description>

This update for tomcat fixes the following issues:

Feature changes:

The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)

Security fixes:
- CVE-2016-0762: Realm Timing Attack (bsc#1007854)
- CVE-2016-5018: Security Manager Bypass (bsc#1007855)
- CVE-2016-6794: System Property Disclosure (bsc#1007857)
- CVE-2016-6796: Security Manager Bypass (bsc#1007858)
- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)
- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)
- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)

Bug fixes:
- Enabled optional setenv.sh script. See section '(3.4) Using the 'setenv' script'
  in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002639">SUSE bug 1002639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010893">SUSE bug 1010893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79812" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009280" ref_url="https://bugzilla.suse.com/1009280" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- CVE-2016-5568: Unspecified vulnerability allowed remote attackers to affect confidentiality, integrity,
                 and availability via vectors related to AWT 
- CVE-2016-5556: Unspecified vulnerability allowed remote attackers to affect confidentiality, integrity,
                 and availability via vectors related to 2D
- CVE-2016-5573: Unspecified vulnerability allowed remote attackers to affect confidentiality, integrity,
                 and availability via vectors related to Hotspot
- CVE-2016-5597: Unspecified vulnerability allowed remote attackers to affect confidentiality via vectors
                 related to Networking
- CVE-2016-5554: Unspecified vulnerability allowed remote attackers to affect integrity via vectors related to JMX
- CVE-2016-5542: Unspecified vulnerability allowed remote attackers to affect integrity via vectors related to Libraries
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-10"/>
	<updated date="2016-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79813" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002982" ref_url="https://bugzilla.suse.com/1002982" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7971" ref_url="https://www.suse.com/security/cve/CVE-2016-7971/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<description>


This update for libass fixes the following issues:

CVE-2016-7969, CVE-2016-7970, CVE-2016-7971, CVE-2016-7972: Fixed multiple memory allocation issues found by fuzzing (bsc#1002982).
 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7971/">CVE-2016-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549256" comment="libass5-0.10.2-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79814" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013533" ref_url="https://bugzilla.suse.com/1013533" source="BUGZILLA"/>
		<reference ref_id="1013604" ref_url="https://bugzilla.suse.com/1013604" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to fix two security issues.

The following security bugs were fixed:

- CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604).
- CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-13"/>
	<updated date="2016-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549257" comment="kernel-default-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549258" comment="kernel-default-base-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549259" comment="kernel-default-devel-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549260" comment="kernel-default-man-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517541" comment="kernel-devel-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517542" comment="kernel-macros-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517543" comment="kernel-source-4.4.21-90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549261" comment="kernel-syms-4.4.21-90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79815" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="906574" ref_url="https://bugzilla.suse.com/906574" source="BUGZILLA"/>
		<reference ref_id="924960" ref_url="https://bugzilla.suse.com/924960" source="BUGZILLA"/>
		<reference ref_id="933288" ref_url="https://bugzilla.suse.com/933288" source="BUGZILLA"/>
		<reference ref_id="933878" ref_url="https://bugzilla.suse.com/933878" source="BUGZILLA"/>
		<reference ref_id="936227" ref_url="https://bugzilla.suse.com/936227" source="BUGZILLA"/>
		<reference ref_id="942865" ref_url="https://bugzilla.suse.com/942865" source="BUGZILLA"/>
		<reference ref_id="957566" ref_url="https://bugzilla.suse.com/957566" source="BUGZILLA"/>
		<reference ref_id="957567" ref_url="https://bugzilla.suse.com/957567" source="BUGZILLA"/>
		<reference ref_id="957598" ref_url="https://bugzilla.suse.com/957598" source="BUGZILLA"/>
		<reference ref_id="957600" ref_url="https://bugzilla.suse.com/957600" source="BUGZILLA"/>
		<reference ref_id="960837" ref_url="https://bugzilla.suse.com/960837" source="BUGZILLA"/>
		<reference ref_id="971741" ref_url="https://bugzilla.suse.com/971741" source="BUGZILLA"/>
		<reference ref_id="972127" ref_url="https://bugzilla.suse.com/972127" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327/" source="CVE"/>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380/" source="CVE"/>
		<reference ref_id="CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381/" source="CVE"/>
		<reference ref_id="CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382/" source="CVE"/>
		<reference ref_id="CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383/" source="CVE"/>
		<reference ref_id="CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389/" source="CVE"/>
		<reference ref_id="CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392/" source="CVE"/>
		<reference ref_id="CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393/" source="CVE"/>
		<reference ref_id="CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394/" source="CVE"/>
		<reference ref_id="CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<description>

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:

- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues 
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-15"/>
	<updated date="2016-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942865">SUSE bug 942865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972127">SUSE bug 972127</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79816" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009434" ref_url="https://bugzilla.suse.com/1009434" source="BUGZILLA"/>
		<reference ref_id="1011377" ref_url="https://bugzilla.suse.com/1011377" source="BUGZILLA"/>
		<reference ref_id="1011390" ref_url="https://bugzilla.suse.com/1011390" source="BUGZILLA"/>
		<reference ref_id="1011395" ref_url="https://bugzilla.suse.com/1011395" source="BUGZILLA"/>
		<reference ref_id="1011398" ref_url="https://bugzilla.suse.com/1011398" source="BUGZILLA"/>
		<reference ref_id="1011404" ref_url="https://bugzilla.suse.com/1011404" source="BUGZILLA"/>
		<reference ref_id="1011406" ref_url="https://bugzilla.suse.com/1011406" source="BUGZILLA"/>
		<reference ref_id="1011411" ref_url="https://bugzilla.suse.com/1011411" source="BUGZILLA"/>
		<reference ref_id="1011417" ref_url="https://bugzilla.suse.com/1011417" source="BUGZILLA"/>
		<reference ref_id="943216" ref_url="https://bugzilla.suse.com/943216" source="BUGZILLA"/>
		<reference ref_id="956365" ref_url="https://bugzilla.suse.com/956365" source="BUGZILLA"/>
		<reference ref_id="981252" ref_url="https://bugzilla.suse.com/981252" source="BUGZILLA"/>
		<reference ref_id="988028" ref_url="https://bugzilla.suse.com/988028" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="992606" ref_url="https://bugzilla.suse.com/992606" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<description>

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p9.

Security issues fixed:

- CVE-2016-9311, CVE-2016-9310, bsc#1011377: Mode 6
  unauthenticated trap information disclosure and DDoS vector.
- CVE-2016-7427, bsc#1011390:
  Broadcast Mode Replay Prevention DoS.
- CVE-2016-7428, bsc#1011417:
  Broadcast Mode Poll Interval Enforcement DoS.
- CVE-2016-7431, bsc#1011395:
  Regression: 010-origin: Zero Origin Timestamp Bypass.
- CVE-2016-7434, bsc#1011398:
  Null pointer dereference in _IO_str_init_static_internal().
- CVE-2016-7429, bsc#1011404: Interface selection attack.
- CVE-2016-7426, bsc#1011406:
  Client rate limiting and server responses.
- CVE-2016-7433, bsc#1011411: Reboot sync calculation problem.
- CVE-2015-5219: An endless loop due to incorrect precision to
  double conversion (bsc#943216).

Non-security issues fixed:

- Fix a spurious error message.
- Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in 'trap' (bsc#981252).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606).
- Fix segfault in 'sntp -a' (bsc#1009434).
- Silence an OpenSSL version warning (bsc#992038).
- Make the resolver task change user and group IDs to the same
  values as the main task. (bsc#988028)
- Simplify ntpd's search for its own executable to prevent AppArmor
  warnings (bsc#956365).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-19"/>
	<updated date="2016-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009434">SUSE bug 1009434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956365">SUSE bug 956365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981252">SUSE bug 981252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988028">SUSE bug 988028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992606">SUSE bug 992606</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79817" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014300" ref_url="https://bugzilla.suse.com/1014300" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<description>

This update for xen fixes the following issues:

- A Mishandling of SYSCALL singlestep during emulation which could
  have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have
  lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service.
  (XSA-202, bsc#1014298, CVE-2016-10024)
- A missing NULL pointer check in VMFUNC emulation could lead to a hypervisor
  crash leading to a Denial of Servce. (XSA-203, bsc#1014300, CVE-2016-10025)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549266" comment="xen-doc-html-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549267" comment="xen-tools-4.7.1_04-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549268" comment="xen-tools-domU-4.7.1_04-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79818" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015187" ref_url="https://bugzilla.suse.com/1015187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002508.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following issues:

* CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549269" comment="gd-2.1.0-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79819" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015422" ref_url="https://bugzilla.suse.com/1015422" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-21"/>
	<updated date="2016-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79820" version="1" class="patch">
	<metadata>
		<title>Security update for libgme (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015941" ref_url="https://bugzilla.suse.com/1015941" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<description>

This update for libgme fixes the following issues:

- CVE-2016-9957, CVE-2016-9958, CVE-2016-9959, CVE-2016-9960, CVE-2016-9961:
  Various issues were fixed in the handling of SPC music files that could have
  been exploited for gaining privileges of desktop users. [bsc#1015941]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-22"/>
	<updated date="2016-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549272" comment="libgme0-0.6.0-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79821" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009318" ref_url="https://bugzilla.suse.com/1009318" source="BUGZILLA"/>
		<reference ref_id="1011130" ref_url="https://bugzilla.suse.com/1011130" source="BUGZILLA"/>
		<reference ref_id="1011136" ref_url="https://bugzilla.suse.com/1011136" source="BUGZILLA"/>
		<reference ref_id="1013376" ref_url="https://bugzilla.suse.com/1013376" source="BUGZILLA"/>
		<reference ref_id="1014159" ref_url="https://bugzilla.suse.com/1014159" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848/" source="CVE"/>
		<reference ref_id="CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707/" source="CVE"/>
		<reference ref_id="CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866/" source="CVE"/>
		<reference ref_id="CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556/" source="CVE"/>
		<reference ref_id="CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559/" source="CVE"/>
		<reference ref_id="CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

  * CVE-2016-9556 Possible Heap-overflow found by fuzzing [bsc#1011130]
  * CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]
  * CVE-2016-8707 Possible code execution in Tiff conver utility [bsc#1014159]
  * CVE-2016-8866 Memory allocation failure in AcquireMagickMemory could lead to Heap overflow [bsc#1009318]
  * CVE-2016-9559 Possible Null pointer access found by fuzzing [bsc#1011136]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79822" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005091" ref_url="https://bugzilla.suse.com/1005091" source="BUGZILLA"/>
		<reference ref_id="1012677" ref_url="https://bugzilla.suse.com/1012677" source="BUGZILLA"/>
		<reference ref_id="995964" ref_url="https://bugzilla.suse.com/995964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002523.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issues fixed:
- CVE-2016-7098: Fixed a potential race condition by creating files with .tmp ext
  and making them accessible to the current user only. (bsc#995964)

Non security issues fixed:
- bsc#1005091: Don't call xfree() on string returned by usr_error()  
- bsc#1012677: Add support for enforcing TLSv1.1 and TLSv1.2 (TLS 1.2 support was already present, but it was not enforcable).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005091">SUSE bug 1005091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012677">SUSE bug 1012677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549275" comment="wget-1.14-17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79823" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="983273" ref_url="https://bugzilla.suse.com/983273" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00094.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2015-8899: Denial of service between local and remote dns entries (bsc#983273)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-23"/>
	<updated date="2016-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549276" comment="dnsmasq-2.71-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79824" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002414" ref_url="https://bugzilla.suse.com/1002414" source="BUGZILLA"/>
		<reference ref_id="1007739" ref_url="https://bugzilla.suse.com/1007739" source="BUGZILLA"/>
		<reference ref_id="1007740" ref_url="https://bugzilla.suse.com/1007740" source="BUGZILLA"/>
		<reference ref_id="1007741" ref_url="https://bugzilla.suse.com/1007741" source="BUGZILLA"/>
		<reference ref_id="1007742" ref_url="https://bugzilla.suse.com/1007742" source="BUGZILLA"/>
		<reference ref_id="1007743" ref_url="https://bugzilla.suse.com/1007743" source="BUGZILLA"/>
		<reference ref_id="1007744" ref_url="https://bugzilla.suse.com/1007744" source="BUGZILLA"/>
		<reference ref_id="1007747" ref_url="https://bugzilla.suse.com/1007747" source="BUGZILLA"/>
		<reference ref_id="1014543" ref_url="https://bugzilla.suse.com/1014543" source="BUGZILLA"/>
		<reference ref_id="1014975" ref_url="https://bugzilla.suse.com/1014975" source="BUGZILLA"/>
		<reference ref_id="999817" ref_url="https://bugzilla.suse.com/999817" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113/" source="CVE"/>
		<reference ref_id="CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114/" source="CVE"/>
		<reference ref_id="CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115/" source="CVE"/>
		<reference ref_id="CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116/" source="CVE"/>
		<reference ref_id="CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117/" source="CVE"/>
		<reference ref_id="CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118/" source="CVE"/>
		<reference ref_id="CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572/" source="CVE"/>
		<reference ref_id="CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573/" source="CVE"/>
		<reference ref_id="CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580/" source="CVE"/>
		<reference ref_id="CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<description>

This update for openjpeg2 fixes the following issues:

* CVE-2016-9114: NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) could lead to crash [bsc#1007740]
* CVE-2016-9115: Heap Buffer Overflow in function imagetotga of convert.c(jp2) [bsc#1007741]
* CVE-2016-9580, CVE-2016-9581: Possible Heap buffer overflow via integer overflow and infite loop [bsc#1014975]
* CVE-2016-9117: NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 [bsc#1007743]
* CVE-2016-9118: Heap Buffer Overflow in function pnmtoimage of convert.c [bsc#1007744] 
* CVE-2016-9112: FPE(Floating Point Exception) in lib/openjp2/pi.c:523 [bsc#1007747] 
* CVE-2016-9116: NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) [bsc#1007742]
* CVE-2016-9113: NULL point dereference in function imagetobmp of convertbmp.c could lead to crash [bsc#1007739] 
* CVE-2016-9572 CVE-2016-9573: Insuficient check in imagetopnm() could lead to heap buffer overflow [bsc#1014543]
* CVE-2016-8332: Malicious file in OpenJPEG JPEG2000 format  could lead to code execution [bsc#1002414] 
* CVE-2016-7445: Null pointer dereference in convert.c could lead to crash [bsc#999817] 
 
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002414">SUSE bug 1002414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007740">SUSE bug 1007740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007741">SUSE bug 1007741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007742">SUSE bug 1007742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007743">SUSE bug 1007743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014975">SUSE bug 1014975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999817">SUSE bug 999817</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79825" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009085" ref_url="https://bugzilla.suse.com/1009085" source="BUGZILLA"/>
		<reference ref_id="1014437" ref_url="https://bugzilla.suse.com/1014437" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
  This component is not built into our packages, so we are not affected.

Non security issues fixed:

- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009085">SUSE bug 1009085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549278" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549279" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549280" comment="libdcerpc0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549281" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549282" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549283" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549284" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549285" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549286" comment="libndr-standard0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549287" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549288" comment="libndr0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549289" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549290" comment="libnetapi0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549291" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549292" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549293" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549294" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549295" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549296" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549297" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549298" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549299" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549300" comment="libsamba-util0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549301" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549302" comment="libsamdb0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549303" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549304" comment="libsmbclient0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549305" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549306" comment="libsmbconf0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549307" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549308" comment="libsmbldap0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549309" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549310" comment="libtevent-util0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549311" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549312" comment="libwbclient0-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549313" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549314" comment="samba-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549315" comment="samba-client-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549316" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549317" comment="samba-libs-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549318" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549319" comment="samba-winbind-4.4.2-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549320" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79826" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1001203" ref_url="https://bugzilla.suse.com/1001203" source="BUGZILLA"/>
		<reference ref_id="1009085" ref_url="https://bugzilla.suse.com/1009085" source="BUGZILLA"/>
		<reference ref_id="1014437" ref_url="https://bugzilla.suse.com/1014437" source="BUGZILLA"/>
		<reference ref_id="1014441" ref_url="https://bugzilla.suse.com/1014441" source="BUGZILLA"/>
		<reference ref_id="1014442" ref_url="https://bugzilla.suse.com/1014442" source="BUGZILLA"/>
		<reference ref_id="975299" ref_url="https://bugzilla.suse.com/975299" source="BUGZILLA"/>
		<reference ref_id="986675" ref_url="https://bugzilla.suse.com/986675" source="BUGZILLA"/>
		<reference ref_id="991564" ref_url="https://bugzilla.suse.com/991564" source="BUGZILLA"/>
		<reference ref_id="994500" ref_url="https://bugzilla.suse.com/994500" source="BUGZILLA"/>
		<reference ref_id="997833" ref_url="https://bugzilla.suse.com/997833" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:

- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd
  parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437).
  The component affected is not built in our packages.

Non security issues fixed:

- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port; (bsc#1009085)
- Add doc changes for net ads --no-dns-updates switch; (bsc#991564)
- Include vfstest in samba-test; (bsc#1001203).
- s3/winbindd: using default domain with user@domain.com format fails (bsc#997833).
- Fix illegal memory access after memory has been deleted (bsc#975299).
- Fix bug in tevent poll backend causing winbind to loop tightly (bsc#994500).
- Various fixes for spnego/ntlm (bsc#986675).		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-27"/>
	<updated date="2016-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001203">SUSE bug 1001203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009085">SUSE bug 1009085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975299">SUSE bug 975299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986675">SUSE bug 986675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991564">SUSE bug 991564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994500">SUSE bug 994500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997833">SUSE bug 997833</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549321" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79827" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007728" ref_url="https://bugzilla.suse.com/1007728" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002529.html" source="SUSE-SU"/>
		<description>

This update for libcares2 fixes the following issues:

- Add patch to fix single byte out of buffer write
  (CVE-2016-5180, bsc#1007728)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549322" comment="libcares2-1.9.1-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79828" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="1013678" ref_url="https://bugzilla.suse.com/1013678" source="BUGZILLA"/>
		<reference ref_id="1013680" ref_url="https://bugzilla.suse.com/1013680" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2016-9809: Malicious mkv/h264 file could cause an off by one out of bounds read and lead to crash (bsc#1013659)
- CVE-2016-9812: Malicious mpeg file could cause invalid a null pointer access and lead to crash (bsc#1013678)
- CVE-2016-9813: Malicious mpegts file could cause invalid a null pointer access and lead to crash (bsc#1013680)
- CVE-2016-9445, CVE-2016-9446: Check an integer overflow and initialize a buffer in vmncdec (bsc#1010829)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549323" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79829" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1010829" ref_url="https://bugzilla.suse.com/1010829" source="BUGZILLA"/>
		<reference ref_id="1013659" ref_url="https://bugzilla.suse.com/1013659" source="BUGZILLA"/>
		<reference ref_id="1013678" ref_url="https://bugzilla.suse.com/1013678" source="BUGZILLA"/>
		<reference ref_id="1013680" ref_url="https://bugzilla.suse.com/1013680" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following security issues,
which would allow attackers able to submit media files for indexing to cause
code execution or crashes:

- Check an integer overflow (CVE-2016-9445) and initialize a buffer
  (CVE-2016-9446) in vmncdec. (bsc#1010829)
- CVE-2016-9809: Ensure codec_data has the right size when reading number of SPS (bsc#1013659).
- CVE-2016-9812: Add more section size checks (bsc#1013678).
- CVE-2016-9813: fix PAT parsing (bsc#1013680).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549324" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549325" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549326" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549327" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549328" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549329" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549330" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549331" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549332" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549333" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009540821" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79830" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007280" ref_url="https://bugzilla.suse.com/1007280" source="BUGZILLA"/>
		<reference ref_id="1010161" ref_url="https://bugzilla.suse.com/1010161" source="BUGZILLA"/>
		<reference ref_id="1010163" ref_url="https://bugzilla.suse.com/1010163" source="BUGZILLA"/>
		<reference ref_id="1011103" ref_url="https://bugzilla.suse.com/1011103" source="BUGZILLA"/>
		<reference ref_id="1011107" ref_url="https://bugzilla.suse.com/1011107" source="BUGZILLA"/>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="974449" ref_url="https://bugzilla.suse.com/974449" source="BUGZILLA"/>
		<reference ref_id="974840" ref_url="https://bugzilla.suse.com/974840" source="BUGZILLA"/>
		<reference ref_id="984813" ref_url="https://bugzilla.suse.com/984813" source="BUGZILLA"/>
		<reference ref_id="984815" ref_url="https://bugzilla.suse.com/984815" source="BUGZILLA"/>
		<reference ref_id="987351" ref_url="https://bugzilla.suse.com/987351" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<description>

The tiff library and tools were updated to version 4.0.7 fixing various bug and security issues.

- CVE-2014-8127: out-of-bounds read with malformed TIFF image in multiple tools [bnc#914890]
- CVE-2016-9297: tif_dirread.c read outside buffer in _TIFFPrintField() [bnc#1010161]
- CVE-2016-3658: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c [bnc#974840]
- CVE-2016-9273: heap overflow [bnc#1010163]
- CVE-2016-3622: divide By Zero in the tiff2rgba tool [bnc#974449]
- CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow [bnc#1007280]
- CVE-2016-9453: out-of-bounds Write memcpy and less bound check in tiff2pdf [bnc#1011107]
- CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat [bnc#987351]
- CVE-2016-9448: regression introduced by fixing CVE-2016-9297 [bnc#1011103]
- CVE-2016-5321: out-of-bounds read in tiffcrop /  DumpModeDecode() function [bnc#984813]
- CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function (null ptr dereference?) [bnc#984815]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-29"/>
	<updated date="2016-12-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974840">SUSE bug 974840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984813">SUSE bug 984813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984815">SUSE bug 984815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79831" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012102" ref_url="https://bugzilla.suse.com/1012102" source="BUGZILLA"/>
		<reference ref_id="1012103" ref_url="https://bugzilla.suse.com/1012103" source="BUGZILLA"/>
		<reference ref_id="1012104" ref_url="https://bugzilla.suse.com/1012104" source="BUGZILLA"/>
		<reference ref_id="1013653" ref_url="https://bugzilla.suse.com/1013653" source="BUGZILLA"/>
		<reference ref_id="1013655" ref_url="https://bugzilla.suse.com/1013655" source="BUGZILLA"/>
		<reference ref_id="1013663" ref_url="https://bugzilla.suse.com/1013663" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-good fixes the following security issues:

- CVE-2016-9807: Flic decoder invalid read could lead to crash. (bsc#1013655)
- CVE-2016-9634: Flic out-of-bounds write could lead to code execution. (bsc#1012102)
- CVE-2016-9635: Flic out-of-bounds write could lead to code execution. (bsc#1012103)
- CVE-2016-9635: Flic out-of-bounds write could lead to code execution. (bsc#1012104)
- CVE-2016-9808: A maliciously crafted flic file can still cause invalid memory accesses. (bsc#1013653)
- CVE-2016-9810: A maliciously crafted flic file can still cause invalid memory accesses. (bsc#1013663)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-12-30"/>
	<updated date="2016-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79832" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1034560" ref_url="https://bugzilla.suse.com/1034560" source="BUGZILLA"/>
		<reference ref_id="1042146" ref_url="https://bugzilla.suse.com/1042146" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00021.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following security issue:

- CVE-2017-1000368: A follow-up fix to CVE-2017-1000367, the Linux process name could also contain a
  newline, which could be used to trick sudo to read/write to an
  arbitrary open terminal. (bsc#1042146)

Also the following non security bug was fixed:

- Link the 'system_group' plugin with sudo_util library to resolve the missing sudo_dso_findsym symbol (bsc#1034560)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034560">SUSE bug 1034560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549337" comment="sudo-1.8.10p3-10.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79833" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1044947" ref_url="https://bugzilla.suse.com/1044947" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508/" source="CVE"/>
		<reference ref_id="CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- Some parts of the certificate-parsing code did not always clear all allocated
  memory. This would have allowed clients to leak a few bytes of memory for
  each connection attempt, thereby facilitating a (quite inefficient) DoS
  attack on the server. [bsc#1044947, CVE-2017-7521]

- The ASN1 parsing code contained a bug that could have resulted in some
  buffers being free()d twice, and this issue could have potentially been
  triggered remotely by a VPN peer. [bsc#1044947, CVE-2017-7521]

- If clients used a HTTP proxy with NTLM authentication, a man-in-the-middle
  attacker between client and proxy could cause the client to crash or disclose
  at most 96 bytes of stack memory. The disclosed stack memory was likely to
  contain the proxy password. If the proxy password had not been reused, this
  was unlikely to compromise the security of the OpenVPN tunnel itself. Clients
  who did not use the --http-proxy option with ntlm2 authentication were not
  affected. [bsc#1044947, CVE-2017-7520]

- It was possible to trigger an assertion by sending a malformed IPv6 packet.
  That issue could have been abused to remotely shutdown an openvpn server or
  client, if IPv6 and --mssfix were enabled and if the IPv6 networks used
  inside the VPN were known. [bsc#1044947, CVE-2017-7508]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-21"/>
	<updated date="2017-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549338" comment="openvpn-2.3.8-16.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549339" comment="openvpn-auth-pam-plugin-2.3.8-16.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79834" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002569.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-base fixes the following issues:

* CVE-2016-9811: Malicious file could could cause an invalid read leading to crash [bsc#1013669]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-19"/>
	<updated date="2017-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549340" comment="gstreamer-plugins-base-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517611" comment="gstreamer-plugins-base-lang-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549341" comment="libgstallocators-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549342" comment="libgstapp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549343" comment="libgstapp-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549344" comment="libgstaudio-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549345" comment="libgstaudio-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549346" comment="libgstfft-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549347" comment="libgstpbutils-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549348" comment="libgstpbutils-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549349" comment="libgstriff-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549350" comment="libgstrtp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549351" comment="libgstrtsp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549352" comment="libgstsdp-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549353" comment="libgsttag-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549354" comment="libgsttag-1_0-0-32bit-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549355" comment="libgstvideo-1_0-0-1.8.3-9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549356" comment="libgstvideo-1_0-0-32bit-1.8.3-9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79835" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042298" ref_url="https://bugzilla.suse.com/1042298" source="BUGZILLA"/>
		<reference ref_id="1042299" ref_url="https://bugzilla.suse.com/1042299" source="BUGZILLA"/>
		<reference ref_id="1042300" ref_url="https://bugzilla.suse.com/1042300" source="BUGZILLA"/>
		<reference ref_id="1042301" ref_url="https://bugzilla.suse.com/1042301" source="BUGZILLA"/>
		<reference ref_id="1042302" ref_url="https://bugzilla.suse.com/1042302" source="BUGZILLA"/>
		<reference ref_id="1042303" ref_url="https://bugzilla.suse.com/1042303" source="BUGZILLA"/>
		<reference ref_id="1042304" ref_url="https://bugzilla.suse.com/1042304" source="BUGZILLA"/>
		<reference ref_id="1042305" ref_url="https://bugzilla.suse.com/1042305" source="BUGZILLA"/>
		<reference ref_id="1042306" ref_url="https://bugzilla.suse.com/1042306" source="BUGZILLA"/>
		<reference ref_id="1042307" ref_url="https://bugzilla.suse.com/1042307" source="BUGZILLA"/>
		<reference ref_id="1042308" ref_url="https://bugzilla.suse.com/1042308" source="BUGZILLA"/>
		<reference ref_id="1042309" ref_url="https://bugzilla.suse.com/1042309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<description>
The network debugging tool wireshark was updated to version 2.2.7 to fix the following issues:

- CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) (bsc#1042304)
- CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) (bsc#1042303)
- CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) (bsc#1042302)
- CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) (bsc#1042301)
- CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) (bsc#1042300)
- CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) (bsc#1042305)
- CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) (bsc#1042299)
- CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) (bsc#1042298)
- CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) (bsc#1042309)
- CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) (bsc#1042308)
- CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) (bsc#1042307)
- CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33) (bsc#1042306)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-23"/>
	<updated date="2017-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79836" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007255" ref_url="https://bugzilla.suse.com/1007255" source="BUGZILLA"/>
		<reference ref_id="1036789" ref_url="https://bugzilla.suse.com/1036789" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2017-7475: Fixed a segfault in get_bitmap_surface due to malformed font
  (bsc#1036789).
- CVE-2016-9082: fix a segfault when using &gt;4GB images since int values were used
  for pointer operations (bsc#1007255).

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549363" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549364" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549365" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549366" comment="libcairo2-1.15.2-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549367" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79837" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="1043960" ref_url="https://bugzilla.suse.com/1043960" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<description>
The MozillaFirefox was updated to the new ESR 52.2 release, which fixes the following issues (bsc#1043960):

* MFSA 2017-16/CVE-2017-7758
  Out-of-bounds read in Opus encoder
* MFSA 2017-16/CVE-2017-7749
  Use-after-free during docshell reloading
* MFSA 2017-16/CVE-2017-7751
  Use-after-free with content viewer listeners
* MFSA 2017-16/CVE-2017-5472
  Use-after-free using destroyed node when regenerating trees
* MFSA 2017-16/CVE-2017-5470
  Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
* MFSA 2017-16/CVE-2017-7752
  Use-after-free with IME input
* MFSA 2017-16/CVE-2017-7750
  Use-after-free with track elements
* MFSA 2017-16/CVE-2017-7768
  32 byte arbitrary file read through Mozilla Maintenance
  Service
* MFSA 2017-16/CVE-2017-7778
  Vulnerabilities in the Graphite 2 library
* MFSA 2017-16/CVE-2017-7754
  Out-of-bounds read in WebGL with ImageInfo object
* MFSA 2017-16/CVE-2017-7755
  Privilege escalation through Firefox Installer with same
  directory DLL files
* MFSA 2017-16/CVE-2017-7756
  Use-after-free and use-after-scope logging XHR header errors
* MFSA 2017-16/CVE-2017-7757
  Use-after-free in IndexedDB
* MFSA 2017-16/CVE-2017-7761
  File deletion and privilege escalation through Mozilla
  Maintenance Service helper.exe application
* MFSA 2017-16/CVE-2017-7763
  Mac fonts render some unicode characters as spaces
* MFSA 2017-16/CVE-2017-7765
  Mark of the Web bypass when saving executable files
* MFSA 2017-16/CVE-2017-7764
  (bmo#1364283, bmo#http://www.unicode.org/reports/tr31/tr31-26
   .html#Aspirational_Use_Scripts)
  Domain spoofing with combination of Canadian Syllabics and
  other unicode blocks

- update to Firefox ESR 52.1 (bsc#1035082)
* MFSA 2017-12/CVE-2016-10196
  Vulnerabilities in Libevent library
* MFSA 2017-12/CVE-2017-5443
  Out-of-bounds write during BinHex decoding
* MFSA 2017-12/CVE-2017-5429
  Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and
  Firefox ESR 52.1
* MFSA 2017-12/CVE-2017-5464
  Memory corruption with accessibility and DOM manipulation
* MFSA 2017-12/CVE-2017-5465
  Out-of-bounds read in ConvolvePixel
* MFSA 2017-12/CVE-2017-5466
  Origin confusion when reloading isolated data:text/html URL
* MFSA 2017-12/CVE-2017-5467
  Memory corruption when drawing Skia content
* MFSA 2017-12/CVE-2017-5460
  Use-after-free in frame selection
* MFSA 2017-12/CVE-2017-5461
  Out-of-bounds write in Base64 encoding in NSS
* MFSA 2017-12/CVE-2017-5448
  Out-of-bounds write in ClearKeyDecryptor
* MFSA 2017-12/CVE-2017-5449
  Crash during bidirectional unicode manipulation with
  animation
* MFSA 2017-12/CVE-2017-5446
  Out-of-bounds read when HTTP/2 DATA frames are sent with
  incorrect data
* MFSA 2017-12/CVE-2017-5447
  Out-of-bounds read during glyph processing
* MFSA 2017-12/CVE-2017-5444
  Buffer overflow while parsing application/http-index-format
  content
* MFSA 2017-12/CVE-2017-5445
  Uninitialized values used while parsing application/http-
  index-format content
* MFSA 2017-12/CVE-2017-5442
  Use-after-free during style changes
* MFSA 2017-12/CVE-2017-5469
  Potential Buffer overflow in flex-generated code
* MFSA 2017-12/CVE-2017-5440
  Use-after-free in txExecutionState destructor during XSLT
  processing
* MFSA 2017-12/CVE-2017-5441
  Use-after-free with selection during scroll events
* MFSA 2017-12/CVE-2017-5439
  Use-after-free in nsTArray Length() during XSLT processing
* MFSA 2017-12/CVE-2017-5438
  Use-after-free in nsAutoPtr during XSLT processing
* MFSA 2017-12/CVE-2017-5436
  Out-of-bounds write with malicious font in Graphite 2
* MFSA 2017-12/CVE-2017-5435
  Use-after-free during transaction processing in the editor
* MFSA 2017-12/CVE-2017-5434
  Use-after-free during focus handling
* MFSA 2017-12/CVE-2017-5433
  Use-after-free in SMIL animation functions
* MFSA 2017-12/CVE-2017-5432
  Use-after-free in text input selection
* MFSA 2017-12/CVE-2017-5430
  Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1
* MFSA 2017-12/CVE-2017-5459
  Buffer overflow in WebGL
* MFSA 2017-12/CVE-2017-5462
  DRBG flaw in NSS
* MFSA 2017-12/CVE-2017-5455
  Sandbox escape through internal feed reader APIs
* MFSA 2017-12/CVE-2017-5454
  Sandbox escape allowing file system read access through file
  picker
* MFSA 2017-12/CVE-2017-5456
  Sandbox escape allowing local file system access
* MFSA 2017-12/CVE-2017-5451
  Addressbar spoofing with onblur event

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79838" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024989" ref_url="https://bugzilla.suse.com/1024989" source="BUGZILLA"/>
		<reference ref_id="1044337" ref_url="https://bugzilla.suse.com/1044337" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
* CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549371" comment="libxml2-2-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549372" comment="libxml2-2-32bit-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532185" comment="libxml2-doc-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549373" comment="libxml2-tools-2.9.4-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549374" comment="python-libxml2-2.9.4-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79839" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1019649" ref_url="https://bugzilla.suse.com/1019649" source="BUGZILLA"/>
		<reference ref_id="1021803" ref_url="https://bugzilla.suse.com/1021803" source="BUGZILLA"/>
		<reference ref_id="1025029" ref_url="https://bugzilla.suse.com/1025029" source="BUGZILLA"/>
		<reference ref_id="1025035" ref_url="https://bugzilla.suse.com/1025035" source="BUGZILLA"/>
		<reference ref_id="1025084" ref_url="https://bugzilla.suse.com/1025084" source="BUGZILLA"/>
		<reference ref_id="1025985" ref_url="https://bugzilla.suse.com/1025985" source="BUGZILLA"/>
		<reference ref_id="1032509" ref_url="https://bugzilla.suse.com/1032509" source="BUGZILLA"/>
		<reference ref_id="1039042" ref_url="https://bugzilla.suse.com/1039042" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002980.html" source="SUSE-SU"/>
		<description>

This update for xorg-x11-server provides the following fixes:

- Remove unused function with use-after-free issue. (bsc#1025035)
- Use arc4random to generate cookies. (bsc#1025084)
- Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)
- XDrawArc performance improvement. (bsc#1019649)
- Re-enable indirect GLX by default. (bsc#1039042)
- Add IndirectGLX ServerFlags option which allows users to enable or disable indirect GLX. (bsc#1032509)
- Fix dashing in GLAMOR. (bsc#1021803)
- Fix X server crash on drawing dashed lines. (bsc#1025985)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019649">SUSE bug 1019649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021803">SUSE bug 1021803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025035">SUSE bug 1025035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025084">SUSE bug 1025084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025985">SUSE bug 1025985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032509">SUSE bug 1032509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039042">SUSE bug 1039042</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549375" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549376" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79840" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040170" ref_url="https://bugzilla.suse.com/1040170" source="BUGZILLA"/>
		<reference ref_id="1042803" ref_url="https://bugzilla.suse.com/1042803" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9083" ref_url="https://www.suse.com/security/cve/CVE-2017-9083/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-9406: Fixed a memory leak that occurred while parsing invalid
  XRef attributes (bsc#1042803).
- CVE-2017-9083: Fixed a memory leak that occurred when the parser tried
  to recover from a broken input file. (bsc#1040170)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040170">SUSE bug 1040170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9083/">CVE-2017-9083</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549377" comment="libpoppler44-0.24.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79841" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1037603" ref_url="https://bugzilla.suse.com/1037603" source="BUGZILLA"/>
		<reference ref_id="1037624" ref_url="https://bugzilla.suse.com/1037624" source="BUGZILLA"/>
		<reference ref_id="1038293" ref_url="https://bugzilla.suse.com/1038293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to 9.4.12 fixes the following issues:

Upstream changelogs:

- https://www.postgresql.org/docs/9.4/static/release-9-4-12.html
- https://www.postgresql.org/docs/9.4/static/release-9-4-11.html
- https://www.postgresql.org/docs/9.4/static/release-9-4-10.html

Security issues fixed:

* CVE-2017-7486: Restrict visibility of
  pg_user_mappings.umoptions, to protect passwords stored as
  user mapping options. (bsc#1037624)

  Please note that manual action is needed to fix this in existing databases
  See the upstream release notes for details.
* CVE-2017-7485: recognize PGREQUIRESSL variable
  again. (bsc#1038293)
* CVE-2017-7484: Prevent exposure of statistical
  information via leaky operators. (bsc#1037603)

Changes in version 9.4.12:

* Build corruption with CREATE INDEX CONCURRENTLY
* Fixes for visibility and write-ahead-log stability

Changes in version 9.4.10:

* Fix WAL-logging of truncation of relation free space maps and
  visibility maps
* Fix incorrect creation of GIN index WAL records on big-endian
  machines
* Fix SELECT FOR UPDATE/SHARE to correctly lock tuples that have
  been updated by a subsequently-aborted transaction
* Fix EvalPlanQual rechecks involving CTE scans
* Fix improper repetition of previous results from hashed
  aggregation in a subquery

The libraries libpq and libecpg are now supplied by postgresql 9.6.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-26"/>
	<updated date="2017-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549378" comment="postgresql94-9.4.12-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549379" comment="postgresql94-contrib-9.4.12-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532193" comment="postgresql94-docs-9.4.12-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549380" comment="postgresql94-server-9.4.12-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79842" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027243" ref_url="https://bugzilla.suse.com/1027243" source="BUGZILLA"/>
		<reference ref_id="1041445" ref_url="https://bugzilla.suse.com/1041445" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002986.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issue fixed:

- CVE-2017-9148: Disable OpenSSL's internal session cache to mitigate
  authentication bypass. (bsc#1041445)

Non security issue fixed:

- Fix case insensitive matching in compiled regular expressions (bsc#1027243)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-27"/>
	<updated date="2017-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027243">SUSE bug 1027243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549381" comment="freeradius-server-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549382" comment="freeradius-server-doc-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549383" comment="freeradius-server-krb5-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549384" comment="freeradius-server-ldap-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549385" comment="freeradius-server-libs-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549386" comment="freeradius-server-mysql-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549387" comment="freeradius-server-perl-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549388" comment="freeradius-server-postgresql-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549389" comment="freeradius-server-python-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549390" comment="freeradius-server-sqlite-3.0.3-17.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549391" comment="freeradius-server-utils-3.0.3-17.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79843" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1045340" ref_url="https://bugzilla.suse.com/1045340" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00038.html" source="SUSE-SU"/>
		<description>
This Linux kernel update for SUSE Linux Enterprise 12 SP2 fixes the following issues:

- A previous security update to address CVE-2017-1000364 caused unintended
  side-effects in several other tools, most notably Java. These issues have
  been remedied. [bsc#1045340]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045340">SUSE bug 1045340</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549392" comment="kernel-default-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549393" comment="kernel-default-base-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549394" comment="kernel-default-devel-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549395" comment="kernel-default-man-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517660" comment="kernel-devel-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517661" comment="kernel-macros-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517662" comment="kernel-source-4.4.59-92.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549396" comment="kernel-syms-4.4.59-92.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79844" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1035829" ref_url="https://bugzilla.suse.com/1035829" source="BUGZILLA"/>
		<reference ref_id="1041830" ref_url="https://bugzilla.suse.com/1041830" source="BUGZILLA"/>
		<reference ref_id="1045060" ref_url="https://bugzilla.suse.com/1045060" source="BUGZILLA"/>
		<reference ref_id="1045062" ref_url="https://bugzilla.suse.com/1045062" source="BUGZILLA"/>
		<reference ref_id="1045065" ref_url="https://bugzilla.suse.com/1045065" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<description>

This update for apache2 provides the following fixes:

Security issues fixed:

- CVE-2017-3167: In Apache use of httpd ap_get_basic_auth_pw() outside
  of the authentication phase could lead to authentication requirements
  bypass (bsc#1045065)
- CVE-2017-3169: In mod_ssl may have a dereference NULL pointer issue
  which could lead to denial of service (bsc#1045062)
- CVE-2017-7679: In mod_mime can buffer over-read by 1 byte, potentially
  leading to a crash or information disclosure (bsc#1045060)

Non-Security issues fixed:

- Remove /usr/bin/http2 symlink only during apache2 package uninstall, not upgrade. (bsc#1041830)
- In gensslcert, use hostname when fqdn is too long. (bsc#1035829)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1035829">SUSE bug 1035829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041830">SUSE bug 1041830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549397" comment="apache2-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532211" comment="apache2-doc-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549398" comment="apache2-example-pages-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549399" comment="apache2-prefork-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549400" comment="apache2-utils-2.4.23-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549401" comment="apache2-worker-2.4.23-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79845" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1018870" ref_url="https://bugzilla.suse.com/1018870" source="BUGZILLA"/>
		<reference ref_id="1024724" ref_url="https://bugzilla.suse.com/1024724" source="BUGZILLA"/>
		<reference ref_id="1027053" ref_url="https://bugzilla.suse.com/1027053" source="BUGZILLA"/>
		<reference ref_id="1027057" ref_url="https://bugzilla.suse.com/1027057" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<description>

This update for vim fixes the following issues:

Security issues fixed:

- CVE-2017-5953: Fixed a possible overflow with corrupted spell file (bsc#1024724)
- CVE-2017-6350: Fixed a possible overflow when reading a corrupted undo file (bsc#1027053)
- CVE-2017-6349: Fixed a possible overflow when reading a corrupted undo file (bsc#1027057)


Non security issues fixed:

- Speed up YAML syntax highlighting (bsc#1018870)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-28"/>
	<updated date="2017-06-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1018870">SUSE bug 1018870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027053">SUSE bug 1027053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027057">SUSE bug 1027057</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549402" comment="gvim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549403" comment="vim-7.4.326-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79846" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040662" ref_url="https://bugzilla.suse.com/1040662" source="BUGZILLA"/>
		<reference ref_id="1045490" ref_url="https://bugzilla.suse.com/1045490" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00041.html" source="SUSE-SU"/>
		<description>

This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2012-6706: Fixed an arbitrary memory write in VMSF_DELTA filter in libclamunrar (bsc#1045490)

Non security issues fixed:

- Provide and obsolete clamav-nodb to trigger its removal in openSUSE Leap. (bsc#1040662)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549404" comment="clamav-0.99.2-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79847" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046554" ref_url="https://bugzilla.suse.com/1046554" source="BUGZILLA"/>
		<reference ref_id="1046555" ref_url="https://bugzilla.suse.com/1046555" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00044.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- An attacker with the ability to send and receive messages to an authoritative
  DNS server was able to circumvent TSIG authentication of AXFR requests. A
  server that relied solely on TSIG keys for protection could be manipulated
  into (1) providing an AXFR of a zone to an unauthorized recipient and (2)
  accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142]

- An attacker who with the ability to send and receive messages to an
  authoritative DNS server and who had knowledge of a valid TSIG key name for
  the zone and service being targeted was able to manipulate BIND into
  accepting an unauthorized dynamic update. [bsc#1046555, CVE-2017-3143]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-29"/>
	<updated date="2017-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549405" comment="bind-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549406" comment="bind-chrootenv-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532221" comment="bind-doc-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549407" comment="bind-libs-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547561" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549408" comment="bind-utils-9.9.9P1-62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79848" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00049.html" source="SUSE-SU"/>
		<description>
This update for unrar fixes the following issues:

- CVE-2012-6706: decoding malicious RAR files could have lead to memory corruption or code execution. (bsc#1045315).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549409" comment="unrar-5.0.14-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79849" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1044887" ref_url="https://bugzilla.suse.com/1044887" source="BUGZILLA"/>
		<reference ref_id="1044894" ref_url="https://bugzilla.suse.com/1044894" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375/" source="CVE"/>
		<reference ref_id="CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376/" source="CVE"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

* CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)
* CVE-2017-7375: Prevent unwanted external entity reference [bsc#1044894, ]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549410" comment="libxml2-2-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549411" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532226" comment="libxml2-doc-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549412" comment="libxml2-tools-2.9.4-45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549413" comment="python-libxml2-2.9.4-45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79850" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035642" ref_url="https://bugzilla.suse.com/1035642" source="BUGZILLA"/>
		<reference ref_id="1037243" ref_url="https://bugzilla.suse.com/1037243" source="BUGZILLA"/>
		<reference ref_id="1042160" ref_url="https://bugzilla.suse.com/1042160" source="BUGZILLA"/>
		<reference ref_id="1042882" ref_url="https://bugzilla.suse.com/1042882" source="BUGZILLA"/>
		<reference ref_id="1042893" ref_url="https://bugzilla.suse.com/1042893" source="BUGZILLA"/>
		<reference ref_id="1042915" ref_url="https://bugzilla.suse.com/1042915" source="BUGZILLA"/>
		<reference ref_id="1042923" ref_url="https://bugzilla.suse.com/1042923" source="BUGZILLA"/>
		<reference ref_id="1042924" ref_url="https://bugzilla.suse.com/1042924" source="BUGZILLA"/>
		<reference ref_id="1042931" ref_url="https://bugzilla.suse.com/1042931" source="BUGZILLA"/>
		<reference ref_id="1042938" ref_url="https://bugzilla.suse.com/1042938" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00047.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- PKRU and BND* leakage between vCPU-s might have leaked information to other guests (XSA-220, bsc#1042923)

These non-security issues were fixed:

- bsc#1027519: Included various upstream patches 
- bsc#1035642: Ensure that rpmbuild works
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-30"/>
	<updated date="2017-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035642">SUSE bug 1035642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042923">SUSE bug 1042923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042924">SUSE bug 1042924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009517676" comment="xen-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549414" comment="xen-doc-html-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517677" comment="xen-libs-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517678" comment="xen-libs-32bit-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549415" comment="xen-tools-4.7.2_06-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549416" comment="xen-tools-domU-4.7.2_06-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79851" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1016503" ref_url="https://bugzilla.suse.com/1016503" source="BUGZILLA"/>
		<reference ref_id="1016504" ref_url="https://bugzilla.suse.com/1016504" source="BUGZILLA"/>
		<reference ref_id="1017081" ref_url="https://bugzilla.suse.com/1017081" source="BUGZILLA"/>
		<reference ref_id="1017084" ref_url="https://bugzilla.suse.com/1017084" source="BUGZILLA"/>
		<reference ref_id="1020427" ref_url="https://bugzilla.suse.com/1020427" source="BUGZILLA"/>
		<reference ref_id="1021741" ref_url="https://bugzilla.suse.com/1021741" source="BUGZILLA"/>
		<reference ref_id="1025109" ref_url="https://bugzilla.suse.com/1025109" source="BUGZILLA"/>
		<reference ref_id="1025311" ref_url="https://bugzilla.suse.com/1025311" source="BUGZILLA"/>
		<reference ref_id="1028184" ref_url="https://bugzilla.suse.com/1028184" source="BUGZILLA"/>
		<reference ref_id="1028656" ref_url="https://bugzilla.suse.com/1028656" source="BUGZILLA"/>
		<reference ref_id="1030624" ref_url="https://bugzilla.suse.com/1030624" source="BUGZILLA"/>
		<reference ref_id="1031142" ref_url="https://bugzilla.suse.com/1031142" source="BUGZILLA"/>
		<reference ref_id="1032075" ref_url="https://bugzilla.suse.com/1032075" source="BUGZILLA"/>
		<reference ref_id="1034866" ref_url="https://bugzilla.suse.com/1034866" source="BUGZILLA"/>
		<reference ref_id="1034908" ref_url="https://bugzilla.suse.com/1034908" source="BUGZILLA"/>
		<reference ref_id="1035406" ref_url="https://bugzilla.suse.com/1035406" source="BUGZILLA"/>
		<reference ref_id="1035950" ref_url="https://bugzilla.suse.com/1035950" source="BUGZILLA"/>
		<reference ref_id="1036211" ref_url="https://bugzilla.suse.com/1036211" source="BUGZILLA"/>
		<reference ref_id="1037242" ref_url="https://bugzilla.suse.com/1037242" source="BUGZILLA"/>
		<reference ref_id="1037334" ref_url="https://bugzilla.suse.com/1037334" source="BUGZILLA"/>
		<reference ref_id="1037336" ref_url="https://bugzilla.suse.com/1037336" source="BUGZILLA"/>
		<reference ref_id="1039495" ref_url="https://bugzilla.suse.com/1039495" source="BUGZILLA"/>
		<reference ref_id="1042159" ref_url="https://bugzilla.suse.com/1042159" source="BUGZILLA"/>
		<reference ref_id="1042800" ref_url="https://bugzilla.suse.com/1042800" source="BUGZILLA"/>
		<reference ref_id="1042801" ref_url="https://bugzilla.suse.com/1042801" source="BUGZILLA"/>
		<reference ref_id="1043073" ref_url="https://bugzilla.suse.com/1043073" source="BUGZILLA"/>
		<reference ref_id="1043296" ref_url="https://bugzilla.suse.com/1043296" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7377" ref_url="https://www.suse.com/security/cve/CVE-2017-7377/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<reference ref_id="CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373/" source="CVE"/>
		<reference ref_id="CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374/" source="CVE"/>
		<reference ref_id="CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042159).
- CVE-2017-8379: Memory leak in the keyboard input event handlers support allowed local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events (bsc#1037334).
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037242).
- CVE-2017-7493: The VirtFS, host directory sharing via Plan 9 File System(9pfs) support, was vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could have used this flaw to escalate their privileges inside guest (bsc#1039495).
- CVE-2017-7377: The v9fs_create and v9fs_lcreate functions in hw/9pfs/9p.c allowed local guest OS privileged users to cause a denial of service (file descriptor or memory consumption) via vectors related to an already in-use fid (bsc#1032075).
- CVE-2017-8086: A memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c allowed local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable (bsc#1035950).
- CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025109)
- CVE-2017-5987: The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c allowed local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer (bsc#1025311).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028184)
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028656)
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034908)
- CVE-2017-7980: An out-of-bounds r/w access issues in the Cirrus CLGD 54xx VGA Emulator support allowed privileged user inside guest to use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on a host with privileges of Qemu process on the host (bsc#1035406)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036211).
- CVE-2017-9375: The USB xHCI controller emulator support was vulnerable to an infinite recursive call loop issue, which allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#1042800).
- CVE-2017-9374: Missing free of 's-&gt;ipacket', causes a host memory leak, allowing for DoS (bsc#1043073).
- CVE-2017-9373: The IDE AHCI Emulation support was vulnerable to a host memory leakage issue, which allowed a privileged user inside guest to leak host memory resulting in DoS (bsc#1042801).
- CVE-2017-8380: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to an out-of-bounds read access issue which allowed a privileged user inside guest to read host memory resulting in DoS (bsc#1037336).
- CVE-2016-9602: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper link following issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1020427).
- CVE-2017-7471: The VirtFS host directory sharing via Plan 9 File System(9pfs) support was vulnerable to an improper access control issue which allowed a privileged user inside guest to access host file system beyond the shared folder and potentially escalating their privileges on a host (bsc#1034866).
- Fix privilege escalation in TCG mode of QEMU. This is not considered a security issue by the upstream project, but is included as additional hardening (bsc#1030624)
- Fix potential DoS in virtfs
- CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to an out of bounds memory access issue allowing a guest user to crash the Qemu process instance on a host, resulting in DoS (bsc#1017084, bsc#1016503)
- CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to an OOB read issue allowing a guest user to crash the Qemu process instance resulting in Dos (bsc#1017081, bsc#1016504)
- CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021741)
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043296).

This non-security issue was fixed:

- Enable MONITOR/MWAIT support for guests (bsc#1031142)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1016503">SUSE bug 1016503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016504">SUSE bug 1016504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025311">SUSE bug 1025311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030624">SUSE bug 1030624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031142">SUSE bug 1031142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032075">SUSE bug 1032075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036211">SUSE bug 1036211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037334">SUSE bug 1037334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037336">SUSE bug 1037336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043073">SUSE bug 1043073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7377/">CVE-2017-7377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79852" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1004995" ref_url="https://bugzilla.suse.com/1004995" source="BUGZILLA"/>
		<reference ref_id="1029102" ref_url="https://bugzilla.suse.com/1029102" source="BUGZILLA"/>
		<reference ref_id="1029516" ref_url="https://bugzilla.suse.com/1029516" source="BUGZILLA"/>
		<reference ref_id="1036873" ref_url="https://bugzilla.suse.com/1036873" source="BUGZILLA"/>
		<reference ref_id="1038865" ref_url="https://bugzilla.suse.com/1038865" source="BUGZILLA"/>
		<reference ref_id="1040258" ref_url="https://bugzilla.suse.com/1040258" source="BUGZILLA"/>
		<reference ref_id="1040614" ref_url="https://bugzilla.suse.com/1040614" source="BUGZILLA"/>
		<reference ref_id="1040942" ref_url="https://bugzilla.suse.com/1040942" source="BUGZILLA"/>
		<reference ref_id="1043758" ref_url="https://bugzilla.suse.com/1043758" source="BUGZILLA"/>
		<reference ref_id="982303" ref_url="https://bugzilla.suse.com/982303" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003005.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issue fixed:

- CVE-2017-9217: resolved: Fix null pointer p-&gt;question dereferencing that could lead to resolved aborting (bsc#1040614)

The update also fixed several non-security bugs:

- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
  The database might be missing when upgrading a package which was
  shipping no sysv init scripts nor unit files (at the time --save was
  called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1004995">SUSE bug 1004995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029102">SUSE bug 1029102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029516">SUSE bug 1029516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036873">SUSE bug 1036873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038865">SUSE bug 1038865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040258">SUSE bug 1040258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040614">SUSE bug 1040614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040942">SUSE bug 1040942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043758">SUSE bug 1043758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982303">SUSE bug 982303</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549427" comment="libsystemd0-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549428" comment="libsystemd0-32bit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549429" comment="libudev1-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549430" comment="libudev1-32bit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549431" comment="systemd-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549432" comment="systemd-32bit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517694" comment="systemd-bash-completion-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549433" comment="systemd-sysvinit-228-149.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549434" comment="udev-228-149.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79853" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1045986" ref_url="https://bugzilla.suse.com/1045986" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003004.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A regression in the fix for the CVE-2017-1000368 that broke sudo with the
  'requiretty' flag (bsc#1045986)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1045986">SUSE bug 1045986</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549435" comment="sudo-1.8.10p3-10.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79854" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1044000" ref_url="https://bugzilla.suse.com/1044000" source="BUGZILLA"/>
		<reference ref_id="1044002" ref_url="https://bugzilla.suse.com/1044002" source="BUGZILLA"/>
		<reference ref_id="1044006" ref_url="https://bugzilla.suse.com/1044006" source="BUGZILLA"/>
		<reference ref_id="1044008" ref_url="https://bugzilla.suse.com/1044008" source="BUGZILLA"/>
		<reference ref_id="1044009" ref_url="https://bugzilla.suse.com/1044009" source="BUGZILLA"/>
		<reference ref_id="1044077" ref_url="https://bugzilla.suse.com/1044077" source="BUGZILLA"/>
		<reference ref_id="1044122" ref_url="https://bugzilla.suse.com/1044122" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

* CVE-2017-9122: A DoS in quicktime_read_moov function in moov.c via acrafted mp4 file was fixed. (bsc#1044077)
* CVE-2017-9123: An invalid memory read in lqt_frame_duration via a crafted mp4 file was fixed. (bsc#1044009)
* CVE-2017-9124: A NULL pointer dereference in quicktime_match_32 via a crafted mp4 file was fixed. (bsc#1044008)
* CVE-2017-9125: A DoS in lqt_frame_duration function in lqt_quicktime.c via crafted mp4 file was fixed. (bsc#1044122)
* CVE-2017-9126: A heap-based buffer overflow in quicktime_read_dref_table via a crafted mp4 file was fixed. (bsc#1044006)
* CVE-2017-9127: A heap-based buffer overflow in quicktime_user_atoms_read_atom via a crafted mp4 file was fixed. (bsc#1044002)
* CVE-2017-9128: A heap-based buffer over-read in quicktime_video_width via a crafted mp4 file was fixed. (bsc#1044000)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-04"/>
	<updated date="2017-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79855" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046607" ref_url="https://bugzilla.suse.com/1046607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003014.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-7526: Hardening against a local side-channel attack in RSA key handling has been added (bsc#1046607)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549437" comment="libgcrypt20-1.6.1-16.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549438" comment="libgcrypt20-32bit-1.6.1-16.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549439" comment="libgcrypt20-hmac-1.6.1-16.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549440" comment="libgcrypt20-hmac-32bit-1.6.1-16.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79856" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1044946" ref_url="https://bugzilla.suse.com/1044946" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003012.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2017-1000381: A NAPTR parser out of bounds access was fixed that could lead to crashes. (bsc#1044946)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-06"/>
	<updated date="2017-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549441" comment="libcares2-1.9.1-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79857" version="1" class="patch">
	<metadata>
		<title>Recommended update for ncurses (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000662" ref_url="https://bugzilla.suse.com/1000662" source="BUGZILLA"/>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00009.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)

Bugfixes:
- Drop patch ncurses-5.9-environment.dif as YaST2 ncurses GUI does
  not need it anymore and as well as it causes bug bsc#1000662 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-07"/>
	<updated date="2017-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000662">SUSE bug 1000662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549442" comment="libncurses5-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549443" comment="libncurses5-32bit-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549444" comment="libncurses6-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549445" comment="libncurses6-32bit-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009540858" comment="ncurses-devel-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549446" comment="ncurses-devel-32bit-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549447" comment="ncurses-utils-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549448" comment="tack-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549449" comment="terminfo-5.9-44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549450" comment="terminfo-base-5.9-44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79858" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1034173" ref_url="https://bugzilla.suse.com/1034173" source="BUGZILLA"/>
		<reference ref_id="1038337" ref_url="https://bugzilla.suse.com/1038337" source="BUGZILLA"/>
		<reference ref_id="1043398" ref_url="https://bugzilla.suse.com/1043398" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7507" ref_url="https://www.suse.com/security/cve/CVE-2017-7507/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- GNUTLS-SA-2017-4 / CVE-2017-7507: Fix crash in status response TLS extension decoding (bsc#1043398)
- GNUTLS-SA-2017-3 / CVE-2017-7869: Fix out-of-bounds write in OpenPGP certificate decoding (bsc#1034173)
- Address read of 4 bytes past the end of buffer in OpenPGP certificate parsing (bsc#1038337)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043398">SUSE bug 1043398</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7507/">CVE-2017-7507</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549451" comment="gnutls-3.2.15-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549452" comment="libgnutls-openssl27-3.2.15-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549453" comment="libgnutls28-3.2.15-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549454" comment="libgnutls28-32bit-3.2.15-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79859" version="1" class="patch">
	<metadata>
		<title>Security update for libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1025068" ref_url="https://bugzilla.suse.com/1025068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003021.html" source="SUSE-SU"/>
		<description>
This update for libICE fixes the following issues:

- CVE-2017-2626: Creation of the ICE auth session cookies used insufficient randomness, making these cookies
  predictable. A more random generation method has been implemented. (boo#1025068)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549455" comment="libICE6-1.0.8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549456" comment="libICE6-32bit-1.0.8-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79860" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046779" ref_url="https://bugzilla.suse.com/1046779" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1836-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00013.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2017-7506: A possible buffer overflow via invalid monitor configurations (bsc#1046779)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-11"/>
	<updated date="2017-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517898" comment="libspice-server1-0.12.7-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79861" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1003581" ref_url="https://bugzilla.suse.com/1003581" source="BUGZILLA"/>
		<reference ref_id="1004003" ref_url="https://bugzilla.suse.com/1004003" source="BUGZILLA"/>
		<reference ref_id="1011044" ref_url="https://bugzilla.suse.com/1011044" source="BUGZILLA"/>
		<reference ref_id="1012060" ref_url="https://bugzilla.suse.com/1012060" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012452" ref_url="https://bugzilla.suse.com/1012452" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1012910" ref_url="https://bugzilla.suse.com/1012910" source="BUGZILLA"/>
		<reference ref_id="1012985" ref_url="https://bugzilla.suse.com/1012985" source="BUGZILLA"/>
		<reference ref_id="1013561" ref_url="https://bugzilla.suse.com/1013561" source="BUGZILLA"/>
		<reference ref_id="1013887" ref_url="https://bugzilla.suse.com/1013887" source="BUGZILLA"/>
		<reference ref_id="1015342" ref_url="https://bugzilla.suse.com/1015342" source="BUGZILLA"/>
		<reference ref_id="1015452" ref_url="https://bugzilla.suse.com/1015452" source="BUGZILLA"/>
		<reference ref_id="1017461" ref_url="https://bugzilla.suse.com/1017461" source="BUGZILLA"/>
		<reference ref_id="1018885" ref_url="https://bugzilla.suse.com/1018885" source="BUGZILLA"/>
		<reference ref_id="1020412" ref_url="https://bugzilla.suse.com/1020412" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022266" ref_url="https://bugzilla.suse.com/1022266" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1023287" ref_url="https://bugzilla.suse.com/1023287" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1026570" ref_url="https://bugzilla.suse.com/1026570" source="BUGZILLA"/>
		<reference ref_id="1027101" ref_url="https://bugzilla.suse.com/1027101" source="BUGZILLA"/>
		<reference ref_id="1027512" ref_url="https://bugzilla.suse.com/1027512" source="BUGZILLA"/>
		<reference ref_id="1027974" ref_url="https://bugzilla.suse.com/1027974" source="BUGZILLA"/>
		<reference ref_id="1028217" ref_url="https://bugzilla.suse.com/1028217" source="BUGZILLA"/>
		<reference ref_id="1028310" ref_url="https://bugzilla.suse.com/1028310" source="BUGZILLA"/>
		<reference ref_id="1028340" ref_url="https://bugzilla.suse.com/1028340" source="BUGZILLA"/>
		<reference ref_id="1028883" ref_url="https://bugzilla.suse.com/1028883" source="BUGZILLA"/>
		<reference ref_id="1029607" ref_url="https://bugzilla.suse.com/1029607" source="BUGZILLA"/>
		<reference ref_id="1030057" ref_url="https://bugzilla.suse.com/1030057" source="BUGZILLA"/>
		<reference ref_id="1030070" ref_url="https://bugzilla.suse.com/1030070" source="BUGZILLA"/>
		<reference ref_id="1031040" ref_url="https://bugzilla.suse.com/1031040" source="BUGZILLA"/>
		<reference ref_id="1031142" ref_url="https://bugzilla.suse.com/1031142" source="BUGZILLA"/>
		<reference ref_id="1031147" ref_url="https://bugzilla.suse.com/1031147" source="BUGZILLA"/>
		<reference ref_id="1031470" ref_url="https://bugzilla.suse.com/1031470" source="BUGZILLA"/>
		<reference ref_id="1031500" ref_url="https://bugzilla.suse.com/1031500" source="BUGZILLA"/>
		<reference ref_id="1031512" ref_url="https://bugzilla.suse.com/1031512" source="BUGZILLA"/>
		<reference ref_id="1031555" ref_url="https://bugzilla.suse.com/1031555" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031796" ref_url="https://bugzilla.suse.com/1031796" source="BUGZILLA"/>
		<reference ref_id="1032141" ref_url="https://bugzilla.suse.com/1032141" source="BUGZILLA"/>
		<reference ref_id="1032339" ref_url="https://bugzilla.suse.com/1032339" source="BUGZILLA"/>
		<reference ref_id="1032345" ref_url="https://bugzilla.suse.com/1032345" source="BUGZILLA"/>
		<reference ref_id="1032400" ref_url="https://bugzilla.suse.com/1032400" source="BUGZILLA"/>
		<reference ref_id="1032581" ref_url="https://bugzilla.suse.com/1032581" source="BUGZILLA"/>
		<reference ref_id="1032803" ref_url="https://bugzilla.suse.com/1032803" source="BUGZILLA"/>
		<reference ref_id="1033117" ref_url="https://bugzilla.suse.com/1033117" source="BUGZILLA"/>
		<reference ref_id="1033281" ref_url="https://bugzilla.suse.com/1033281" source="BUGZILLA"/>
		<reference ref_id="1033336" ref_url="https://bugzilla.suse.com/1033336" source="BUGZILLA"/>
		<reference ref_id="1033340" ref_url="https://bugzilla.suse.com/1033340" source="BUGZILLA"/>
		<reference ref_id="1033885" ref_url="https://bugzilla.suse.com/1033885" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1034419" ref_url="https://bugzilla.suse.com/1034419" source="BUGZILLA"/>
		<reference ref_id="1034635" ref_url="https://bugzilla.suse.com/1034635" source="BUGZILLA"/>
		<reference ref_id="1034670" ref_url="https://bugzilla.suse.com/1034670" source="BUGZILLA"/>
		<reference ref_id="1034671" ref_url="https://bugzilla.suse.com/1034671" source="BUGZILLA"/>
		<reference ref_id="1034762" ref_url="https://bugzilla.suse.com/1034762" source="BUGZILLA"/>
		<reference ref_id="1034902" ref_url="https://bugzilla.suse.com/1034902" source="BUGZILLA"/>
		<reference ref_id="1034995" ref_url="https://bugzilla.suse.com/1034995" source="BUGZILLA"/>
		<reference ref_id="1035024" ref_url="https://bugzilla.suse.com/1035024" source="BUGZILLA"/>
		<reference ref_id="1035866" ref_url="https://bugzilla.suse.com/1035866" source="BUGZILLA"/>
		<reference ref_id="1035887" ref_url="https://bugzilla.suse.com/1035887" source="BUGZILLA"/>
		<reference ref_id="1035920" ref_url="https://bugzilla.suse.com/1035920" source="BUGZILLA"/>
		<reference ref_id="1035922" ref_url="https://bugzilla.suse.com/1035922" source="BUGZILLA"/>
		<reference ref_id="1036214" ref_url="https://bugzilla.suse.com/1036214" source="BUGZILLA"/>
		<reference ref_id="1036638" ref_url="https://bugzilla.suse.com/1036638" source="BUGZILLA"/>
		<reference ref_id="1036752" ref_url="https://bugzilla.suse.com/1036752" source="BUGZILLA"/>
		<reference ref_id="1036763" ref_url="https://bugzilla.suse.com/1036763" source="BUGZILLA"/>
		<reference ref_id="1037177" ref_url="https://bugzilla.suse.com/1037177" source="BUGZILLA"/>
		<reference ref_id="1037186" ref_url="https://bugzilla.suse.com/1037186" source="BUGZILLA"/>
		<reference ref_id="1037384" ref_url="https://bugzilla.suse.com/1037384" source="BUGZILLA"/>
		<reference ref_id="1037483" ref_url="https://bugzilla.suse.com/1037483" source="BUGZILLA"/>
		<reference ref_id="1037669" ref_url="https://bugzilla.suse.com/1037669" source="BUGZILLA"/>
		<reference ref_id="1037840" ref_url="https://bugzilla.suse.com/1037840" source="BUGZILLA"/>
		<reference ref_id="1037871" ref_url="https://bugzilla.suse.com/1037871" source="BUGZILLA"/>
		<reference ref_id="1037969" ref_url="https://bugzilla.suse.com/1037969" source="BUGZILLA"/>
		<reference ref_id="1038033" ref_url="https://bugzilla.suse.com/1038033" source="BUGZILLA"/>
		<reference ref_id="1038043" ref_url="https://bugzilla.suse.com/1038043" source="BUGZILLA"/>
		<reference ref_id="1038085" ref_url="https://bugzilla.suse.com/1038085" source="BUGZILLA"/>
		<reference ref_id="1038142" ref_url="https://bugzilla.suse.com/1038142" source="BUGZILLA"/>
		<reference ref_id="1038143" ref_url="https://bugzilla.suse.com/1038143" source="BUGZILLA"/>
		<reference ref_id="1038297" ref_url="https://bugzilla.suse.com/1038297" source="BUGZILLA"/>
		<reference ref_id="1038458" ref_url="https://bugzilla.suse.com/1038458" source="BUGZILLA"/>
		<reference ref_id="1038544" ref_url="https://bugzilla.suse.com/1038544" source="BUGZILLA"/>
		<reference ref_id="1038842" ref_url="https://bugzilla.suse.com/1038842" source="BUGZILLA"/>
		<reference ref_id="1038843" ref_url="https://bugzilla.suse.com/1038843" source="BUGZILLA"/>
		<reference ref_id="1038846" ref_url="https://bugzilla.suse.com/1038846" source="BUGZILLA"/>
		<reference ref_id="1038847" ref_url="https://bugzilla.suse.com/1038847" source="BUGZILLA"/>
		<reference ref_id="1038848" ref_url="https://bugzilla.suse.com/1038848" source="BUGZILLA"/>
		<reference ref_id="1038879" ref_url="https://bugzilla.suse.com/1038879" source="BUGZILLA"/>
		<reference ref_id="1038981" ref_url="https://bugzilla.suse.com/1038981" source="BUGZILLA"/>
		<reference ref_id="1038982" ref_url="https://bugzilla.suse.com/1038982" source="BUGZILLA"/>
		<reference ref_id="1039214" ref_url="https://bugzilla.suse.com/1039214" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="1039354" ref_url="https://bugzilla.suse.com/1039354" source="BUGZILLA"/>
		<reference ref_id="1039700" ref_url="https://bugzilla.suse.com/1039700" source="BUGZILLA"/>
		<reference ref_id="1039864" ref_url="https://bugzilla.suse.com/1039864" source="BUGZILLA"/>
		<reference ref_id="1039882" ref_url="https://bugzilla.suse.com/1039882" source="BUGZILLA"/>
		<reference ref_id="1039883" ref_url="https://bugzilla.suse.com/1039883" source="BUGZILLA"/>
		<reference ref_id="1039885" ref_url="https://bugzilla.suse.com/1039885" source="BUGZILLA"/>
		<reference ref_id="1039900" ref_url="https://bugzilla.suse.com/1039900" source="BUGZILLA"/>
		<reference ref_id="1040069" ref_url="https://bugzilla.suse.com/1040069" source="BUGZILLA"/>
		<reference ref_id="1040125" ref_url="https://bugzilla.suse.com/1040125" source="BUGZILLA"/>
		<reference ref_id="1040182" ref_url="https://bugzilla.suse.com/1040182" source="BUGZILLA"/>
		<reference ref_id="1040279" ref_url="https://bugzilla.suse.com/1040279" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1040395" ref_url="https://bugzilla.suse.com/1040395" source="BUGZILLA"/>
		<reference ref_id="1040425" ref_url="https://bugzilla.suse.com/1040425" source="BUGZILLA"/>
		<reference ref_id="1040463" ref_url="https://bugzilla.suse.com/1040463" source="BUGZILLA"/>
		<reference ref_id="1040567" ref_url="https://bugzilla.suse.com/1040567" source="BUGZILLA"/>
		<reference ref_id="1040609" ref_url="https://bugzilla.suse.com/1040609" source="BUGZILLA"/>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1040929" ref_url="https://bugzilla.suse.com/1040929" source="BUGZILLA"/>
		<reference ref_id="1040941" ref_url="https://bugzilla.suse.com/1040941" source="BUGZILLA"/>
		<reference ref_id="1041087" ref_url="https://bugzilla.suse.com/1041087" source="BUGZILLA"/>
		<reference ref_id="1041160" ref_url="https://bugzilla.suse.com/1041160" source="BUGZILLA"/>
		<reference ref_id="1041168" ref_url="https://bugzilla.suse.com/1041168" source="BUGZILLA"/>
		<reference ref_id="1041242" ref_url="https://bugzilla.suse.com/1041242" source="BUGZILLA"/>
		<reference ref_id="1041431" ref_url="https://bugzilla.suse.com/1041431" source="BUGZILLA"/>
		<reference ref_id="1041810" ref_url="https://bugzilla.suse.com/1041810" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1042356" ref_url="https://bugzilla.suse.com/1042356" source="BUGZILLA"/>
		<reference ref_id="1042421" ref_url="https://bugzilla.suse.com/1042421" source="BUGZILLA"/>
		<reference ref_id="1042517" ref_url="https://bugzilla.suse.com/1042517" source="BUGZILLA"/>
		<reference ref_id="1042535" ref_url="https://bugzilla.suse.com/1042535" source="BUGZILLA"/>
		<reference ref_id="1042536" ref_url="https://bugzilla.suse.com/1042536" source="BUGZILLA"/>
		<reference ref_id="1042863" ref_url="https://bugzilla.suse.com/1042863" source="BUGZILLA"/>
		<reference ref_id="1042886" ref_url="https://bugzilla.suse.com/1042886" source="BUGZILLA"/>
		<reference ref_id="1043014" ref_url="https://bugzilla.suse.com/1043014" source="BUGZILLA"/>
		<reference ref_id="1043231" ref_url="https://bugzilla.suse.com/1043231" source="BUGZILLA"/>
		<reference ref_id="1043236" ref_url="https://bugzilla.suse.com/1043236" source="BUGZILLA"/>
		<reference ref_id="1043347" ref_url="https://bugzilla.suse.com/1043347" source="BUGZILLA"/>
		<reference ref_id="1043371" ref_url="https://bugzilla.suse.com/1043371" source="BUGZILLA"/>
		<reference ref_id="1043467" ref_url="https://bugzilla.suse.com/1043467" source="BUGZILLA"/>
		<reference ref_id="1043488" ref_url="https://bugzilla.suse.com/1043488" source="BUGZILLA"/>
		<reference ref_id="1043598" ref_url="https://bugzilla.suse.com/1043598" source="BUGZILLA"/>
		<reference ref_id="1043912" ref_url="https://bugzilla.suse.com/1043912" source="BUGZILLA"/>
		<reference ref_id="1043935" ref_url="https://bugzilla.suse.com/1043935" source="BUGZILLA"/>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1044015" ref_url="https://bugzilla.suse.com/1044015" source="BUGZILLA"/>
		<reference ref_id="1044082" ref_url="https://bugzilla.suse.com/1044082" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044125" ref_url="https://bugzilla.suse.com/1044125" source="BUGZILLA"/>
		<reference ref_id="1044532" ref_url="https://bugzilla.suse.com/1044532" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1044772" ref_url="https://bugzilla.suse.com/1044772" source="BUGZILLA"/>
		<reference ref_id="1044854" ref_url="https://bugzilla.suse.com/1044854" source="BUGZILLA"/>
		<reference ref_id="1044880" ref_url="https://bugzilla.suse.com/1044880" source="BUGZILLA"/>
		<reference ref_id="1044912" ref_url="https://bugzilla.suse.com/1044912" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045235" ref_url="https://bugzilla.suse.com/1045235" source="BUGZILLA"/>
		<reference ref_id="1045286" ref_url="https://bugzilla.suse.com/1045286" source="BUGZILLA"/>
		<reference ref_id="1045307" ref_url="https://bugzilla.suse.com/1045307" source="BUGZILLA"/>
		<reference ref_id="1045467" ref_url="https://bugzilla.suse.com/1045467" source="BUGZILLA"/>
		<reference ref_id="1045568" ref_url="https://bugzilla.suse.com/1045568" source="BUGZILLA"/>
		<reference ref_id="1046105" ref_url="https://bugzilla.suse.com/1046105" source="BUGZILLA"/>
		<reference ref_id="1046434" ref_url="https://bugzilla.suse.com/1046434" source="BUGZILLA"/>
		<reference ref_id="1046589" ref_url="https://bugzilla.suse.com/1046589" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="922871" ref_url="https://bugzilla.suse.com/922871" source="BUGZILLA"/>
		<reference ref_id="939801" ref_url="https://bugzilla.suse.com/939801" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966321" ref_url="https://bugzilla.suse.com/966321" source="BUGZILLA"/>
		<reference ref_id="966339" ref_url="https://bugzilla.suse.com/966339" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="988065" ref_url="https://bugzilla.suse.com/988065" source="BUGZILLA"/>
		<reference ref_id="989311" ref_url="https://bugzilla.suse.com/989311" source="BUGZILLA"/>
		<reference ref_id="990058" ref_url="https://bugzilla.suse.com/990058" source="BUGZILLA"/>
		<reference ref_id="990682" ref_url="https://bugzilla.suse.com/990682" source="BUGZILLA"/>
		<reference ref_id="993832" ref_url="https://bugzilla.suse.com/993832" source="BUGZILLA"/>
		<reference ref_id="995542" ref_url="https://bugzilla.suse.com/995542" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365/" source="CVE"/>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<reference ref_id="CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346/" source="CVE"/>
		<reference ref_id="CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924/" source="CVE"/>
		<reference ref_id="CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9150" ref_url="https://www.suse.com/security/cve/CVE-2017-9150/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).
- CVE-2017-7346: The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate certain levels data, which allowed local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031796).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow. (bsc#1038982)
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling. (bsc#1038981)
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).
- CVE-2017-9150: The do_check function in kernel/bpf/verifier.c in the Linux kernel did not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allowed local users to obtain sensitive address information via crafted bpf system calls (bnc#1040279).
- CVE-2017-7618: crypto/ahash.c in the Linux kernel allowed attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue (bnc#1033340).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).

The following non-security bugs were fixed:

- 9p: fix a potential acl leak (4.4.68 stable queue).
- acpi / APEI: Add missing synchronize_rcu() on NOTIFY_SCI removal (bsc#1031717).
- acpi / scan: Drop support for force_remove (bnc#1029607).
- ahci: disable correct irq for dummy ports (bsc#1040125).
- alsa: hda - Fix deadlock of controller device lock at unbinding (4.4.68 stable queue).
- arm: 8452/3: PJ4: make coprocessor access sequences buildable in Thumb2 mode (4.4.68 stable queue).
- arm: OMAP5 / DRA7: Fix HYP mode boot for thumb2 build (4.4.68 stable queue).
- ASoC: Intel: Skylake: Uninitialized variable in probe_codec() (bsc#1043231).
- ASoC: rt5640: use msleep() for long delays (bsc#1031717).
- ASoC: sti: Fix error handling if of_clk_get() fails (bsc#1031717).
- bcache: fix calling ida_simple_remove() with incorrect minor (bsc#1038085).
- block: copy NOMERGE flag from bio to request (bsc#1030070).
- block: get rid of blk_integrity_revalidate() (4.4.68 stable queue).
- bna: add missing per queue ethtool stat (bsc#966321).
- bna: avoid writing uninitialized data into hw registers (bsc#966321).
- bna: integer overflow bug in debugfs (bsc#966321).
- bnxt_en: allocate enough space for -&gt;ntp_fltr_bmap (bsc#1020412 FATE#321671).
- bonding: avoid defaulting hard_header_len to ETH_HLEN on slave removal (bsc#1042286).
- bonding: do not use stale speed and duplex information (bsc#1042286).
- bonding: prevent out of bound accesses (bsc#1042286).
- bpf, arm64: fix jit branch offset related to ldimm64 (4.4.68 stable queue).
- brcmfmac: add fallback for devices that do not report per-chain values (bsc#1043231).
- brcmfmac: avoid writing channel out of allocated array (bsc#1043231).
- brcmfmac: Ensure pointer correctly set if skb data location changes (4.4.68 stable queue).
- brcmfmac: Make skb header writable before use (4.4.68 stable queue).
- brcmfmac: restore stopping netdev queue when bus clogs up (bsc#1031717).
- btrfs: add a flags field to btrfs_fs_info (bsc#1012452).
- btrfs: add ASSERT for block group's memory leak (bsc#1012452).
- btrfs: add btrfs_trans_handle-&gt;fs_info pointer (bsc#1012452).
- btrfs: add bytes_readonly to the spaceinfo at once (bsc#1012452).
- btrfs: add check to sysfs handler of label (bsc#1012452).
- btrfs: add dynamic debug support (bsc#1012452).
- btrfs: add error handling for extent buffer in print tree (bsc#1012452).
- btrfs: add missing bytes_readonly attribute file in sysfs (bsc#1012452).
- btrfs: add missing check for writeback errors on fsync (bsc#1012452).
- btrfs: add more validation checks for superblock (bsc#1012452).
- btrfs: Add ratelimit to btrfs printing (bsc#1012452).
- btrfs: add read-only check to sysfs handler of features (bsc#1012452).
- btrfs: add semaphore to synchronize direct IO writes with fsync (bsc#1012452).
- btrfs: add tracepoint for adding block groups (bsc#1012452).
- btrfs: add tracepoints for flush events (bsc#1012452).
- btrfs: add transaction space reservation tracepoints (bsc#1012452).
- btrfs: add validadtion checks for chunk loading (bsc#1012452).
- btrfs: add write protection to SET_FEATURES ioctl (bsc#1012452).
- btrfs: allow balancing to dup with multi-device (bsc#1012452).
- btrfs: always reserve metadata for delalloc extents (bsc#1012452).
- btrfs: always use trans-&gt;block_rsv for orphans (bsc#1012452).
- btrfs: avoid blocking open_ctree from cleaner_kthread (bsc#1012452).
- btrfs: avoid deadlocks during reservations in btrfs_truncate_block (bsc#1012452).
- btrfs: avoid overflowing f_bfree (bsc#1012452).
- btrfs: avoid uninitialized variable warning (bsc#1012452).
- btrfs: btrfs_abort_transaction, drop root parameter (bsc#1012452).
- btrfs: __btrfs_buffered_write: Pass valid file offset when releasing delalloc space (bsc#1012452).
- btrfs: __btrfs_buffered_write: Reserve/release extents aligned to block size (bsc#1012452).
- btrfs: btrfs_check_super_valid: Allow 4096 as stripesize (bsc#1012452).
- btrfs: btrfs_debug should consume fs_info when DEBUG is not defined (bsc#1012452).
- btrfs: btrfs_ioctl_clone: Truncate complete page after performing clone operation (bsc#1012452).
- btrfs: btrfs_page_mkwrite: Reserve space in sectorsized units (bsc#1012452).
- btrfs: btrfs_relocate_chunk pass extent_root to btrfs_end_transaction (bsc#1012452).
- btrfs: btrfs_submit_direct_hook: Handle map_length &lt; bio vector length (bsc#1012452).
- btrfs: build fixup for qgroup_account_snapshot (bsc#1012452).
- btrfs: change BUG_ON()'s to ASSERT()'s in backref_cache_cleanup() (bsc#1012452).
- btrfs: change delayed reservation fallback behavior (bsc#1012452).
- btrfs: change how we calculate the global block rsv (bsc#1012452).
- btrfs: change how we update the global block rsv (bsc#1012452).
- btrfs: check btree node's nritems (bsc#1012452).
- btrfs: check if extent buffer is aligned to sectorsize (bsc#1012452).
- btrfs: check inconsistence between chunk and block group (bsc#1012452).
- btrfs: check reserved when deciding to background flush (bsc#1012452).
- btrfs: clarify do_chunk_alloc()'s return value (bsc#1012452).
- btrfs: Clean pte corresponding to page straddling i_size (bsc#1012452).
- btrfs: clean the old superblocks before freeing the device (bsc#1012452).
- btrfs: clean up and optimize __check_raid_min_device() (bsc#1012452).
- btrfs: cleanup assigning next active device with a check (bsc#1012452).
- btrfs: cleanup BUG_ON in merge_bio (bsc#1012452).
- btrfs: Cleanup compress_file_range() (bsc#1012452).
- btrfs: cleanup error handling in extent_write_cached_pages (bsc#1012452).
- btrfs: clear uptodate flags of pages in sys_array eb (bsc#1012452).
- btrfs: clone: use vmalloc only as fallback for nodesize bufer (bsc#1012452).
- btrfs: Compute and look up csums based on sectorsized blocks (bsc#1012452).
- btrfs: convert nodesize macros to static inlines (bsc#1012452).
- btrfs: convert printk(KERN_* to use pr_* calls (bsc#1012452).
- btrfs: convert pr_* to btrfs_* where possible (bsc#1012452).
- btrfs: convert send's verbose_printk to btrfs_debug (bsc#1012452).
- btrfs: copy_to_sk drop unused root parameter (bsc#1012452).
- btrfs: create a helper function to read the disk super (bsc#1012452).
- btrfs: create example debugfs file only in debugging build (bsc#1012452).
- btrfs: create helper btrfs_find_device_by_user_input() (bsc#1012452).
- btrfs: create helper function __check_raid_min_devices() (bsc#1012452).
- btrfs: csum_tree_block: return proper errno value (bsc#1012452).
- btrfs: detect corruption when non-root leaf has zero item (bsc#1012452).
- btrfs: device add and remove: use GFP_KERNEL (bsc#1012452).
- btrfs: Direct I/O read: Work on sectorsized blocks (bsc#1012452).
- btrfs: disable possible cause of premature ENOSPC (bsc#1040182)
- btrfs: divide btrfs_update_reserved_bytes() into two functions (bsc#1012452).
- btrfs: do not background blkdev_put() (bsc#1012452).
- btrfs: do not bother kicking async if there's nothing to reclaim (bsc#1012452).
- btrfs: do not BUG_ON() in btrfs_orphan_add (bsc#1012452).
- btrfs: do not create empty block group if we have allocated data (bsc#1012452).
- btrfs: do not decrease bytes_may_use when replaying extents (bsc#1012452).
- btrfs: do not do nocow check unless we have to (bsc#1012452).
- btrfs: do not do unnecessary delalloc flushes when relocating (bsc#1012452).
- btrfs: do not force mounts to wait for cleaner_kthread to delete one or more subvolumes (bsc#1012452).
- btrfs: do not wait for unrelated IO to finish before relocation (bsc#1012452).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1035866).
- btrfs: do not write corrupted metadata blocks to disk (bsc#1012452).
- btrfs: end transaction if we abort when creating uuid root (bsc#1012452).
- btrfs: enhance btrfs_find_device_by_user_input() to check device path (bsc#1012452).
- btrfs: error out if generic_bin_search get invalid arguments (bsc#1012452).
- btrfs: expand cow_file_range() to support in-band dedup and subpage-blocksize (bsc#1012452).
- btrfs: extend btrfs_set_extent_delalloc and its friends to support in-band dedupe and subpage size patchset (bsc#1012452).
- btrfs: extent same: use GFP_KERNEL for page array allocations (bsc#1012452).
- btrfs: fallback to vmalloc in btrfs_compare_tree (bsc#1012452).
- btrfs: fallocate: use GFP_KERNEL (bsc#1012452).
- btrfs: fallocate: Work with sectorsized blocks (bsc#1012452).
- btrfs: fill relocation block rsv after allocation (bsc#1012452).
- btrfs: fix an integer overflow check (bsc#1012452).
- btrfs: fix a possible umount deadlock (bsc#1012452).
- btrfs: Fix block size returned to user space (bsc#1012452).
- btrfs: fix btrfs_no_printk stub helper (bsc#1012452).
- btrfs: Fix BUG_ON condition in scrub_setup_recheck_block() (bsc#1012452).
- btrfs: fix BUG_ON in btrfs_mark_buffer_dirty (bsc#1012452).
- btrfs: fix BUG_ON in btrfs_submit_compressed_write (bsc#1012452).
- btrfs: fix build warning (bsc#1012452).
- btrfs: fix callers of btrfs_block_rsv_migrate (bsc#1012452).
- btrfs: fix check_direct_IO() for non-iovec iterators (bsc#1012452).
- btrfs: fix check_shared for fiemap ioctl (bsc#1037177).
- btrfs: fix crash when tracepoint arguments are freed by wq callbacks (bsc#1012452).
- btrfs: fix data loss after truncate when using the no-holes feature (bsc#1036214).
- btrfs: fix deadlock in delayed_ref_async_start (bsc#1012452).
- btrfs: fix delalloc accounting after copy_from_user faults (bsc#1012452).
- btrfs: fix delalloc reservation amount tracepoint (bsc#1012452).
- btrfs: fix disk_i_size update bug when fallocate() fails (bsc#1012452).
- btrfs: fix divide error upon chunk's stripe_len (bsc#1012452).
- btrfs: fix double free of fs root (bsc#1012452).
- btrfs: fix eb memory leak due to readpage failure (bsc#1012452).
- btrfs: fix em leak in find_first_block_group (bsc#1012452).
- btrfs: fix emptiness check for dirtied extent buffers at check_leaf() (bsc#1012452).
- btrfs: fix error handling in map_private_extent_buffer (bsc#1012452).
- btrfs: fix error return code in btrfs_init_test_fs() (bsc#1012452).
- btrfs: fix extent_same allowing destination offset beyond i_size (bsc#1012452).
- btrfs: fix free space calculation in dump_space_info() (bsc#1012452).
- btrfs: fix fsfreeze hang caused by delayed iputs deal (bsc#1012452).
- btrfs: fix fspath error deallocation (bsc#1012452).
- btrfs: fix handling of faults from btrfs_copy_from_user (bsc#1012452).
- btrfs: fix int32 overflow in shrink_delalloc() (bsc#1012452).
- btrfs: Fix integer overflow when calculating bytes_per_bitmap (bsc#1012452).
- btrfs: fix invalid dereference in btrfs_retry_endio (bsc#1040395).
- btrfs: fix invalid reference in replace_path (bsc#1012452).
- btrfs: fix listxattrs not listing all xattrs packed in the same item (bsc#1012452).
- btrfs: fix lockdep deadlock warning due to dev_replace (bsc#1012452).
- btrfs: fix lock dep warning, move scratch dev out of device_list_mutex and uuid_mutex (bsc#1012452).
- btrfs: fix lock dep warning move scratch super outside of chunk_mutex (bsc#1012452).
- btrfs: fix __MAX_CSUM_ITEMS (bsc#1012452).
- btrfs: fix memory leak during RAID 5/6 device replacement (bsc#1012452).
- btrfs: fix memory leak of block group cache (bsc#1012452).
- btrfs: fix memory leak of reloc_root (bsc#1012452).
- btrfs: fix mixed block count of available space (bsc#1012452).
- btrfs: fix one bug that process may endlessly wait for ticket in wait_reserve_ticket() (bsc#1012452).
- btrfs: fix panic in balance due to EIO (bsc#1012452).
- btrfs: fix race between block group relocation and nocow writes (bsc#1012452).
- btrfs: fix race between device replace and block group removal (bsc#1012452).
- btrfs: fix race between device replace and chunk allocation (bsc#1012452).
- btrfs: fix race between device replace and discard (bsc#1012452).
- btrfs: fix race between device replace and read repair (bsc#1012452).
- btrfs: fix race between fsync and direct IO writes for prealloc extents (bsc#1012452).
- btrfs: fix race between readahead and device replace/removal (bsc#1012452).
- btrfs: fix race setting block group back to RW mode during device replace (bsc#1012452).
- btrfs: fix race setting block group readonly during device replace (bsc#1012452).
- btrfs: fix read_node_slot to return errors (bsc#1012452).
- btrfs: fix release reserved extents trace points (bsc#1012452).
- btrfs: fix segmentation fault when doing dio read (bsc#1040425).
- btrfs: Fix slab accounting flags (bsc#1012452).
- btrfs: fix truncate_space_check (bsc#1012452).
- btrfs: fix unexpected return value of fiemap (bsc#1012452).
- btrfs: fix unprotected assignment of the left cursor for device replace (bsc#1012452).
- btrfs: fix WARNING in btrfs_select_ref_head() (bsc#1012452).
- btrfs: flush_space: treat return value of do_chunk_alloc properly (bsc#1012452).
- btrfs: Force stripesize to the value of sectorsize (bsc#1012452).
- btrfs: free sys_array eb as soon as possible (bsc#1012452).
- btrfs: GFP_NOFS does not GFP_HIGHMEM (bsc#1012452).
- btrfs: Handle uninitialised inode eviction (bsc#1012452).
- btrfs: hide test-only member under ifdef (bsc#1012452).
- btrfs: improve check_node to avoid reading corrupted nodes (bsc#1012452).
- btrfs: Improve FL_KEEP_SIZE handling in fallocate (bsc#1012452).
- btrfs: introduce BTRFS_MAX_ITEM_SIZE (bsc#1012452).
- btrfs: introduce device delete by devid (bsc#1012452).
- btrfs: introduce raid-type to error-code table, for minimum device constraint (bsc#1012452).
- btrfs: introduce ticketed enospc infrastructure (bsc#1012452).
- btrfs: introduce tickets_id to determine whether asynchronous metadata reclaim work makes progress (bsc#1012452).
- btrfs: ioctl: reorder exclusive op check in RM_DEV (bsc#1012452).
- btrfs: kill BUG_ON in do_relocation (bsc#1012452).
- btrfs: kill BUG_ON in run_delayed_tree_ref (bsc#1012452).
- btrfs: kill BUG_ON()'s in btrfs_mark_extent_written (bsc#1012452).
- btrfs: kill invalid ASSERT() in process_all_refs() (bsc#1012452).
- btrfs: kill the start argument to read_extent_buffer_pages (bsc#1012452).
- btrfs: kill unused writepage_io_hook callback (bsc#1012452).
- btrfs: let callers of btrfs_alloc_root pass gfp flags (bsc#1012452).
- btrfs: Limit inline extents to root-&gt;sectorsize (bsc#1012452).
- btrfs: make find_workspace always succeed (bsc#1012452).
- btrfs: make find_workspace warn if there are no workspaces (bsc#1012452).
- btrfs: make mapping-&gt;writeback_index point to the last written page (bsc#1012452).
- btrfs: make state preallocation more speculative in __set_extent_bit (bsc#1012452).
- btrfs: make sure device is synced before return (bsc#1012452).
- btrfs: make sure we stay inside the bvec during __btrfs_lookup_bio_sums (bsc#1012452).
- btrfs: make use of btrfs_find_device_by_user_input() (bsc#1012452).
- btrfs: make use of btrfs_scratch_superblocks() in btrfs_rm_device() (bsc#1012452).
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: memset to avoid stale content in btree leaf (bsc#1012452).
- btrfs: memset to avoid stale content in btree node block (bsc#1012452).
- btrfs: move error handling code together in ctree.h (bsc#1012452).
- btrfs: optimize check for stale device (bsc#1012452).
- btrfs: Output more info for enospc_debug mount option (bsc#1012452).
- btrfs: parent_start initialization cleanup (bsc#1012452).
- btrfs: pass correct args to btrfs_async_run_delayed_refs() (bsc#1012452).
- btrfs: pass number of devices to btrfs_check_raid_min_devices (bsc#1012452).
- btrfs: pass the right error code to the btrfs_std_error (bsc#1012452).
- btrfs: preallocate compression workspaces (bsc#1012452).
- btrfs: Print Warning only if ENOSPC_DEBUG is enabled (bsc#1012452).
- btrfs: Ratelimit 'no csum found' info message (bsc#1012452).
- btrfs: reada: add all reachable mirrors into reada device list (bsc#1012452).
- btrfs: reada: Add missed segment checking in reada_find_zone (bsc#1012452).
- btrfs: reada: Avoid many times of empty loop (bsc#1012452).
- btrfs: reada: avoid undone reada extents in btrfs_reada_wait (bsc#1012452).
- btrfs: reada: bypass adding extent when all zone failed (bsc#1012452).
- btrfs: reada: Fix a debug code typo (bsc#1012452).
- btrfs: reada: Fix in-segment calculation for reada (bsc#1012452).
- btrfs: reada: ignore creating reada_extent for a non-existent device (bsc#1012452).
- btrfs: reada: Jump into cleanup in direct way for __readahead_hook() (bsc#1012452).
- btrfs: reada: limit max works count (bsc#1012452).
- btrfs: reada: Move is_need_to_readahead contition earlier (bsc#1012452).
- btrfs: reada: move reada_extent_put to place after __readahead_hook() (bsc#1012452).
- btrfs: reada: Pass reada_extent into __readahead_hook directly (bsc#1012452).
- btrfs: reada: reduce additional fs_info-&gt;reada_lock in reada_find_zone (bsc#1012452).
- btrfs: reada: Remove level argument in severial functions (bsc#1012452).
- btrfs: reada: simplify dev-&gt;reada_in_flight processing (bsc#1012452).
- btrfs: reada: Use fs_info instead of root in __readahead_hook's argument (bsc#1012452).
- btrfs: reada: use GFP_KERNEL everywhere (bsc#1012452).
- btrfs: readdir: use GFP_KERNEL (bsc#1012452).
- btrfs: refactor btrfs_dev_replace_start for reuse (bsc#1012452).
- btrfs: Refactor btrfs_lock_cluster() to kill compiler warning (bsc#1012452).
- btrfs: remove BUG() in raid56 (bsc#1012452).
- btrfs: remove BUG_ON in start_transaction (bsc#1012452).
- btrfs: remove BUG_ON()'s in btrfs_map_block (bsc#1012452).
- btrfs: remove build fixup for qgroup_account_snapshot (bsc#1012452).
- btrfs: remove redundant error check (bsc#1012452).
- btrfs: remove save_error_info() (bsc#1012452).
- btrfs: remove unnecessary btrfs_mark_buffer_dirty in split_leaf (bsc#1012452).
- btrfs: remove unused function btrfs_assert() (bsc#1012452).
- btrfs: rename and document compression workspace members (bsc#1012452).
- btrfs: rename btrfs_find_device_by_user_input (bsc#1012452).
- btrfs: rename btrfs_std_error to btrfs_handle_fs_error (bsc#1012452).
- btrfs: rename __check_raid_min_devices (bsc#1012452).
- btrfs: rename flags for vol args v2 (bsc#1012452).
- btrfs: reorg btrfs_close_one_device() (bsc#1012452).
- btrfs: Replace -ENOENT by -ERANGE in btrfs_get_acl() (bsc#1012452).
- btrfs: Reset IO error counters before start of device replacing (bsc#1012452).
- btrfs: reuse existing variable in scrub_stripe, reduce stack usage (bsc#1012452).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- btrfs: s_bdev is not null after missing replace (bsc#1012452).
- btrfs: scrub: Set bbio to NULL before calling btrfs_map_block (bsc#1012452).
- btrfs: scrub: use GFP_KERNEL on the submission path (bsc#1012452).
- btrfs: Search for all ordered extents that could span across a page (bsc#1012452).
- btrfs: send: silence an integer overflow warning (bsc#1012452).
- btrfs: send: use GFP_KERNEL everywhere (bsc#1012452).
- btrfs: send: use temporary variable to store allocation size (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for clone_roots (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for clone_sources_tmp (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for read_buf (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for send_buf (bsc#1012452).
- btrfs: Simplify conditions about compress while mapping btrfs flags to inode flags (bsc#1012452).
- btrfs: sink gfp parameter to clear_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to clear_extent_dirty (bsc#1012452).
- btrfs: sink gfp parameter to clear_record_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to convert_extent_bit (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_defrag (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_delalloc (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_new (bsc#1012452).
- btrfs: sink gfp parameter to set_record_extent_bits (bsc#1012452).
- btrfs: skip commit transaction if we do not have enough pinned bytes (bsc#1037186).
- btrfs: subpage-blocksize: Rate limit scrub error message (bsc#1012452).
- btrfs: switch to common message helpers in open_ctree, adjust messages (bsc#1012452).
- btrfs: switch to kcalloc in btrfs_cmp_data_prepare (bsc#1012452).
- btrfs: sysfs: protect reading label by lock (bsc#1012452).
- btrfs: trace pinned extents (bsc#1012452).
- btrfs: track transid for delayed ref flushing (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, document subvol flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move balance flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move BTRFS_LABEL_SIZE (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move feature flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move struct btrfs_ioctl_defrag_range_args (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, qgroup limit flags (bsc#1012452).
- btrfs: uapi/linux/btrfs_tree.h migration, item types and defines (bsc#1012452).
- btrfs: uapi/linux/btrfs_tree.h, use __u8 and __u64 (bsc#1012452).
- btrfs: unsplit printed strings (bsc#1012452).
- btrfs: untangle gotos a bit in __clear_extent_bit (bsc#1012452).
- btrfs: untangle gotos a bit in convert_extent_bit (bsc#1012452).
- btrfs: untangle gotos a bit in __set_extent_bit (bsc#1012452).
- btrfs: update btrfs_space_info's bytes_may_use timely (bsc#1012452).
- btrfs: Use correct format specifier (bsc#1012452).
- btrfs: use correct offset for reloc_inode in prealloc_file_extent_cluster() (bsc#1012452).
- btrfs: use dynamic allocation for root item in create_subvol (bsc#1012452).
- btrfs: Use (eb-&gt;start, seq) as search key for tree modification log (bsc#1012452).
- btrfs: use existing device constraints table btrfs_raid_array (bsc#1012452).
- btrfs: use FLUSH_LIMIT for relocation in reserve_metadata_bytes (bsc#1012452).
- btrfs: use fs_info directly (bsc#1012452).
- btrfs: use new error message helper in qgroup_account_snapshot (bsc#1012452).
- btrfs: use proper type for failrec in extent_state (bsc#1012452).
- btrfs: use root when checking need_async_flush (bsc#1012452).
- btrfs: use the correct struct for BTRFS_IOC_LOGICAL_INO (bsc#1012452).
- btrfs: Use __u64 in exported linux/btrfs.h (bsc#1012452).
- btrfs: warn_on for unaccounted spaces (bsc#1012452).
- ceph: check i_nlink while converting a file handle to dentry (bsc#1039864).
- ceph: Check that the new inode size is within limits in ceph_fallocate() (bsc#1037969).
- ceph: Correctly return NXIO errors from ceph_llseek (git-fixes).
- ceph: fix file open flags on ppc64 (bsc#1022266).
- ceph: fix memory leak in __ceph_setxattr() (bsc#1036763).
- ceph: fix potential use-after-free (bsc#1043371).
- ceph: fix recursively call between ceph_set_acl and __ceph_setattr (bsc#1034902).
- ceph: memory leak in ceph_direct_read_write callback (bsc#1041810).
- cfq-iosched: fix the delay of cfq_group's vdisktime under iops mode (bsc#1012829).
- cgroup: remove redundant cleanup in css_create (bsc#1012829).
- cifs: backport prepath matching fix (bsc#799133).
- cifs: small underflow in cnvrtDosUnixTm() (bnc#1043935).
- clk: Make x86/ conditional on CONFIG_COMMON_CLK (4.4.68 stable queue).
- cpupower: Fix turbo frequency reporting for pre-Sandy Bridge cores (4.4.68 stable queue).
- crypto: algif_aead - Require setkey before accept(2) (bsc#1031717).
- crypto: sha-mb - Fix load failure (bsc#1037384).
- cxgb4: Add control net_device for configuring PCIe VF (bsc#1021424).
- cxgb4: Add llseek operation for flash debugfs entry (bsc#1021424).
- cxgb4: add new routine to get adapter info (bsc#1021424).
- cxgb4: Add PCI device ID for new adapter (bsc#1021424).
- cxgb4: Add port description for new cards (bsc#1021424).
- cxgb4: Add support to enable logging of firmware mailbox commands (bsc#1021424).
- cxgb4: Check for firmware errors in the mailbox command loop (bsc#1021424).
- cxgb4: correct device ID of T6 adapter (bsc#1021424).
- cxgb4/cxgb4vf: Add set VF mac address support (bsc#1021424).
- cxgb4/cxgb4vf: Allocate more queues for 25G and 100G adapter (bsc#1021424).
- cxgb4/cxgb4vf: Assign netdev-&gt;dev_port with port ID (bsc#1021424).
- cxgb4/cxgb4vf: Display 25G and 100G link speed (bsc#1021424).
- cxgb4/cxgb4vf: Remove deprecated module parameters (bsc#1021424).
- cxgb4: DCB message handler needs to use correct portid to netdev mapping (bsc#1021424).
- cxgb4: Decode link down reason code obtained from firmware (bsc#1021424).
- cxgb4: Do not assume FW_PORT_CMD reply is always port info msg (bsc#1021424).
- cxgb4: do not call napi_hash_del() (bsc#1021424).
- cxgb4: Do not sleep when mbox cmd is issued from interrupt context (bsc#1021424).
- cxgb4: Enable SR-IOV configuration via PCI sysfs interface (bsc#1021424).
- cxgb4: Fix issue while re-registering VF mgmt netdev (bsc#1021424).
- cxgb4: MU requested by Chelsio (bsc#1021424).
- cxgb4: Properly decode port module type (bsc#1021424).
- cxgb4: Refactor t4_port_init function (bsc#1021424).
- cxgb4: Reset dcb state machine and tx queue prio only if dcb is enabled (bsc#1021424).
- cxgb4: Support compressed error vector for T6 (bsc#1021424).
- cxgb4: Synchronize access to mailbox (bsc#1021424).
- cxgb4: update latest firmware version supported (bsc#1021424).
- dell-laptop: Adds support for keyboard backlight timeout AC settings (bsc#1013561).
- Disable CONFIG_POWER_SUPPLY_DEBUG in debug kernel (bsc#1031500).
- dmaengine: dw: fix typo in Kconfig (bsc#1031717).
- dm: fix dm_target_io leak if clone_bio() returns an error (bsc#1040125).
- dm-mpath: fix race window in do_end_io() (bsc#1011044).
- dm: remove dummy dm_table definition (bsc#1045307)
- dm round robin: do not use this_cpu_ptr() without having preemption disabled (bsc#1040125).
- dm verity fec: fix block calculation (bsc#1040125).
- dm verity fec: fix bufio leaks (bsc#1040125).
- dm verity fec: limit error correction recursion (bsc#1040125).
- drivers: base: dma-mapping: Fix typo in dmam_alloc_non_coherent comments (bsc#1031717).
- Drivers: hv: vmbus: Raise retry/wait limits in vmbus_post_msg() (fate#320485, bsc#1023287, bsc#1028217).
- drivers/tty: 8250: only call fintek_8250_probe when doing port I/O (bsc#1031717).
- drm/i915: Disable tv output on i9x5gm (bsc#1039700).
- drm/i915: Do not touch NULL sg on i915_gem_object_get_pages_gtt() error (bsc#1031717).
- drm/i915: Fix mismatched INIT power domain disabling during suspend (bsc#1031717).
- drm/i915: Introduce Kabypoint PCH for Kabylake H/DT (bsc#1032581).
- drm/i915: Nuke debug messages from the pipe update critical section (bsc#1031717).
- drm/i915: Program iboost settings for HDMI/DVI on SKL (bsc#1031717).
- drm/i915: relax uncritical udelay_range() (bsc#1031717).
- drm/i915: relax uncritical udelay_range() settings (bsc#1031717).
- drm/i915: Use pagecache write to prepopulate shmemfs from pwrite-ioctl (bsc#1040463).
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- drm/nouveau/tmr: fully separate alarm execution/pending lists (bsc#1043467).
- drm/ttm: fix use-after-free races in vm fault handling (4.4.68 stable queue).
- e1000e: Do not return uninitialized stats (bug#1034635).
- efi: Do not issue error message when booted under Xen (bnc#1036638).
- enic: set skb-&gt;hash type properly (bsc#922871 fate#318754).
- ext4: fix data corruption for mmap writes (bsc#1012829).
- ext4: fix data corruption with EXT4_GET_BLOCKS_ZERO (bsc#1012829).
- ext4: fix use-after-iput when fscrypt contexts are inconsistent (bsc#1012829).
- f2fs: fix bad prefetchw of NULL page (bsc#1012829).
- f2fs: sanity check segment count (4.4.68 stable queue).
- Fix kabi after adding new field to struct mddev (bsc#1040351).
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (git-fixes).
- ftrace: Make ftrace_location_range() global (FATE#322421).
- fuse: fix clearing suid, sgid for chown() (bsc#1012829).
- hpsa: limit transfer length to 1MB (bsc#1025461).
- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).
- ib/addr: Fix setting source address in addr6_resolve() (bsc#1044082).
- ib/core: Fix kernel crash during fail to initialize device (bsc#1022595).
- ib/core: For multicast functions, verify that LIDs are multicast LIDs (bsc#1022595).
- ib/core: If the MGID/MLID pair is not on the list return an error (bsc#1022595).
- ib/ipoib: Fix deadlock between ipoib_stop and mcast join flow (bsc#1022595).
- ib/ipoib: Fix memory leak in create child syscall (bsc#1022595).
- ib/mlx5: Assign DSCP for R-RoCE QPs Address Path (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Check supported flow table size (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Enlarge autogroup flow table (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Fix kernel to user leak prevention logic (bsc#966170 bsc#966172 bsc#966191).
- ibmvnic: Activate disabled RX buffer pools on reset (bsc#1044767).
- ibmvnic: Add set_link_state routine for setting adapter link state (fate#322021, bsc#1031512).
- ibmvnic: Allocate number of rx/tx buffers agreed on by firmware (fate#322021, bsc#1031512).
- ibmvnic: Allocate zero-filled memory for sub crqs (fate#322021, bsc#1031512).
- ibmvnic: Call napi_disable instead of napi_enable in failure path (fate#322021, bsc#1031512).
- ibmvnic: Check adapter state during ibmvnic_poll (fate#322021, bsc#1040855).
- ibmvnic: Check for driver reset first in ibmvnic_xmit (fate#322021, bsc#1038297).
- ibmvnic: Cleanup failure path in ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Clean up tx pools when closing (fate#322021, bsc#1038297).
- ibmvnic: Client-initiated failover (bsc#1043990).
- ibmvnic: Continue skb processing after skb completion error (fate#322021, bsc#1038297).
- ibmvnic: Correct crq and resource releasing (fate#322021, bsc#1031512).
- ibmvnic: Correct ibmvnic handling of device open/close (fate#322021, bsc#1031512).
- ibmvnic: Correct return code checking for ibmvnic_init during probe (bsc#1045286).
- ibmvnic: Create init and release routines for the bounce buffer (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the rx pool (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the tx pool (fate#322021, bsc#1031512).
- ibmvnic: Create init/release routines for stats token (fate#322021, bsc#1031512).
- ibmvnic: Deactivate RX pool buffer replenishment on H_CLOSED (fate#322021, bsc#1040855).
- ibmvnic: Delete napi's when releasing driver resources (fate#322021, bsc#1038297).
- ibmvnic: Disable irq prior to close (fate#322021, bsc#1031512).
- ibmvnic: Do not disable IRQ after scheduling tasklet (fate#322021, bsc#1031512).
- ibmvnic: driver initialization for kdump/kexec (bsc#1044772).
- ibmvnic: Ensure that TX queues are disabled in __ibmvnic_close (bsc#1044767).
- ibmvnic: Exit polling routine correctly during adapter reset (bsc#1044767).
- ibmvnic: Fix assignment of RX/TX IRQ's (bsc#1046589).
- ibmvnic: Fix cleanup of SKB's on driver close (fate#322021, bsc#1040855).
- ibmvnic: Fix endian errors in error reporting output (fate#322021, bsc#1031512).
- ibmvnic: Fix endian error when requesting device capabilities (fate#322021, bsc#1031512).
- ibmvnic: Fix error handling when registering long-term-mapped  buffers (bsc#1045568).
- ibmvnic: Fix ibmvnic_change_mac_addr struct format (fate#322021, bsc#1031512).
- ibmvnic: Fix incorrectly defined ibmvnic_request_map_rsp structure (bsc#1045568).
- ibmvnic: Fix initial MTU settings (bsc#1031512).
- ibmvnic: fix missing unlock on error in __ibmvnic_reset() (fate#322021, bsc#1038297, Fixes: ed651a10875f).
- ibmvnic: Fix overflowing firmware/hardware TX queue (fate#322021, bsc#1031512).
- ibmvnic: Fixup atomic API usage (fate#322021, bsc#1031512).
- ibmvnic: Free skb's in cases of failure in transmit (fate#322021, bsc#1031512).
- ibmvnic: Free tx/rx scrq pointer array when releasing sub-crqs (fate#322021, bsc#1031512).
- ibmvnic: Halt TX and report carrier off on H_CLOSED return code (fate#322021, bsc#1040855).
- ibmvnic: Handle failover after failed init crq (fate#322021, bsc#1040855).
- ibmvnic: Handle processing of CRQ messages in a tasklet (fate#322021, bsc#1031512).
- ibmvnic: Initialize completion variables before starting work (fate#322021, bsc#1031512).
- ibmvnic: Insert header on VLAN tagged received frame (fate#322021, bsc#1031512).
- ibmvnic: Make CRQ interrupt tasklet wait for all capabilities crqs (fate#322021, bsc#1031512).
- ibmvnic: Merge the two release_sub_crq_queue routines (fate#322021, bsc#1031512).
- ibmvnic: Move ibmvnic adapter intialization to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Move initialization of sub crqs to ibmvnic_init (fate#322021, bsc#1031512).
- ibmvnic: Move initialization of the stats token to ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Move login and queue negotiation into ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Move login to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Move queue restarting in ibmvnic_tx_complete (fate#322021, bsc#1038297).
- ibmvnic: Move resource initialization to its own routine (fate#322021, bsc#1038297).
- ibmvnic: Non-fatal error handling (fate#322021, bsc#1040855).
- ibmvnic: Only retrieve error info if present (fate#322021, bsc#1031512).
- ibmvnic: Record SKB RX queue during poll (fate#322021, bsc#1038297).
- ibmvnic: Remove debugfs support (fate#322021, bsc#1031512).
- ibmvnic: Remove inflight list (fate#322021, bsc#1031512).
- ibmvnic: Remove module author mailing address (bsc#1045467).
- ibmvnic: Remove netdev notify for failover resets (bsc#1044120).
- ibmvnic: Remove unused bouce buffer (fate#322021, bsc#1031512).
- ibmvnic: Remove VNIC_CLOSING check from pending_scrq (bsc#1044767).
- ibmvnic: Replace is_closed with state field (fate#322021, bsc#1038297).
- ibmvnic: Report errors when failing to release sub-crqs (fate#322021, bsc#1031512).
- ibmvnic: Reset sub-crqs during driver reset (fate#322021, bsc#1040855).
- ibmvnic: Reset the CRQ queue during driver reset (fate#322021, bsc#1040855).
- ibmvnic: Reset tx/rx pools on driver reset (fate#322021, bsc#1040855).
- ibmvnic: Return failure on attempted mtu change (bsc#1043236).
- ibmvnic: Return from ibmvnic_resume if not in VNIC_OPEN state (bsc#1045235).
- ibmvnic: Sanitize entire SCRQ buffer on reset (bsc#1044767).
- ibmvnic: Send gratuitous arp on reset (fate#322021, bsc#1040855).
- ibmvnic: Set real number of rx queues (fate#322021, bsc#1031512).
- ibmvnic: Split initialization of scrqs to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Track state of adapter napis (fate#322021, bsc#1040855).
- ibmvnic: Unmap longer term buffer before free (fate#322021, bsc#1031512).
- ibmvnic: Updated reset handling (fate#322021, bsc#1038297).
- ibmvnic: Update main crq initialization and release (fate#322021, bsc#1031512).
- ibmvnic: Use common counter for capabilities checks (fate#322021, bsc#1031512).
- ibmvnic: use max_mtu instead of req_mtu for MTU range check (bsc#1031512).
- ibmvnic: Validate napi exist before disabling them (fate#322021, bsc#1031512).
- ibmvnic: Wait for any pending scrqs entries at driver close (fate#322021, bsc#1038297).
- ibmvnic: Whitespace correction in release_rx_pools (fate#322021, bsc#1038297).
- iio: hid-sensor: Store restore poll and hysteresis on S3 (bsc#1031717).
- infiniband: avoid dereferencing uninitialized dst on error path (git-fixes).
- iommu/arm-smmu: Disable stalling faults for all endpoints (bsc#1038843).
- iommu/dma: Respect IOMMU aperture when allocating (bsc#1038842).
- iommu/exynos: Block SYSMMU while invalidating FLPD cache (bsc#1038848).
- iommu: Handle default domain attach failure (bsc#1038846).
- iommu/vt-d: Do not over-free page table directories (bsc#1038847).
- ipv4, ipv6: ensure raw socket message is big enough to hold an IP header (4.4.68 stable queue).
- ipv6: Do not use ufo handling on later transformed packets (bsc#1042286).
- ipv6: fix endianness error in icmpv6_err (bsc#1042286).
- ipv6: initialize route null entry in addrconf_init() (4.4.68 stable queue).
- ipv6: release dst on error in ip6_dst_lookup_tail (git-fixes).
- ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf (4.4.68 stable queue).
- isa: Call isa_bus_init before dependent ISA bus drivers register (bsc#1031717).
- iscsi-target: Return error if unable to add network portal (bsc#1032803).
- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).
- iw_cxgb4: Guard against null cm_id in dump_ep/qp (bsc#1026570).
- iwlwifi: 8000: fix MODULE_FIRMWARE input.
- iwlwifi: 9000: increase the number of queues.
- iwlwifi: add device ID for 8265.
- iwlwifi: add device IDs for the 8265 device.
- iwlwifi: add disable_11ac module param.
- iwlwifi: add new 3168 series devices support.
- iwlwifi: add new 8260 PCI IDs.
- iwlwifi: add new 8265.
- iwlwifi: add new 8265 series PCI ID.
- iwlwifi: Add new PCI IDs for 9260 and 5165 series.
- iwlwifi: Add PCI IDs for the new 3168 series.
- iwlwifi: Add PCI IDs for the new series 8165.
- iwlwifi: add support for 12K Receive Buffers.
- iwlwifi: add support for getting HW address from CSR.
- iwlwifi: avoid d0i3 commands when no/init ucode is loaded.
- iwlwifi: bail out in case of bad trans state.
- iwlwifi: block the queues when we send ADD_STA for uAPSD.
- iwlwifi: change the Intel Wireless email address.
- iwlwifi: change the Intel Wireless email address.
- iwlwifi: check for valid ethernet address provided by OEM.
- iwlwifi: clean up transport debugfs handling.
- iwlwifi: clear ieee80211_tx_info-&gt;driver_data in the op_mode.
- iwlwifi: Document missing module options.
- iwlwifi: dump prph registers in a common place for all transports.
- iwlwifi: dvm: advertise NETIF_F_SG.
- iwlwifi: dvm: fix compare_const_fl.cocci warnings.
- iwlwifi: dvm: handle zero brightness for wifi LED.
- iwlwifi: dvm: remove a wrong dependency on m.
- iwlwifi: dvm: remove Kconfig default.
- iwlwifi: dvm: remove stray debug code.
- iwlwifi: export the _no_grab version of PRPH IO functions.
- iwlwifi: expose fw usniffer mode to more utilities.
- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000.
- iwlwifi: Fix firmware name maximum length definition.
- iwlwifi: fix name of ucode loaded for 8265 series.
- iwlwifi: fix printf specifier.
- iwlwifi: generalize d0i3_entry_timeout module parameter.
- iwlwifi: mvm: adapt the firmware assert log to new firmware.
- iwlwifi: mvm: add 9000-series RX API.
- iwlwifi: mvm: add 9000 series RX processing.
- iwlwifi: mvm: add a non-trigger window to fw dbg triggers.
- iwlwifi: mvm: add an option to start rs from HT/VHT rates.
- iwlwifi: mvm: Add a station in monitor mode.
- iwlwifi: mvm: add bt rrc and ttc to debugfs.
- iwlwifi: mvm: add bt settings to debugfs.
- iwlwifi: mvm: add ctdp operations to debugfs.
- iwlwifi: mvm: add CT-KILL notification.
- iwlwifi: mvm: add debug print if scan config is ignored.
- iwlwifi: mvm: add extended dwell time.
- iwlwifi: mvm: add new ADD_STA command version.
- iwlwifi: mvm: Add P2P client snoozing.
- iwlwifi: mvm: add registration to cooling device.
- iwlwifi: mvm: add registration to thermal zone.
- iwlwifi: mvm: add support for negative temperatures.
- iwlwifi: mvm: add tlv for multi queue rx support.
- iwlwifi: mvm: add trigger for firmware dump upon TDLS events.
- iwlwifi: mvm: add trigger for firmware dump upon TX response status.
- iwlwifi: mvm: advertise NETIF_F_SG.
- iwlwifi: mvm: Align bt-coex priority with requirements.
- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface.
- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning.
- iwlwifi: mvm: avoid panics with thermal device usage.
- iwlwifi: mvm: avoid to WARN about gscan capabilities.
- iwlwifi: mvm: bail out if CTDP start operation fails.
- iwlwifi: mvm: bump firmware API to 21.
- iwlwifi: mvm: bump max API to 20.
- iwlwifi: mvm: change access to ieee80211_hdr.
- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station.
- iwlwifi: mvm: change mcc update API.
- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk.
- iwlwifi: mvm: Change number of associated stations when station becomes associated.
- iwlwifi: mvm: change protocol offload flows.
- iwlwifi: mvm: change the check for ADD_STA status.
- iwlwifi: mvm: check FW's response for nvm access write cmd.
- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value.
- iwlwifi: mvm: check minimum temperature notification length.
- iwlwifi: mvm: cleanup roc te on restart cleanup.
- iwlwifi: mvm: Configure fragmented scan for scheduled scan.
- iwlwifi: mvm: configure scheduled scan according to traffic conditions.
- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c.
- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured.
- iwlwifi: mvm: disable DQA support.
- iwlwifi: mvm: do not ask beacons when P2P GO vif and no assoc sta.
- iwlwifi: mvm: do not keep an mvm ref when the interface is down.
- iwlwifi: mvm: do not let NDPs mess the packet tracking.
- iwlwifi: mvm: do not restart HW if suspend fails with unified image.
- iwlwifi: mvm: Do not switch to D3 image on suspend.
- iwlwifi: mvm: do not try to offload AES-CMAC in AP/IBSS modes.
- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit.
- iwlwifi: mvm: dump more registers upon error.
- iwlwifi: mvm: dump the radio registers when the firmware crashes.
- iwlwifi: mvm: enable L3 filtering.
- iwlwifi: mvm: Enable MPLUT only on supported hw.
- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware.
- iwlwifi: mvm: extend time event duration.
- iwlwifi: mvm: fix accessing Null pointer during fw dump collection.
- iwlwifi: mvm: fix d3_test with unified D0/D3 images.
- iwlwifi: mvm: fix debugfs signedness warning.
- iwlwifi: mvm: fix extended dwell time.
- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans().
- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump.
- iwlwifi: mvm: fix netdetect starting/stopping for unified images.
- iwlwifi: mvm: fix RSS key sizing.
- iwlwifi: mvm: fix unregistration of thermal in some error flows.
- iwlwifi: mvm: flush all used TX queues before suspending.
- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware does not support it.
- iwlwifi: mvm: handle pass all scan reporting.
- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans.
- iwlwifi: mvm: infrastructure for frame-release message.
- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq.
- iwlwifi: mvm: let the firmware choose the antenna for beacons.
- iwlwifi: mvm: make collecting fw debug data optional.
- iwlwifi: mvm: move fw-dbg code to separate file.
- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw.
- iwlwifi: mvm: prepare the code towards TSO implementation.
- iwlwifi: mvm: refactor d3 key update functions.
- iwlwifi: mvm: refactor the way fw_key_table is handled.
- iwlwifi: mvm: remove an extra tab.
- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs.
- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort.
- iwlwifi: mvm: remove redundant d0i3 flag from the config struct.
- iwlwifi: mvm: remove shadowing variable.
- iwlwifi: mvm: remove stray nd_config element.
- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter().
- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported().
- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211's combination.
- iwlwifi: mvm: report wakeup for wowlan.
- iwlwifi: mvm: reset mvm-&gt;scan_type when firmware is started.
- iwlwifi: mvm: return the cooling state index instead of the budget.
- iwlwifi: mvm: ROC: cleanup time event info on FW failure.
- iwlwifi: mvm: ROC: Extend the ROC max delay duration &amp; limit ROC duration.
- iwlwifi: mvm: rs: fix a potential out of bounds access.
- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements.
- iwlwifi: mvm: rs: fix a warning message.
- iwlwifi: mvm: rs: fix TPC action decision algorithm.
- iwlwifi: mvm: rs: fix TPC statistics handling.
- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed.
- iwlwifi: mvm: set default new STA as non-aggregated.
- iwlwifi: mvm: set the correct amsdu enum values.
- iwlwifi: mvm: set the correct descriptor size for tracing.
- iwlwifi: mvm: small update in the firmware API.
- iwlwifi: mvm: support A-MSDU in A-MPDU.
- iwlwifi: mvm: support beacon storing.
- iwlwifi: mvm: support description for user triggered fw dbg collection.
- iwlwifi: mvm: support rss queues configuration command.
- iwlwifi: mvm: Support setting continuous recording debug mode.
- iwlwifi: mvm: support setting minimum quota from debugfs.
- iwlwifi: mvm: support sw queue start/stop from mvm.
- iwlwifi: mvm: take care of padded packets.
- iwlwifi: mvm: take the transport ref back when leaving.
- iwlwifi: mvm: track low-latency sources separately.
- iwlwifi: mvm: update GSCAN capabilities.
- iwlwifi: mvm: update ucode status before stopping device.
- iwlwifi: mvm: use build-time assertion for fw trigger ID.
- iwlwifi: mvm: use firmware station lookup, combine code.
- iwlwifi: mvm: various trivial cleanups.
- iwlwifi: mvm: writing zero bytes to debugfs causes a crash.
- iwlwifi: nvm: fix loading default NVM file.
- iwlwifi: nvm: fix up phy section when reading it.
- iwlwifi: pcie: add 9000 series multi queue rx DMA support.
- iwlwifi: pcie: add infrastructure for multi-queue rx.
- iwlwifi: pcie: add initial RTPM support for PCI.
- iwlwifi: pcie: Add new configuration to enable MSIX.
- iwlwifi: pcie: add pm_prepare and pm_complete ops.
- iwlwifi: pcie: add RTPM support when wifi is enabled.
- iwlwifi: pcie: aggregate Flow Handler configuration writes.
- iwlwifi: pcie: allow the op_mode to block the tx queues.
- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug.
- iwlwifi: pcie: avoid restocks inside rx loop if not emergency.
- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues.
- iwlwifi: pcie: build an A-MSDU using TSO core.
- iwlwifi: pcie: configure more RFH settings.
- iwlwifi: pcie: detect and workaround invalid write ptr behavior.
- iwlwifi: pcie: do not increment / decrement a bool.
- iwlwifi: pcie: enable interrupts before releasing the NIC's CPU.
- iwlwifi: pcie: enable multi-queue rx path.
- iwlwifi: pcie: extend device reset delay.
- iwlwifi: pcie: fine tune number of rxbs.
- iwlwifi: pcie: fix a race in firmware loading flow.
- iwlwifi: pcie: fix erroneous return value.
- iwlwifi: pcie: fix global table size.
- iwlwifi: pcie: fix identation in trans.c.
- iwlwifi: pcie: fix RF-Kill vs. firmware load race.
- iwlwifi: pcie: forbid RTPM on device removal.
- iwlwifi: pcie: mark command queue lock with separate lockdep class.
- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim.
- iwlwifi: pcie: refactor RXBs reclaiming code.
- iwlwifi: pcie: remove ICT allocation message.
- iwlwifi: pcie: remove pointer from debug message.
- iwlwifi: pcie: re-organize code towards TSO.
- iwlwifi: pcie: set RB chunk size back to 64.
- iwlwifi: pcie: update iwl_mpdu_desc fields.
- iwlwifi: print index in api/capa flags parsing message.
- iwlwifi: refactor the code that reads the MAC address from the NVM.
- iwlwifi: remove IWL_DL_LED.
- iwlwifi: remove unused parameter from grab_nic_access.
- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables.
- iwlwifi: set max firmware version of 7265 to 17.
- iwlwifi: support ucode with d0 unified image - regular and usniffer.
- iwlwifi: trans: make various conversion macros inlines.
- iwlwifi: trans: support a callback for ASYNC commands.
- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian.
- iwlwifi: tt: move ucode_loaded check under mutex.
- iwlwifi: uninline iwl_trans_send_cmd.
- iwlwifi: update host command messages to new format.
- iwlwifi: Update PCI IDs for 8000 and 9000 series.
- iwlwifi: update support for 3168 series firmware and NVM.
- iwlwifi: various comments and code cleanups.
- jump label: fix passing kbuild_cflags when checking for asm goto support (git-fixes).
- kabi: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
- kabi: ignore fs_info parameter for tracepoints that didn't have it (bsc#1044912).
- kABI: move and hide new cxgbi device owner field (bsc#1018885).
- kABI: protect cgroup include in kernel/kthread (kabi).
- kABI: protect struct fib_info (kabi).
- kABI: protect struct mnt_namespace (kabi).
- kABI: protect struct pglist_data (kabi).
- kABI: protect struct snd_fw_async_midi_port (kabi).
- kABI: protect struct xlog (bsc#1043598).
- kABI: restore ttm_ref_object_add parameters (kabi).
- kabi/severities: ignore kABi changes in iwlwifi stuff itself
- kabi workaround for net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- kprobes/x86: Fix kernel panic when certain exception-handling addresses are probed (4.4.68 stable queue).
- kvm: better MWAIT emulation for guests (bsc#1031142).
- kvm: nVMX: do not leak PML full vmexit to L1 (4.4.68 stable queue).
- kvm: nVMX: initialize PML fields in vmcs02 (4.4.68 stable queue).
- kvm: svm: add support for RDTSCP (bsc#1033117).
- l2tp: fix race in l2tp_recv_common() (bsc#1042286).
- lan78xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- leds: ktd2692: avoid harmless maybe-uninitialized warning (4.4.68 stable queue).
- libata-scsi: Fixup ata_gen_passthru_sense() (bsc#1040125).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libcxgb: add library module for Chelsio drivers (bsc#1021424).
- lib/mpi: mpi_read_raw_data(): fix nbits calculation (bsc#1003581).
- lib/mpi: mpi_read_raw_data(): purge redundant clearing of nbits (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): do not include leading zero SGEs in nbytes (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): fix nbits calculation (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): fix out-of-bounds buffer access (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): purge redundant clearing of nbits (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): replace len argument by nbytes (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): sanitize meaning of indices (bsc#1003581).
- libnvdimm, pfn: fix 'npfns' vs section alignment (bsc#1040125).
- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).
- locking/ww_mutex: Fix compilation of __WW_MUTEX_INITIALIZER (bsc#1031717).
- loop: Add PF_LESS_THROTTLE to block/loop device thread (bsc#1027101).
- lpfc: remove incorrect lockdep assertion (bsc#1040125).
- md: allow creation of mdNNN arrays via md_mod/parameters/new_array (bsc#1032339).
- md.c:didn't unlock the mddev before return EINVAL in array_size_store (bsc#1038143).
- md-cluster: fix potential lock issue in add_new_disk (bsc#1041087).
- md: fix a null dereference (bsc#1040351).
- md: handle read-only member devices better (bsc#1033281).
- md: MD_CLOSING needs to be cleared after called md_set_readonly or do_md_stop (bsc#1038142).
- md/raid1: avoid reusing a resync bio after error handling (Fate#311379).
- md: support disabling of create-on-open semantics (bsc#1032339).
- md: use a separate bio_set for synchronous IO (bsc#1040351).
- media: am437x-vpfe: fix an uninitialized variable bug (bsc#1031717).
- media: b2c2: use IS_REACHABLE() instead of open-coding it (bsc#1031717).
- media: c8sectpfe: Rework firmware loading mechanism (bsc#1031717).
- media: cx231xx-audio: fix NULL-deref at probe (bsc#1031717).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1031717).
- media: cx23885: uninitialized variable in cx23885_av_work_handler() (bsc#1031717).
- media: DaVinci-VPBE: Check return value of a setup_if_config() call in vpbe_set_output() (bsc#1031717).
- media: DaVinci-VPFE-Capture: fix error handling (bsc#1031717).
- media: dib0700: fix NULL-deref at probe (bsc#1031717).
- media: dvb-usb: avoid link error with dib3000m{b,c| (bsc#1031717).
- media: exynos4-is: fix a format string bug (bsc#1031717).
- media: gspca: konica: add missing endpoint sanity check (bsc#1031717).
- media: lirc_imon: do not leave imon_probe() with mutex held (bsc#1031717).
- media: pvrusb2: reduce stack usage pvr2_eeprom_analyze() (bsc#1031717).
- media: rc: allow rc modules to be loaded if rc-main is not a module (bsc#1031717).
- media: s5p-mfc: Fix unbalanced call to clock management (bsc#1031717).
- media: sh-vou: clarify videobuf2 dependency (bsc#1031717).
- media: staging: media: davinci_vpfe: unlock on error in vpfe_reqbufs() (bsc#1031717).
- media: usbvision: fix NULL-deref at probe (bsc#1031717).
- media: uvcvideo: Fix empty packet statistic (bsc#1031717).
- media: vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1043231).
- mem-hotplug: fix node spanned pages when we have a movable node (bnc#1034671).
- mips: R2-on-R6 MULTU/MADDU/MSUBU emulation bugfix (4.4.68 stable queue).
- mlx4: Fix memory leak after mlx4_en_update_priv() (bsc#966170 bsc#966172 bsc#966191).
- mmc: debugfs: correct wrong voltage value (bsc#1031717).
- mmc: Downgrade error level (bsc#1042536).
- mm,compaction: serialize waitqueue_active() checks (bsc#971975).
- mmc: sdhci-pxav3: fix higher speed mode capabilities (bsc#1031717).
- mmc: sdhci: restore behavior when setting VDD via external regulator (bsc#1031717).
- mm: fix &lt;linux/pagemap.h&gt; stray kernel-doc notation (bnc#971975 VM -- git fixes).
- mm: fix new crash in unmapped_area_topdown() (bnc#1039348).
- mm/hugetlb: check for reserved hugepages during memory offline (bnc#971975 VM -- git fixes).
- mm/hugetlb: fix incorrect hugepages count during mem hotplug (bnc#971975 VM -- git fixes).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- mwifiex: Avoid skipping WEP key deletion for AP (4.4.68 stable queue).
- mwifiex: debugfs: Fix (sometimes) off-by-1 SSID print (4.4.68 stable queue).
- mwifiex: pcie: fix cmd_buf use-after-free in remove/reset (bsc#1031717).
- mwifiex: Removed unused 'pkt_type' variable (bsc#1031717).
- mwifiex: remove redundant dma padding in AMSDU (4.4.68 stable queue).
- mwifiex: Remove unused 'bcd_usb' variable (bsc#1031717).
- mwifiex: Remove unused 'chan_num' variable (bsc#1031717).
- mwifiex: Remove unused 'pm_flag' variable (bsc#1031717).
- mwifiex: Remove unused 'sta_ptr' variable (bsc#1031717).
- net: bridge: start hello timer only if device is up (bnc#1012382).
- netfilter: nf_conntrack_sip: extend request line validation (bsc#1042286).
- netfilter: nf_ct_expect: remove the redundant slash when policy name is empty (bsc#1042286).
- netfilter: nf_dup_ipv6: set again FLOWI_FLAG_KNOWN_NH at flowi6_flags (bsc#1042286).
- netfilter: nf_nat_snmp: Fix panic when snmp_trap_helper fails to register (bsc#1042286).
- netfilter: nfnetlink_queue: reject verdict request from different portid (bsc#1042286).
- netfilter: restart search if moved to other chain (bsc#1042286).
- netfilter: use fwmark_reflect in nf_send_reset (bsc#1042286).
- net: fix compile error in skb_orphan_partial() (bnc#1012382).
- net: ibmvnic: Remove unused net_stats member from struct ibmvnic_adapter (fate#322021, bsc#1031512).
- net: icmp_route_lookup should use rt dev to determine L3 domain (bsc#1042286).
- net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).
- net: ipv6: set route type for anycast routes (bsc#1042286).
- net: l3mdev: Add master device lookup by index (bsc#1042286).
- net: make netdev_for_each_lower_dev safe for device removal (bsc#1042286).
- net/mlx5: Do not unlock fte while still using it (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5e: Fix timestamping capabilities reporting (bsc#966170 bsc#1015342).
- net/mlx5e: Modify TIRs hash only when it's needed (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Fix create autogroup prev initializer (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Prevent setting multicast macs for VFs (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Release FTE lock in error flow (bsc#966170 bsc#966172 bsc#966191).
- net: vrf: Create FIB tables on link create (bsc#1042286).
- net: vrf: Fix crash when IPv6 is disabled at boot time (bsc#1042286).
- net: vrf: Fix dev refcnt leak due to IPv6 prefix route (bsc#1042286).
- net: vrf: Fix dst reference counting (bsc#1042286).
- net: vrf: protect changes to private data with rcu (bsc#1042286).
- net: vrf: Switch dst dev to loopback on device delete (bsc#1042286).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bsc#966339 FATE#320150).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (git-fixes).
- nfs: Fix 'Do not increment lock sequence ID after NFS4ERR_MOVED' (git-fixes).
- nfs: Fix inode corruption in nfs_prime_dcache() (git-fixes).
- nfs: Fix missing pg_cleanup after nfs_pageio_cond_complete() (git-fixes).
- nfs: Use GFP_NOIO for two allocations in writeback (git-fixes).
- nfsv4.1: Fix Oopsable condition in server callback races (git-fixes).
- nfsv4: do not let hanging mounts block other mounts (bsc#1040364).
- nfsv4: fix a reference leak caused WARNING messages (git-fixes).
- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- nsfs: mark dentry with DCACHE_RCUACCESS (bsc#1012829).
- nvme: Delete created IO queues on reset (bsc#1031717).
- nvme: submit nvme_admin_activate_fw to admin queue (bsc#1044532).
- ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (bsc#1004003).
- ocfs2: fix deadlock issue when taking inode lock at vfs entry points (bsc#1004003).
- overlayfs: compat, fix incorrect dentry use in ovl_rename2 (bsc#1032400).
- overlayfs: compat, use correct dentry to detect compat mode in ovl_compat_is_whiteout (bsc#1032400).
- pci: pciehp: Prioritize data-link event over presence detect (bsc#1031040,bsc#1037483).
- pci: Reverse standard ACS vs device-specific ACS enabling (bsc#1030057).
- pci: Work around Intel Sunrise Point PCH incorrect ACS capability (bsc#1030057).
- percpu: remove unused chunk_alloc parameter from pcpu_get_pages() (bnc#971975 VM -- git fixes).
- perf/x86/intel/rapl: Make Knights Landings support functional (bsc#1042517).
- perf/x86/intel/uncore: Remove SBOX support for Broadwell server (bsc#1035887).
- phy: qcom-usb-hs: Add depends on EXTCON (4.4.68 stable queue).
- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes (bnc#1012985).
- PKCS#7: fix missing break on OID_sha224 case (bsc#1031717).
- platform/x86: fujitsu-laptop: use brightness_set_blocking for LED-setting callbacks (bsc#1031717).
- pm / QoS: Fix memory leak on resume_latency.notifiers (bsc#1043231).
- pm / wakeirq: Enable dedicated wakeirq for suspend (bsc#1031717).
- pm / wakeirq: Fix spurious wake-up events for dedicated wakeirqs (bsc#1031717).
- pm / wakeirq: report a wakeup_event on dedicated wekup irq (bsc#1031717).
- power: bq27xxx: fix register numbers of bq27500 (bsc#1031717).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (bnc#863764 fate#315275, LTC#103998).
- powerpc: Create a helper for getting the kernel toc value (FATE#322421).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669).
- powerpc/fadump: avoid holes in boot memory area when fadump is registered (bsc#1037669).
- powerpc/fadump: provide a helpful error message (bsc#1037669).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: return error when fadump registration fails (bsc#1040567).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/ftrace: Add Kconfig &amp; Make glue for mprofile-kernel (FATE#322421).
- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).
- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).
- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).
- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
- powerpc/livepatch: Add livepatch header (FATE#322421).
- powerpc/livepatch: Add live patching support on ppc64le (FATE#322421).
- powerpc/livepatch: Add livepatch stack to struct thread_info (FATE#322421).
- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
- powerpc/module: Mark module stubs with a magic value (FATE#322421).
- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).
- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).
- powerpc/powernv: Fix opal_exit tracepoint opcode (4.4.68 stable queue).
- power: supply: bq24190_charger: Call power_supply_changed() for relevant component (4.4.68 stable queue).
- power: supply: bq24190_charger: Call set_mode_host() on pm_resume() (4.4.68 stable queue).
- power: supply: bq24190_charger: Do not read fault register outside irq_handle_thread() (4.4.68 stable queue).
- power: supply: bq24190_charger: Fix irq trigger to IRQF_TRIGGER_FALLING (4.4.68 stable queue).
- power: supply: bq24190_charger: Handle fault before status on interrupt (4.4.68 stable queue).
- power: supply: bq24190_charger: Install irq_handler_thread() at end of probe() (4.4.68 stable queue).
- printk: Correctly handle preemption in console_unlock() (bsc#1046434).
- printk: Switch to the sync mode when an emergency message is printed (bsc#1034995).
- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).
- quota: fill in Q_XGETQSTAT inode information for inactive quotas (bsc#1042356).
- radix-tree: fix radix_tree_iter_retry() for tagged iterators (bsc#1012829).
- ravb: Fix use-after-free on `ifconfig eth0 down` (git-fixes).
- rdma/iw_cxgb4: Add missing error codes for act open cmd (bsc#1026570).
- rdma/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).
- rdma/iw_cxgb4: Low resource fixes for Completion queue (bsc#1026570).
- rdma/iw_cxgb4: only read markers_enabled mod param once (bsc#1026570).
- regulator: isl9305: fix array size (bsc#1031717).
- reiserfs: do not preallocate blocks for extended attributes (bsc#990682).
- Revert 'acpi, nfit, libnvdimm: fix interleave set cookie calculation (64-bit comparison)' (kabi).
- Revert 'btrfs: qgroup: Move half of the qgroup accounting time out of' (bsc#1017461 bsc#1033885).
- Revert 'KVM: nested VMX: disable perf cpuid reporting' (4.4.68 stable queue).
- Revert 'l2tp: take reference on sessions being dumped' (kabi).
- Revert 'mac80211: pass block ack session timeout to to driver' (kabi).
- Revert 'mac80211: RX BA support for sta max_rx_aggregation_subframes' (kabi).
- Revert 'wlcore: Add RX_BA_WIN_SIZE_CHANGE_EVENT event' (kabi).
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/SLES-UEFI-SIGN-Certificate-2048.crt: Update the certificate (bsc#1035922)
- rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string (4.4.68 stable queue).
- rtnl: reset calcit fptr in rtnl_unregister() (bsc#1042286).
- s390/dasd: check if query host access feature is supported (bsc#1037871).
- sbp-target: Fix second argument of percpu_ida_alloc() (bsc#1032803).
- scsi: be2iscsi: Add FUNCTION_RESET during driver unload (bsc#1038458).
- scsi: be2iscsi: Add IOCTL to check UER supported (bsc#1038458).
- scsi: be2iscsi: Add TPE recovery feature (bsc#1038458).
- scsi: be2iscsi: Add V1 of EPFW cleanup IOCTL (bsc#1038458).
- scsi: be2iscsi: allocate enough memory in beiscsi_boot_get_sinfo() (bsc#1038458).
- scsi: be2iscsi: Check all zeroes IP before issuing IOCTL (bsc#1038458).
- scsi: be2iscsi: Fail the sessions immediately after TPE (bsc#1038458).
- scsi: be2iscsi: Fix async PDU handling path (bsc#1038458).
- scsi: be2iscsi: Fix bad WRB index error (bsc#1038458).
- scsi: be2iscsi: Fix checks for HBA in error state (bsc#1038458).
- scsi: be2iscsi: Fix gateway APIs to support IPv4 &amp; IPv6 (bsc#1038458).
- scsi: be2iscsi: Fix POST check and reset sequence (bsc#1038458).
- scsi: be2iscsi: Fix queue and connection parameters (bsc#1038458).
- scsi: be2iscsi: Fix release of DHCP IP in static mode (bsc#1038458).
- scsi: be2iscsi: Fix to add timer for UE detection (bsc#1038458).
- scsi: be2iscsi: Fix to make boot discovery non-blocking (bsc#1038458).
- scsi: be2iscsi: Fix to use correct configuration values (bsc#1038458).
- scsi: be2iscsi: Handle only NET_PARAM in iface_get_param (bsc#1038458).
- scsi: be2iscsi: Move functions to right files (bsc#1038458).
- scsi: be2iscsi: Move VLAN code to common iface_set_param (bsc#1038458).
- scsi: be2iscsi: Reduce driver load/unload time (bsc#1038458).
- scsi: be2iscsi: Remove alloc_mcc_tag &amp; beiscsi_pci_soft_reset (bsc#1038458).
- scsi: be2iscsi: Remove isr_lock and dead code (bsc#1038458).
- scsi: be2iscsi: Rename iface get/set/create/destroy APIs (bsc#1038458).
- scsi: be2iscsi: Replace _bh version for mcc_lock spinlock (bsc#1038458).
- scsi: be2iscsi: Set and return right iface v4/v6 states (bsc#1038458).
- scsi: be2iscsi: Update copyright information (bsc#1038458).
- scsi: be2iscsi: Update iface handle before any set param (bsc#1038458).
- scsi: be2iscsi: Update the driver version (bsc#1038458).
- scsi: cxgb4i: libcxgbi: add missing module_put() (bsc#1018885).
- scsi: cxgb4i: libcxgbi: cxgb4: add T6 iSCSI completion feature (bsc#1021424).
- scsi: cxlflash: Remove the device cleanly in the system shutdown path (bsc#1028310, fate#321597, bsc#1034762).  cherry-pick from SP3
- scsi_dh_alua: do not call BUG_ON when updating port group (bsc#1028340).
- scsi_dh_alua: Do not retry for unmapped device (bsc#1012910).
- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION (bsc#1034419).
- scsi: ipr: Driver version 2.6.4 (bsc#1031555).
- scsi: ipr: Error path locking fixes (bsc#1031555).
- scsi: ipr: Fix abort path race condition (bsc#1031555).
- scsi: ipr: Fix missed EH wakeup (bsc#1031555).
- scsi: ipr: Fix SATA EH hang (bsc#1031555).
- scsi: ipr: Remove redundant initialization (bsc#1031555).
- scsi: mac_scsi: Fix MAC_SCSI=m option when SCSI=m (4.4.68 stable queue).
- scsi: scsi_dh_alua: Check scsi_device_get() return value (bsc#1040125).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (4.4.68 stable queue).
- scsi_transport_fc: do not call queue_work under lock (bsc#1013887).
- scsi_transport_fc: fixup race condition in fc_rport_final_delete() (bsc#1013887).
- scsi_transport_fc: return -EBUSY for deleted vport (bsc#1013887).
- sctp: check af before verify address in sctp_addr_id2transport (git-fixes).
- serial: 8250_omap: Fix probe and remove for PM runtime (4.4.68 stable queue).
- smartpqi: limit transfer length to 1MB (bsc#1025461).
- staging: emxx_udc: remove incorrect __init annotations (4.4.68 stable queue).
- staging: rtl8188eu: prevent an underflow in rtw_check_beacon_data() (bsc#1031717).
- staging: wlan-ng: add missing byte order conversion (4.4.68 stable queue).
- sunrpc: Allow xprt-&gt;ops-&gt;timer method to sleep (git-fixes).
- sunrpc: ensure correct error is reported by xs_tcp_setup_socket() (git-fixes).
- sunrpc: fix UDP memory accounting (git-fixes).
- sunrpc: Silence WARN_ON when NFSv4.1 over RDMA is in use (git-fixes).
- supported.conf: added drivers/net/ethernet/chelsio/libcxgb/libcxgb
- supported.conf: Bugzilla and FATE references for dcdbas and dell_rbu
- sysfs: be careful of error returns from ops-&gt;show() (bsc#1028883).
- tcp: account for ts offset only if tsecr not zero (bsc#1042286).
- tcp: do not inherit fastopen_req from parent (4.4.68 stable queue).
- tcp: do not underestimate skb-&gt;truesize in tcp_trim_head() (4.4.68 stable queue).
- tcp: fastopen: accept data/FIN present in SYNACK message (bsc#1042286).
- tcp: fastopen: avoid negative sk_forward_alloc (bsc#1042286).
- tcp: fastopen: call tcp_fin() if FIN present in SYNACK (bsc#1042286).
- tcp: fastopen: fix rcv_wup initialization for TFO server on SYN/data (bsc#1042286).
- tcp: fix wraparound issue in tcp_lp (4.4.68 stable queue).
- Temporarily disable iwlwifi-expose-default-fallback-ucode-api ... for updating iwlwifi stack
- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
- tpm: Downgrade error level (bsc#1042535).
- tpm: fix checks for policy digest existence in tpm2_seal_trusted() (bsc#1034048, Pending fixes 2017-04-10).
- tpm: fix RC value check in tpm2_seal_trusted (bsc#1034048, Pending fixes 2017-04-10).
- tpm: fix: set continueSession attribute for the unseal operation (bsc#1034048, Pending fixes 2017-04-10).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1012985).
- tty: Destroy ldisc instance on hangup (bnc#1043488).
- tty: Fix ldisc crash on reopened tty (bnc#1043488).
- tty: Handle NULL tty-&gt;ldisc (bnc#1043488).
- tty: Move tty_ldisc_kill() (bnc#1043488).
- tty: Prepare for destroying line discipline on hangup (bnc#1043488).
- tty: Refactor tty_ldisc_reinit() for reuse (bnc#1043488).
- tty: Reset c_line from driver's init_termios (bnc#1043488).
- tty: Simplify tty_set_ldisc() exit handling (bnc#1043488).
- tty: Use 'disc' for line discipline index name (bnc#1043488).
- udp: avoid ufo handling on IP payload compression packets (bsc#1042286).
- udplite: call proper backlog handlers (bsc#1042286).
- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)
- Update patches.fixes/x86-pci-mark-broadwell-ep-home-agent-1-as-having-non-compliant-bars (bsc#1039214). Fix the wrong bsc number.
- Update patches.fixes/xen-silence-efi-error-messge.patch (bnc#1039900).
- Update ppc64le config files to use KGRAFT.
- usb: chipidea: Handle extcon events properly (4.4.68 stable queue).
- usb: chipidea: Only read/write OTGSC from one place (4.4.68 stable queue).
- usb: host: ehci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).
- usb: host: ohci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).
- usb: musb: ux500: Fix NULL pointer dereference at system PM (bsc#1038033).
- usb: serial: ark3116: fix open error handling (bnc#1038043).
- usb: serial: ch341: add register and USB request definitions (bnc#1038043).
- usb: serial: ch341: add support for parity, frame length, stop bits (bnc#1038043).
- usb: serial: ch341: fix baud rate and line-control handling (bnc#1038043).
- usb: serial: ch341: fix line settings after reset-resume (bnc#1038043).
- usb: serial: ch341: fix modem-status handling (bnc#1038043).
- usb: serial: ch341: reinitialize chip on reconfiguration (bnc#1038043).
- usb: serial: digi_acceleport: fix incomplete rx sanity check (4.4.68 stable queue).
- usb: serial: fix compare_const_fl.cocci warnings (bnc#1038043).
- usb: serial: ftdi_sio: fix latency-timer error handling (4.4.68 stable queue).
- usb: serial: io_edgeport: fix descriptor error handling (4.4.68 stable queue).
- usb: serial: io_edgeport: fix epic-descriptor handling (bnc#1038043).
- usb: serial: keyspan_pda: fix receive sanity checks (4.4.68 stable queue).
- usb: serial: mct_u232: fix modem-status error handling (4.4.68 stable queue).
- usb: serial: quatech2: fix control-message error handling (bnc#1038043).
- usb: serial: sierra: fix bogus alternate-setting assumption (bnc#1038043).
- usb: serial: ssu100: fix control-message error handling (bnc#1038043).
- usb: serial: ti_usb_3410_5052: fix control-message error handling (4.4.68 stable queue).
- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available.
- Use up spare in struct module for livepatch (FATE#322421).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- vrf: remove slave queue and private slave struct (bsc#1042286).
- vsock: Detach QP check should filter out non matching QPs (bsc#1036752).
- x86/CPU/AMD: Fix Zen SMT topology (bsc#1027512).
- x86/ioapic: Restore IO-APIC irq_chip retrigger callback (4.4.68 stable queue).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression &gt;= 0 (4.4.68 stable queue).
- x86/PCI: Mark Broadwell-EP Home Agent 1 as having non-compliant BARs (bsc#9048891).
- x86/platform/intel-mid: Correct MSI IRQ line for watchdog device (4.4.68 stable queue).
- x86/platform/uv/BAU: Add generic function pointers (bsc#1035024).
- x86/platform/uv/BAU: Add payload descriptor qualifier (bsc#1035024).
- x86/platform/uv/BAU: Add status mmr location fields to bau_control (bsc#1035024).
- x86/platform/uv/BAU: Add UV4-specific functions (bsc#1035024).
- x86/platform/uv/BAU: Add uv_bau_version enumerated constants (bsc#1035024).
- x86/platform/uv/BAU: Add wait_completion to bau_operations (bsc#1035024).
- x86/platform/uv/BAU: Clean up and update printks (bsc#1035024).
- x86/platform/uv/BAU: Cleanup bau_operations declaration and instances (bsc#1035024).
- x86/platform/uv/BAU: Clean up pq_init() (bsc#1035024).
- x86/platform/uv/BAU: Clean up vertical alignment (bsc#1035024).
- x86/platform/uv/BAU: Convert uv_physnodeaddr() use to uv_gpa_to_offset() (bsc#1035024).
- x86/platform/uv/BAU: Disable software timeout on UV4 hardware (bsc#1035024).
- x86/platform/uv/BAU: Fix HUB errors by remove initial write to sw-ack register (bsc#1035024).
- x86/platform/uv/BAU: Fix payload queue setup on UV4 hardware (bsc#1035024).
- x86/platform/uv/BAU: Implement uv4_wait_completion with read_status (bsc#1035024).
- x86/platform/uv/BAU: Populate -&gt;uvhub_version with UV4 version information (bsc#1035024).
- x86/platform/uv/BAU: Use generic function pointers (bsc#1035024).
- x86/platform/uv: Fix calculation of Global Physical Address (bsc#1031147).
- xen: add sysfs node for guest type (bnc#1037840).
- xen: adjust early dom0 p2m handling to xen hypervisor behavior (bnc#1031470).
- xen-blkback: do not leak stack data via response ring (bsc#1042863 XSA-216).
- xen/mce: do not issue error message for failed /dev/mcelog registration (bnc#1036638).
- xfrm: Fix memory leak of aead algorithm name (bsc#1042286).
- xfrm: Only add l3mdev oif to dst lookups (bsc#1042286).
- xfs: add missing include dependencies to xfs_dir2.h (bsc#1042421).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1041160).
- xfs: do not warn on buffers not being recovered due to LSN (bsc#1043598).
- xfs: fix eofblocks race with file extending async dio writes (bsc#1040929).
- xfs: Fix missed holes in SEEK_HOLE implementation (bsc#1041168).
- xfs: fix off-by-one on max nr_pages in xfs_find_get_desired_pgoff() (bsc#1041168).
- xfs: fix xfs_mode_to_ftype() prototype (bsc#1043598).
- xfs: in _attrlist_by_handle, copy the cursor back to userspace (bsc#1041242).
- xfs: log recovery tracepoints to track current lsn and buffer submission (bsc#1043598).
- xfs: Make __xfs_xattr_put_listen preperly report errors (bsc#1041242).
- xfs: only return -errno or success from attr -&gt;put_listent (bsc#1041242).
- xfs: pass current lsn to log recovery buffer validation (bsc#1043598).
- xfs: refactor log record unpack and data processing (bsc#1043598).
- xfs: replace xfs_mode_to_ftype table with switch statement (bsc#1042421).
- xfs: rework log recovery to submit buffers on LSN boundaries (bsc#1043598).
- xfs: rework the inline directory verifiers (bsc#1042421).
- xfs: sanity check directory inode di_size (bsc#1042421).
- xfs: sanity check inode di_mode (bsc#1042421).
- xfs: Split default quota limits by quota type (bsc#1049421).
- xfs: update metadata LSN in buffers during log recovery (bsc#1043598).
- xfs: use -&gt;b_state to fix buffer I/O accounting release race (bsc#1041160).
- xfs: verify inline directory data forks (bsc#1042421).
- zswap: do not param_set_charp while holding spinlock (VM Functionality, bsc#1042886).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-13"/>
	<updated date="2017-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1003581">SUSE bug 1003581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004003">SUSE bug 1004003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011044">SUSE bug 1011044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012060">SUSE bug 1012060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012452">SUSE bug 1012452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012910">SUSE bug 1012910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012985">SUSE bug 1012985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013561">SUSE bug 1013561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013887">SUSE bug 1013887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015342">SUSE bug 1015342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015452">SUSE bug 1015452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017461">SUSE bug 1017461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018885">SUSE bug 1018885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020412">SUSE bug 1020412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022266">SUSE bug 1022266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023287">SUSE bug 1023287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026570">SUSE bug 1026570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027101">SUSE bug 1027101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027512">SUSE bug 1027512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027974">SUSE bug 1027974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028217">SUSE bug 1028217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028310">SUSE bug 1028310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028340">SUSE bug 1028340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028883">SUSE bug 1028883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029607">SUSE bug 1029607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030057">SUSE bug 1030057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030070">SUSE bug 1030070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031040">SUSE bug 1031040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031142">SUSE bug 1031142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031147">SUSE bug 1031147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031470">SUSE bug 1031470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031500">SUSE bug 1031500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031512">SUSE bug 1031512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031555">SUSE bug 1031555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031796">SUSE bug 1031796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032141">SUSE bug 1032141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032339">SUSE bug 1032339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032345">SUSE bug 1032345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032400">SUSE bug 1032400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032581">SUSE bug 1032581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032803">SUSE bug 1032803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033117">SUSE bug 1033117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033281">SUSE bug 1033281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033340">SUSE bug 1033340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033885">SUSE bug 1033885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034419">SUSE bug 1034419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034635">SUSE bug 1034635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034671">SUSE bug 1034671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034762">SUSE bug 1034762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034902">SUSE bug 1034902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034995">SUSE bug 1034995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035024">SUSE bug 1035024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035866">SUSE bug 1035866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035887">SUSE bug 1035887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035920">SUSE bug 1035920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035922">SUSE bug 1035922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036214">SUSE bug 1036214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036638">SUSE bug 1036638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036752">SUSE bug 1036752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036763">SUSE bug 1036763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037177">SUSE bug 1037177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037186">SUSE bug 1037186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037384">SUSE bug 1037384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037483">SUSE bug 1037483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037669">SUSE bug 1037669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037840">SUSE bug 1037840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037871">SUSE bug 1037871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037969">SUSE bug 1037969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038033">SUSE bug 1038033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038043">SUSE bug 1038043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038085">SUSE bug 1038085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038142">SUSE bug 1038142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038143">SUSE bug 1038143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038297">SUSE bug 1038297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038458">SUSE bug 1038458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038842">SUSE bug 1038842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038843">SUSE bug 1038843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038846">SUSE bug 1038846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038847">SUSE bug 1038847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038848">SUSE bug 1038848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039214">SUSE bug 1039214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039700">SUSE bug 1039700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039864">SUSE bug 1039864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039900">SUSE bug 1039900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040125">SUSE bug 1040125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040182">SUSE bug 1040182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040279">SUSE bug 1040279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040395">SUSE bug 1040395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040425">SUSE bug 1040425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040463">SUSE bug 1040463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040567">SUSE bug 1040567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040609">SUSE bug 1040609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040929">SUSE bug 1040929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040941">SUSE bug 1040941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041087">SUSE bug 1041087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041160">SUSE bug 1041160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041168">SUSE bug 1041168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041242">SUSE bug 1041242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041810">SUSE bug 1041810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042356">SUSE bug 1042356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042421">SUSE bug 1042421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042517">SUSE bug 1042517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042535">SUSE bug 1042535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042536">SUSE bug 1042536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042886">SUSE bug 1042886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043014">SUSE bug 1043014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043231">SUSE bug 1043231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043236">SUSE bug 1043236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043347">SUSE bug 1043347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043371">SUSE bug 1043371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043467">SUSE bug 1043467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043488">SUSE bug 1043488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043598">SUSE bug 1043598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043912">SUSE bug 1043912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043935">SUSE bug 1043935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044015">SUSE bug 1044015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044082">SUSE bug 1044082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044532">SUSE bug 1044532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044772">SUSE bug 1044772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044854">SUSE bug 1044854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044880">SUSE bug 1044880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044912">SUSE bug 1044912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045235">SUSE bug 1045235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045286">SUSE bug 1045286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045307">SUSE bug 1045307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045467">SUSE bug 1045467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045568">SUSE bug 1045568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046105">SUSE bug 1046105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046434">SUSE bug 1046434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046589">SUSE bug 1046589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922871">SUSE bug 922871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939801">SUSE bug 939801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966321">SUSE bug 966321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966339">SUSE bug 966339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988065">SUSE bug 988065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989311">SUSE bug 989311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990058">SUSE bug 990058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990682">SUSE bug 990682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993832">SUSE bug 993832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995542">SUSE bug 995542</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9150/">CVE-2017-9150</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79862" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1035283" ref_url="https://bugzilla.suse.com/1035283" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00021.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server provides the following fixes:

- CVE-2017-10971: Fix endianess handling of GenericEvent to prevent a stack overflow by clients. (bnc#1035283)
- Make sure the type of all events to be sent by ProcXSendExtensionEvent are in the
  allowed range.
- CVE-2017-10972: Initialize the xEvent eventT with zeros to avoid information leakage.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549462" comment="xorg-x11-server-7.6_1.18.3-74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549463" comment="xorg-x11-server-extra-7.6_1.18.3-74.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79863" version="1" class="patch">
	<metadata>
		<title>Security update for libXdmcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1025046" ref_url="https://bugzilla.suse.com/1025046" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003032.html" source="SUSE-SU"/>
		<description>
This update for libXdmcp fixes the following issues:

- CVE-2017-2625: The generation of session key in XDM using libXdmcp might have used weak entropy, making
  the session keys predictable (bsc#1025046)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-14"/>
	<updated date="2017-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549464" comment="libXdmcp6-1.1.1-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549465" comment="libXdmcp6-32bit-1.1.1-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79864" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00026.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

- CVE-2017-1000083: Remote attackers could have used the comicbook mode of evince to inject shell code. (bsc#1046856, bgo#784630)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-18"/>
	<updated date="2017-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549466" comment="evince-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549467" comment="evince-browser-plugin-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517912" comment="evince-lang-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549468" comment="evince-plugin-djvudocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549469" comment="evince-plugin-dvidocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549470" comment="evince-plugin-pdfdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549471" comment="evince-plugin-psdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549472" comment="evince-plugin-tiffdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549473" comment="evince-plugin-xpsdocument-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549474" comment="libevdocument3-4-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549475" comment="libevview3-3-3.20.1-6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549476" comment="nautilus-evince-3.20.1-6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79865" version="1" class="patch">
	<metadata>
		<title>Security update for systemd, dracut (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1032029" ref_url="https://bugzilla.suse.com/1032029" source="BUGZILLA"/>
		<reference ref_id="1033238" ref_url="https://bugzilla.suse.com/1033238" source="BUGZILLA"/>
		<reference ref_id="1037120" ref_url="https://bugzilla.suse.com/1037120" source="BUGZILLA"/>
		<reference ref_id="1040153" ref_url="https://bugzilla.suse.com/1040153" source="BUGZILLA"/>
		<reference ref_id="1040968" ref_url="https://bugzilla.suse.com/1040968" source="BUGZILLA"/>
		<reference ref_id="1043900" ref_url="https://bugzilla.suse.com/1043900" source="BUGZILLA"/>
		<reference ref_id="1045290" ref_url="https://bugzilla.suse.com/1045290" source="BUGZILLA"/>
		<reference ref_id="1046750" ref_url="https://bugzilla.suse.com/1046750" source="BUGZILLA"/>
		<reference ref_id="986216" ref_url="https://bugzilla.suse.com/986216" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00028.html" source="SUSE-SU"/>
		<description>
This update for systemd and dracut fixes the following issues:

Security issues fixed:

- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
  from a DNS server. (bsc#1045290)

Non-security issues fixed in systemd:

- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)

Non-security issues fixed in dracut:

- Bail out if module directory does not exist. (bsc#1043900)
- Suppress bogus error message. (bsc#1032029)
- Fix module force loading with systemd. (bsc#986216)
- Ship udev files required by systemd. (bsc#1040153)
- Ignore module resolution errors (e.g. with kgraft). (bsc#1037120)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-19"/>
	<updated date="2017-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032029">SUSE bug 1032029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033238">SUSE bug 1033238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037120">SUSE bug 1037120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040153">SUSE bug 1040153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040968">SUSE bug 1040968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043900">SUSE bug 1043900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046750">SUSE bug 1046750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986216">SUSE bug 986216</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549477" comment="dracut-044.1-109.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549478" comment="dracut-fips-044.1-109.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549479" comment="libsystemd0-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549480" comment="libsystemd0-32bit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549481" comment="libudev1-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549482" comment="libudev1-32bit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549483" comment="systemd-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549484" comment="systemd-32bit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517931" comment="systemd-bash-completion-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549485" comment="systemd-sysvinit-228-150.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549486" comment="udev-228-150.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79866" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009994" ref_url="https://bugzilla.suse.com/1009994" source="BUGZILLA"/>
		<reference ref_id="1010756" ref_url="https://bugzilla.suse.com/1010756" source="BUGZILLA"/>
		<reference ref_id="1010757" ref_url="https://bugzilla.suse.com/1010757" source="BUGZILLA"/>
		<reference ref_id="1010766" ref_url="https://bugzilla.suse.com/1010766" source="BUGZILLA"/>
		<reference ref_id="1010774" ref_url="https://bugzilla.suse.com/1010774" source="BUGZILLA"/>
		<reference ref_id="1010782" ref_url="https://bugzilla.suse.com/1010782" source="BUGZILLA"/>
		<reference ref_id="1010968" ref_url="https://bugzilla.suse.com/1010968" source="BUGZILLA"/>
		<reference ref_id="1010975" ref_url="https://bugzilla.suse.com/1010975" source="BUGZILLA"/>
		<reference ref_id="1047958" ref_url="https://bugzilla.suse.com/1047958" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9262: Multiple integer overflows in the jas_realloc function in base/jas_malloc.c and
  mem_resize function in base/jas_stream.c allow remote attackers to cause a denial of service via
  a crafted image, which triggers use after free vulnerabilities. (bsc#1009994)
- CVE-2016-9388: The ras_getcmap function in ras_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted image file. (bsc#1010975)
- CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c allow remote attackers to cause a
  denial of service (assertion failure). (bsc#1010968)
- CVE-2016-9390: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted image file. (bsc#1010774)
- CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c allows remote attackers to cause a
  denial of service (assertion failure) via a very large integer. (bsc#1010782)
- CVE-2017-1000050: The jp2_encode function in jp2_enc.c allows remote attackers to cause a denial
  of service. (bsc#1047958)

CVEs already fixed with previous update:
- CVE-2016-9392: The calcstepsizes function in jpc_dec.c allows remote attackers to cause a denial
  of service (assertion failure) via a crafted file. (bsc#1010757)
- CVE-2016-9393: The jpc_pi_nextrpcl function in jpc_t2cod.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010766)
- CVE-2016-9394: The jas_seq2d_create function in jas_seq.c allows remote attackers to cause a
  denial of service (assertion failure) via a crafted file. (bsc#1010756)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-20"/>
	<updated date="2017-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79867" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1023616" ref_url="https://bugzilla.suse.com/1023616" source="BUGZILLA"/>
		<reference ref_id="1043055" ref_url="https://bugzilla.suse.com/1043055" source="BUGZILLA"/>
		<reference ref_id="1048576" ref_url="https://bugzilla.suse.com/1048576" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003068.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issue fixed:

- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)

Bug fixes:

- Include individual sysconfig.d files instead of the whole sysconfig.d directory.
- Include sysconfig.d/include.conf after httpd.conf is processed. (bsc#1023616, bsc#1043055)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-26"/>
	<updated date="2017-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023616">SUSE bug 1023616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043055">SUSE bug 1043055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549489" comment="apache2-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532285" comment="apache2-doc-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549490" comment="apache2-example-pages-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549491" comment="apache2-prefork-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549492" comment="apache2-utils-2.4.23-29.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549493" comment="apache2-worker-2.4.23-29.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79868" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003070.html" source="SUSE-SU"/>
		<description>
This update for libquicktime fixes the following issues:

Security issue fixed:
- CVE-2016-2399: Adjust patch to prevent endless loop when there are less than 256 bytes to read. (bsc#1022805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549494" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79869" version="1" class="patch">
	<metadata>
		<title>Security update for libical (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015964" ref_url="https://bugzilla.suse.com/1015964" source="BUGZILLA"/>
		<reference ref_id="1044995" ref_url="https://bugzilla.suse.com/1044995" source="BUGZILLA"/>
		<reference ref_id="986631" ref_url="https://bugzilla.suse.com/986631" source="BUGZILLA"/>
		<reference ref_id="986639" ref_url="https://bugzilla.suse.com/986639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<description>
This update for libical fixes the following issues:

Security issues fixed:
- CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free)
  via a crafted ics file. (bsc#986639)
- CVE-2016-5827: The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers
  to cause a denial of service (out-of-bounds heap read) via a crafted string to the
  icalparser_parse_string function. (bsc#986631)
- CVE-2016-9584: libical allows remote attackers to cause a denial of service (use-after-free) and
  possibly read heap memory via a crafted ics file. (bsc#1015964)

Bug fixes:
- libical crashes while parsing timezones (bsc#1044995)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044995">SUSE bug 1044995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549495" comment="libical1-1.0.1-16.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549496" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79870" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042802" ref_url="https://bugzilla.suse.com/1042802" source="BUGZILLA"/>
		<reference ref_id="1045719" ref_url="https://bugzilla.suse.com/1045719" source="BUGZILLA"/>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

Security issues fixed:
- CVE-2017-9775: Fix a stack overflow bug in pdftocairo that could have been exploited in a denial
  of service attack through a specially crafted PDF document. (bsc#1045719)
- CVE-2017-9776: Fix an integer overflow bug that could have been exploited in a denial of service
  attack through a specially crafted PDF document. (bsc#1045721)
- CVE-2017-9408: Fix a memory leak that occurred when the parser tried to recover from a broken
  input file. (bsc#1042802) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541441" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79871" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1041783" ref_url="https://bugzilla.suse.com/1041783" source="BUGZILLA"/>
		<reference ref_id="1042802" ref_url="https://bugzilla.suse.com/1042802" source="BUGZILLA"/>
		<reference ref_id="1042803" ref_url="https://bugzilla.suse.com/1042803" source="BUGZILLA"/>
		<reference ref_id="1043088" ref_url="https://bugzilla.suse.com/1043088" source="BUGZILLA"/>
		<reference ref_id="1045719" ref_url="https://bugzilla.suse.com/1045719" source="BUGZILLA"/>
		<reference ref_id="1045721" ref_url="https://bugzilla.suse.com/1045721" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<reference ref_id="CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406/" source="CVE"/>
		<reference ref_id="CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408/" source="CVE"/>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

Security issues fixed:
- CVE-2017-9775: DoS stack buffer overflow in GfxState.cc in pdftocairo via a crafted PDF document (bsc#1045719)
- CVE-2017-9776: DoS integer overflow leading to heap buffer overflow in JBIG2Stream.cc via a crafted PDF document (bsc#1045721)
- CVE-2017-7515: Stack exhaustion due to infinite recursive call in pdfunite (bsc#1043088)
- CVE-2017-7511: Null pointer dereference in pdfunite via crafted documents (bsc#1041783)
- CVE-2017-9406: Memory leak in the gmalloc function in gmem.cc (bsc#1042803)
- CVE-2017-9408: Memory leak in the Object::initArray function (bsc#1042802)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-07-28"/>
	<updated date="2017-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041783">SUSE bug 1041783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043088">SUSE bug 1043088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79872" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013669" ref_url="https://bugzilla.suse.com/1013669" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002582.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following issue:

- CVE-2016-9811: out of bounds memory read in windows_icon_typefind (bsc#1013669)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-20"/>
	<updated date="2017-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549501" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549502" comment="libgstapp-0_10-0-32bit-0.10.36-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549503" comment="libgstinterfaces-0_10-0-32bit-0.10.36-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79873" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1048715" ref_url="https://bugzilla.suse.com/1048715" source="BUGZILLA"/>
		<reference ref_id="963041" ref_url="https://bugzilla.suse.com/963041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<description>
This MariaDB update to version 10.0.31 GA fixes the following issues:

Security issues fixed:
- CVE-2017-3308: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3309: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3453: Subcomponent: Server: Optimizer: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3456: Subcomponent: Server: DML: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)
- CVE-2017-3464: Subcomponent: Server: DDL: Easily 'exploitable' vulnerability allows low
  privileged attacker with network access via multiple protocols to compromise MariaDB Server.
  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS). (bsc#1048715)

Bug fixes:
- switch from 'Restart=on-failure' to 'Restart=on-abort' in
  mysql.service in order to follow the upstream. It also fixes
  hanging mysql-systemd-helper when mariadb fails (e.g. because of
  the misconfiguration) (bsc#963041)
- XtraDB updated to 5.6.36-82.0
- TokuDB updated to 5.6.36-82.0
- Innodb updated to 5.6.36
- Performance Schema updated to 5.6.36

Release notes and changelog:
- https://kb.askmonty.org/en/mariadb-10031-release-notes
- https://kb.askmonty.org/en/mariadb-10031-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963041">SUSE bug 963041</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79874" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049255" ref_url="https://bugzilla.suse.com/1049255" source="BUGZILLA"/>
		<reference ref_id="1049621" ref_url="https://bugzilla.suse.com/1049621" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<description>
This wireshark update to version 2.2.8 fixes the following issues:

Security issues fixed:
- CVE-2017-11411: The openSAFETY dissectorcould crash or exhaust system memory because of missing
  length validation. (bsc#1049621)
- CVE-2017-11410: The WBXML dissector could go into an infinite loop. (bsc#1049255)
- CVE-2017-11408: The AMQP dissector could crash. (bsc#1049255)
- CVE-2017-11407: The MQ dissector could crash. (bsc#1049255)
- CVE-2017-11406: The DOCSIS dissector could go into an infinite loop. (bsc#1049255)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79875" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00003.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive
the following security update:

- CVE-2017-7533: Bug in inotify code allowed privilege escalation (bnc#1049483).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549515" comment="kernel-default-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549516" comment="kernel-default-base-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549517" comment="kernel-default-devel-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549518" comment="kernel-default-man-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517967" comment="kernel-devel-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517968" comment="kernel-macros-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517969" comment="kernel-source-4.4.74-92.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549519" comment="kernel-syms-4.4.74-92.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79876" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009745" ref_url="https://bugzilla.suse.com/1009745" source="BUGZILLA"/>
		<reference ref_id="1031756" ref_url="https://bugzilla.suse.com/1031756" source="BUGZILLA"/>
		<reference ref_id="1033236" ref_url="https://bugzilla.suse.com/1033236" source="BUGZILLA"/>
		<reference ref_id="1038132" ref_url="https://bugzilla.suse.com/1038132" source="BUGZILLA"/>
		<reference ref_id="1038984" ref_url="https://bugzilla.suse.com/1038984" source="BUGZILLA"/>
		<reference ref_id="1043218" ref_url="https://bugzilla.suse.com/1043218" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1047785" ref_url="https://bugzilla.suse.com/1047785" source="BUGZILLA"/>
		<reference ref_id="1048315" ref_url="https://bugzilla.suse.com/1048315" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<description>
The Software Update Stack was updated to receive fixes and enhancements.

libzypp:

Security issues fixed:
- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned
  repositories and packages. (bsc#1045735, bsc#1038984)

Bug fixes:
- Re-probe on refresh if the repository type changes. (bsc#1048315)
- Propagate proper error code to DownloadProgressReport. (bsc#1047785)
- Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
- Support custom repo variables defined in /etc/zypp/vars.d.
- Adapt loop mounting of ISO images. (bsc#1038132, bsc#1033236)
- Fix potential crash if repository has no baseurl. (bsc#1043218)

zypper:

- Adapt download callback to report and handle unsigned packages. (bsc#1038984)
- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)
- Document support for custom repository variables defined in /etc/zypp/vars.d.
- Emphasize that it depends on how fast PackageKit will respond to a 'quit' request sent
  if PK blocks package management.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-03"/>
	<updated date="2017-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009745">SUSE bug 1009745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031756">SUSE bug 1031756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033236">SUSE bug 1033236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038132">SUSE bug 1038132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043218">SUSE bug 1043218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047785">SUSE bug 1047785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048315">SUSE bug 1048315</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549520" comment="libzypp-16.15.2-27.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549521" comment="zypper-1.13.30-18.13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79877" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046853" ref_url="https://bugzilla.suse.com/1046853" source="BUGZILLA"/>
		<reference ref_id="1046858" ref_url="https://bugzilla.suse.com/1046858" source="BUGZILLA"/>
		<reference ref_id="1047964" ref_url="https://bugzilla.suse.com/1047964" source="BUGZILLA"/>
		<reference ref_id="1047965" ref_url="https://bugzilla.suse.com/1047965" source="BUGZILLA"/>
		<reference ref_id="1049344" ref_url="https://bugzilla.suse.com/1049344" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684/" source="CVE"/>
		<reference ref_id="CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685/" source="CVE"/>
		<reference ref_id="CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112/" source="CVE"/>
		<reference ref_id="CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
  termcap format (bsc#1046853, bsc#1046858, bsc#1049344)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-07"/>
	<updated date="2017-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049344">SUSE bug 1049344</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549522" comment="libncurses5-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549523" comment="libncurses5-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549524" comment="libncurses6-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549525" comment="libncurses6-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009540903" comment="ncurses-devel-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549526" comment="ncurses-devel-32bit-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549527" comment="ncurses-utils-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549528" comment="tack-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549529" comment="terminfo-5.9-50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549530" comment="terminfo-base-5.9-50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79878" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049607" ref_url="https://bugzilla.suse.com/1049607" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003126.html" source="SUSE-SU"/>
		<description>
This update librsvg to version 2.40.18 fixes the following issues:

Security issue fixed:
- CVE-2017-11464: A SIGFPE is raised in the function box_blur_line of rsvg-filter.c. (bsc#1049607)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-09"/>
	<updated date="2017-08-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1049607">SUSE bug 1049607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549531" comment="gdk-pixbuf-loader-rsvg-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549532" comment="librsvg-2-2-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549533" comment="librsvg-2-2-32bit-2.40.18-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549534" comment="rsvg-view-2.40.18-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79879" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00037.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- A bug in the HTTP Chunked Encoding code has been fixed that could have been
  exploited by attackers to cause a stack-based buffer overflow in client or
  server code running libsoup (bsc#1052916, CVE-2017-2885).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-10"/>
	<updated date="2017-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549535" comment="libsoup-2_4-1-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549536" comment="libsoup-2_4-1-32bit-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518003" comment="libsoup-lang-2.54.1-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549537" comment="typelib-1_0-Soup-2_4-2.54.1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79880" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1048914" ref_url="https://bugzilla.suse.com/1048914" source="BUGZILLA"/>
		<reference ref_id="1052311" ref_url="https://bugzilla.suse.com/1052311" source="BUGZILLA"/>
		<reference ref_id="1052365" ref_url="https://bugzilla.suse.com/1052365" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00039.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000111: fix race condition in net-packet code that could be
  exploited to cause out-of-bounds memory access (bsc#1052365).
- CVE-2017-1000112: fix race condition in net-packet code that could have been
  exploited by unprivileged users to gain root access. (bsc#1052311).

The following non-security bugs were fixed:

- powerpc/numa: fix regression that could cause kernel panics during installation (bsc#1048914).
- bcache: force trigger gc (bsc#1038078).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048914">SUSE bug 1048914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549538" comment="kernel-default-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549539" comment="kernel-default-base-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549540" comment="kernel-default-devel-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549541" comment="kernel-default-man-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518008" comment="kernel-devel-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518009" comment="kernel-macros-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518010" comment="kernel-source-4.4.74-92.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549542" comment="kernel-syms-4.4.74-92.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79881" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1051222" ref_url="https://bugzilla.suse.com/1051222" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003132.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:


CVE-2017-11185: Specific RSA signatures passed to the gmp plugin for verification can
cause a null-pointer dereference and it may lead to a denial of service (bsc#1051222) 

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549543" comment="strongswan-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518013" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549544" comment="strongswan-hmac-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549545" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549546" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79882" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="979907" ref_url="https://bugzilla.suse.com/979907" source="BUGZILLA"/>
		<reference ref_id="997857" ref_url="https://bugzilla.suse.com/997857" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE 2016-7163: Integer Overflow could lead to remote code execution (bsc#997857).

- CVE 2015-8871: Use-after-free in opj_j2k_write_mco function could lead to denial of service (bsc#979907).


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/979907">SUSE bug 979907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549547" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79883" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038444" ref_url="https://bugzilla.suse.com/1038444" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:
- CVE-2017-8872: Out-of-bounds read in htmlParseTryOrFinish. (bsc#1038444)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-11"/>
	<updated date="2017-08-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549548" comment="libxml2-2-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549549" comment="libxml2-2-32bit-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532336" comment="libxml2-doc-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549550" comment="libxml2-tools-2.9.4-46.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549551" comment="python-libxml2-2.9.4-46.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79884" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1051643" ref_url="https://bugzilla.suse.com/1051643" source="BUGZILLA"/>
		<reference ref_id="1051644" ref_url="https://bugzilla.suse.com/1051644" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)
- CVE-2017-1000101: URL globbing out of bounds read could lead to a denial of service (bsc#1051643)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549552" comment="curl-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549553" comment="libcurl4-7.37.0-37.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549554" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79885" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049302" ref_url="https://bugzilla.suse.com/1049302" source="BUGZILLA"/>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049308" ref_url="https://bugzilla.suse.com/1049308" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<description>
This java-1_8_0-openjdk update to version jdk8u141 (icedtea 3.5.0) fixes the following issues:

Security issues fixed:
- CVE-2017-10053: Improved image post-processing steps (bsc#1049305)
- CVE-2017-10067: Additional jar validation steps (bsc#1049306)
- CVE-2017-10074: Image conversion improvements (bsc#1049307)
- CVE-2017-10078: Better script accessibility for JavaScript (bsc#1049308)
- CVE-2017-10081: Right parenthesis issue (bsc#1049309)
- CVE-2017-10086: Unspecified vulnerability in subcomponent JavaFX (bsc#1049310)
- CVE-2017-10087: Better Thread Pool execution (bsc#1049311)
- CVE-2017-10089: Service Registration Lifecycle (bsc#1049312)
- CVE-2017-10090: Better handling of channel groups (bsc#1049313)
- CVE-2017-10096: Transform Transformer Exceptions (bsc#1049314)
- CVE-2017-10101: Better reading of text catalogs (bsc#1049315)
- CVE-2017-10102: Improved garbage collection (bsc#1049316)
- CVE-2017-10105: Unspecified vulnerability in subcomponent deployment (bsc#1049317)
- CVE-2017-10107: Less Active Activations (bsc#1049318)
- CVE-2017-10108: Better naming attribution (bsc#1049319)
- CVE-2017-10109: Better sourcing of code (bsc#1049320)
- CVE-2017-10110: Better image fetching (bsc#1049321)
- CVE-2017-10111: Rearrange MethodHandle arrangements (bsc#1049322)
- CVE-2017-10114: Unspecified vulnerability in subcomponent JavaFX (bsc#1049323)
- CVE-2017-10115: Higher quality DSA operations (bsc#1049324)
- CVE-2017-10116: Proper directory lookup processing (bsc#1049325)
- CVE-2017-10118: Higher quality ECDSA operations (bsc#1049326)
- CVE-2017-10125: Unspecified vulnerability in subcomponent deployment (bsc#1049327)
- CVE-2017-10135: Better handling of PKCS8 material (bsc#1049328)
- CVE-2017-10176: Additional elliptic curve support (bsc#1049329)
- CVE-2017-10193: Improve algorithm constraints implementation (bsc#1049330)
- CVE-2017-10198: Clear certificate chain connections (bsc#1049331)
- CVE-2017-10243: Unspecified vulnerability in subcomponent JAX-WS (bsc#1049332)

Bug fixes:
- Check registry registration location
- Improved certificate processing
- JMX diagnostic improvements
- Update to libpng 1.6.28
- Import of OpenJDK 8 u141 build 15 (bsc#1049302)

New features:
- Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-16"/>
	<updated date="2017-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049302">SUSE bug 1049302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79886" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1029638" ref_url="https://bugzilla.suse.com/1029638" source="BUGZILLA"/>
		<reference ref_id="1029639" ref_url="https://bugzilla.suse.com/1029639" source="BUGZILLA"/>
		<reference ref_id="1029706" ref_url="https://bugzilla.suse.com/1029706" source="BUGZILLA"/>
		<reference ref_id="1029707" ref_url="https://bugzilla.suse.com/1029707" source="BUGZILLA"/>
		<reference ref_id="1029751" ref_url="https://bugzilla.suse.com/1029751" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<description>
This update for libplist fixes the following issues:

Security issues fixed:

- CVE-2017-6439: Heap-based buffer overflow in the parse_string_node function. (bsc#1029638)
- CVE-2017-6438: Heap-based buffer overflow in the parse_unicode_node function. (bsc#1029706)
- CVE-2017-6437: The base64encode function in base64.c allows local users to cause denial of service
  (out-of-bounds read) via a crafted plist file. (bsc#1029707)
- CVE-2017-6436: Integer overflow in parse_string_node. (bsc#1029751)
- CVE-2017-6435: Crafted plist file could lead to Heap-buffer overflow. (bsc#1029639)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029638">SUSE bug 1029638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029639">SUSE bug 1029639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029707">SUSE bug 1029707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029751">SUSE bug 1029751</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79887" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042812" ref_url="https://bugzilla.suse.com/1042812" source="BUGZILLA"/>
		<reference ref_id="1042826" ref_url="https://bugzilla.suse.com/1042826" source="BUGZILLA"/>
		<reference ref_id="1043289" ref_url="https://bugzilla.suse.com/1043289" source="BUGZILLA"/>
		<reference ref_id="1049072" ref_url="https://bugzilla.suse.com/1049072" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403/" source="CVE"/>
		<reference ref_id="CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439/" source="CVE"/>
		<reference ref_id="CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440/" source="CVE"/>
		<reference ref_id="CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:
- CVE-2017-9439: A memory leak was found in the function ReadPDBImage incoders/pdb.c (bsc#1042826)
- CVE-2017-9440: A memory leak was found in the function ReadPSDChannelin coders/psd.c (bsc#1042812)
- CVE-2017-9501: An assertion failure could cause a denial of service via a crafted file (bsc#1043289)
- CVE-2017-11403: ReadMNGImage function in coders/png.c has an out-of-order CloseBlob call, resulting
  in a use-after-free via acrafted file (bsc#1049072)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-17"/>
	<updated date="2017-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1042812">SUSE bug 1042812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549560" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549561" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79888" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1008539" ref_url="https://bugzilla.suse.com/1008539" source="BUGZILLA"/>
		<reference ref_id="1034584" ref_url="https://bugzilla.suse.com/1034584" source="BUGZILLA"/>
		<reference ref_id="1034827" ref_url="https://bugzilla.suse.com/1034827" source="BUGZILLA"/>
		<reference ref_id="1036494" ref_url="https://bugzilla.suse.com/1036494" source="BUGZILLA"/>
		<reference ref_id="1047262" ref_url="https://bugzilla.suse.com/1047262" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003146.html" source="SUSE-SU"/>
		<description>

This update for gnome-shell provides the following fixes:

- Fix not intuitive login screen for root user (bsc#1047262)
- Disable session selection button when it's hidden in user switch dialog (bsc#1034584, bsc#1034827)
- Fix app windows overlay app list in overview screen (bsc#1008539)
- Properly handle failures when loading extensions (bsc#1036494, CVE-2017-8288)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-18"/>
	<updated date="2017-08-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1008539">SUSE bug 1008539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034584">SUSE bug 1034584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034827">SUSE bug 1034827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036494">SUSE bug 1036494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047262">SUSE bug 1047262</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549562" comment="gnome-shell-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549563" comment="gnome-shell-browser-plugin-3.20.4-77.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518036" comment="gnome-shell-lang-3.20.4-77.7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79889" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049086" ref_url="https://bugzilla.suse.com/1049086" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984/" source="CVE"/>
		<reference ref_id="CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985/" source="CVE"/>
		<reference ref_id="CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987/" source="CVE"/>
		<reference ref_id="CVE-2017-10988" ref_url="https://www.suse.com/security/cve/CVE-2017-10988/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<description>
This update for freeradius fixes the following issues:

Security issues fixed:
- CVE-2017-10988: Decode 'signed' attributes correctly. (bnc#1049086)
- CVE-2017-10987: Check for option overflowing the packet. (bnc#1049086)
- CVE-2017-10985: Fix infinite loop and memory exhaustion with 'concat' attributes. (bnc#1049086)
- CVE-2017-10984: Fix write overflow in data2vp_wimax(). (bnc#1049086)
- CVE-2017-10983: Fix read overflow when decoding option 63. (bnc#1049086)
- CVE-2017-10978: Fix read / write overflow in make_secret(). (bnc#1049086)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-23"/>
	<updated date="2017-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10988/">CVE-2017-10988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79890" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005480" ref_url="https://bugzilla.suse.com/1005480" source="BUGZILLA"/>
		<reference ref_id="1005893" ref_url="https://bugzilla.suse.com/1005893" source="BUGZILLA"/>
		<reference ref_id="1006221" ref_url="https://bugzilla.suse.com/1006221" source="BUGZILLA"/>
		<reference ref_id="1016366" ref_url="https://bugzilla.suse.com/1016366" source="BUGZILLA"/>
		<reference ref_id="1016368" ref_url="https://bugzilla.suse.com/1016368" source="BUGZILLA"/>
		<reference ref_id="1016369" ref_url="https://bugzilla.suse.com/1016369" source="BUGZILLA"/>
		<reference ref_id="1016370" ref_url="https://bugzilla.suse.com/1016370" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes several issues.

These security issues were fixed:

- CVE-2016-8858: The kex_input_kexinit function in kex.c allowed remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests (bsc#1005480).
- CVE-2016-10012: The shared memory manager (associated with pre-authentication compression) did not ensure that a bounds check is enforced by all compilers, which might allowed local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures (bsc#1016370).
- CVE-2016-10009: Untrusted search path vulnerability in ssh-agent.c allowed remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket (bsc#1016366).
- CVE-2016-10010: When forwarding unix domain sockets with privilege separation disabled, the resulting sockets have be created as 'root' instead of the authenticated user. Forwarding unix domain sockets without privilege separation enabled is now rejected.
- CVE-2016-10011: authfile.c in sshd did not properly consider the effects of realloc on buffer contents, which might allowed local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process (bsc#1016369).

These non-security issues were fixed:

- Adjusted suggested command for removing conflicting server keys from the known_hosts file (bsc#1006221)
- Properly verify CIDR masks in configuration (bsc#1005893)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-23"/>
	<updated date="2017-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005893">SUSE bug 1005893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006221">SUSE bug 1006221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549575" comment="openssh-7.2p2-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549576" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549577" comment="openssh-fips-7.2p2-66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549578" comment="openssh-helpers-7.2p2-66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79891" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Version update to 8.0-4.10 [bsc#1053431]
  CVE-2017-10111, CVE-2017-10110, CVE-2017-10107, CVE-2017-10101, CVE-2017-10096, CVE-2017-10090, CVE-2017-10089, 
  CVE-2017-10087, CVE-2017-10102, CVE-2017-10116, CVE-2017-10074, CVE-2017-10078, CVE-2017-10115, CVE-2017-10067, 
  CVE-2017-10125, CVE-2017-10243, CVE-2017-10109, CVE-2017-10108, CVE-2017-10053, CVE-2017-10105, CVE-2017-10081:
    Multiple unspecified vulnerabilities in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU
    
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-25"/>
	<updated date="2017-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79892" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1053431" ref_url="https://bugzilla.suse.com/1053431" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.10 [bsc#1053431]
  * CVE-2017-10111 CVE-2017-10110 CVE-2017-10107 CVE-2017-10101
    CVE-2017-10096 CVE-2017-10090 CVE-2017-10089 CVE-2017-10087
    CVE-2017-10102 CVE-2017-10116 CVE-2017-10074 CVE-2017-10115
    CVE-2017-10067 CVE-2017-10125 CVE-2017-10243 CVE-2017-10109
    CVE-2017-10108 CVE-2017-10053 CVE-2017-10105 CVE-2017-10081: Multiple unspecified vulnerabilities 
in multiple Java components could lead to code execution or sandbox escape
 
 More information can be found here: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#Oracle_July_18_2017_CPU

		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1053431">SUSE bug 1053431</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79893" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005258" ref_url="https://bugzilla.suse.com/1005258" source="BUGZILLA"/>
		<reference ref_id="1021669" ref_url="https://bugzilla.suse.com/1021669" source="BUGZILLA"/>
		<reference ref_id="1034273" ref_url="https://bugzilla.suse.com/1034273" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00073.html" source="SUSE-SU"/>
		<description>
This update provides Quagga 1.1.1, which brings several fixes and enhancements.

Security issues fixed:

- CVE-2017-5495: Telnet 'vty' interface DoS due to unbounded memory allocation. (bsc#1021669)
- CVE-2016-1245: Stack overrun in IPv6 RA receive code. (bsc#1005258)

Bug fixes:

- Do not enable zebra's TCP interface (port 2600) to use default UNIX socket for communication
  between the daemons. (fate#323170)

Between 0.99.22.1 and 1.1.1 the following improvements have been implemented:

- Changed the default of 'link-detect' state, controlling whether zebra will respond to
  link-state events and consider an interface to be down when link is down. To retain the
  current behavior save your config before updating, otherwise remove the 'link-detect'
  flag from your config prior to updating. There is also a new global 'default link-detect
  (on|off)' flag to configure the global default.
- Greatly improved nexthop resolution for recursive routes.
- Event driven nexthop resolution for BGP.
- Route tags support.
- Transport of TE related metrics over OSPF, IS-IS.
- IPv6 Multipath for zebra and BGP.
- Multicast RIB support has been extended. It still is IPv4 only.
- RIP for IPv4 now supports equal-cost multipath (ECMP).
- route-maps have a new action 'set ipv6 next-hop peer-address'.
- route-maps have a new action 'set as-path prepend last-as'.
- 'next-hop-self all' to override nexthop on iBGP route reflector setups.
- New pimd daemon provides IPv4 PIM-SSM multicast routing.
- IPv6 address management has been improved regarding tentative addresses. This is visible in
  that a freshly configured address will not immediately be marked as usable.
- Recursive route support has been overhauled. Scripts parsing 'show ip route' output may need
  adaptation.
- A large amount of changes has been merged for ospf6d. Careful evaluation prior to deployment
  is recommended.
- Multiprotocol peerings over IPv6 now try to find a more appropriate IPv4 nexthop by looking at
  the interface.
- Relaxed bestpath criteria for multipath and improved display of multipath routes in 'show ip bgp'.
  Scripts parsing this output may need to be updated.
- Support for iBGP TTL security.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-29"/>
	<updated date="2017-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034273">SUSE bug 1034273</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549579" comment="libfpm_pb0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549580" comment="libospf0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549581" comment="libospfapiclient0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549582" comment="libquagga_pb0-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549583" comment="libzebra1-1.1.1-17.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549584" comment="quagga-1.1.1-17.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79894" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1047236" ref_url="https://bugzilla.suse.com/1047236" source="BUGZILLA"/>
		<reference ref_id="1047240" ref_url="https://bugzilla.suse.com/1047240" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-30"/>
	<updated date="2017-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549585" comment="expat-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549586" comment="libexpat1-2.1.0-21.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549587" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79895" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1052481" ref_url="https://bugzilla.suse.com/1052481" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00001.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2017-1000117: A client side code execution via shell injection when receiving special submodule strings from a malicious server was fixed (bsc#1052481)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009540949" comment="git-core-2.12.3-27.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532374" comment="git-doc-2.12.3-27.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79896" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) used an integer
  data type that is inconsistent with a header file, which allowed remote attackers to cause a
  denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code
  via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional
  Algorithm implementation in ICU4C in International Components for Unicode (ICU) did not properly
  track directionally isolated pieces of text, which allowed remote attackers to cause a denial of
  service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text
  (bsc#929629).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-08-31"/>
	<updated date="2017-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549588" comment="libicu-doc-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549589" comment="libicu52_1-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549590" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549591" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79897" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002573" ref_url="https://bugzilla.suse.com/1002573" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1035231" ref_url="https://bugzilla.suse.com/1035231" source="BUGZILLA"/>
		<reference ref_id="1037840" ref_url="https://bugzilla.suse.com/1037840" source="BUGZILLA"/>
		<reference ref_id="1046637" ref_url="https://bugzilla.suse.com/1046637" source="BUGZILLA"/>
		<reference ref_id="1049578" ref_url="https://bugzilla.suse.com/1049578" source="BUGZILLA"/>
		<reference ref_id="1051787" ref_url="https://bugzilla.suse.com/1051787" source="BUGZILLA"/>
		<reference ref_id="1051788" ref_url="https://bugzilla.suse.com/1051788" source="BUGZILLA"/>
		<reference ref_id="1051789" ref_url="https://bugzilla.suse.com/1051789" source="BUGZILLA"/>
		<reference ref_id="1052686" ref_url="https://bugzilla.suse.com/1052686" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.7.3 fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-12136: Race conditions with maptrack free list handling allows a
  malicious guest administrator to crash the host or escalate their privilege to
  that of the host (XSA-228, bsc#1051789).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during a
  server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230 CVE-2017-12855).

These non-security issues were fixed:

- bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack 
- bsc#1035231: Migration of HVM domU did not use superpages on destination dom0
- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd
- bsc#1037840: Xen-detect always showed HVM for PV guests
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-01"/>
	<updated date="2017-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1002573">SUSE bug 1002573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035231">SUSE bug 1035231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037840">SUSE bug 1037840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79898" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549595" comment="postgresql94-9.4.13-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549596" comment="postgresql94-contrib-9.4.13-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532380" comment="postgresql94-docs-9.4.13-21.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549597" comment="postgresql94-server-9.4.13-21.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79899" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1051684" ref_url="https://bugzilla.suse.com/1051684" source="BUGZILLA"/>
		<reference ref_id="1051685" ref_url="https://bugzilla.suse.com/1051685" source="BUGZILLA"/>
		<reference ref_id="1053259" ref_url="https://bugzilla.suse.com/1053259" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<reference ref_id="CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

* CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
* CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
* CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)

The changelog for this release is here:
	https://www.postgresql.org/docs/9.6/static/release-9-6-4.html

		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-05"/>
	<updated date="2017-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549598" comment="libecpg6-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549599" comment="libpq5-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009544979" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549600" comment="postgresql96-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549601" comment="postgresql96-contrib-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532386" comment="postgresql96-docs-9.6.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549602" comment="postgresql96-server-9.6.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79900" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027024" ref_url="https://bugzilla.suse.com/1027024" source="BUGZILLA"/>
		<reference ref_id="1027025" ref_url="https://bugzilla.suse.com/1027025" source="BUGZILLA"/>
		<reference ref_id="1027026" ref_url="https://bugzilla.suse.com/1027026" source="BUGZILLA"/>
		<reference ref_id="1048289" ref_url="https://bugzilla.suse.com/1048289" source="BUGZILLA"/>
		<reference ref_id="1048544" ref_url="https://bugzilla.suse.com/1048544" source="BUGZILLA"/>
		<reference ref_id="1049877" ref_url="https://bugzilla.suse.com/1049877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2017-2862: JPEG gdk_pixbuf__jpeg_image_load_increment Code Execution Vulnerability (bsc#1048289)
- CVE-2017-2870: tiff_image_parse Code Execution Vulnerability (bsc#1048544)
- CVE-2017-6313: A dangerous integer underflow in io-icns.c (bsc#1027024)
- CVE-2017-6314: Infinite loop in io-tiff.c (bsc#1027025)
- CVE-2017-6312: Out-of-bounds read on io-ico.c (bsc#1027026)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-06"/>
	<updated date="2017-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049877">SUSE bug 1049877</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79901" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00018.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issue:

- CVE-2017-1000083: Remote attackers could have used the comicbook mode of evince to inject shell code (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-08"/>
	<updated date="2017-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549608" comment="evince-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549609" comment="evince-browser-plugin-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518066" comment="evince-lang-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549610" comment="evince-plugin-djvudocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549611" comment="evince-plugin-dvidocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549612" comment="evince-plugin-pdfdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549613" comment="evince-plugin-psdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549614" comment="evince-plugin-tiffdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549615" comment="evince-plugin-xpsdocument-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549616" comment="libevdocument3-4-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549617" comment="libevview3-3-3.20.1-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549618" comment="nautilus-evince-3.20.1-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79902" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012266" ref_url="https://bugzilla.suse.com/1012266" source="BUGZILLA"/>
		<reference ref_id="1014560" ref_url="https://bugzilla.suse.com/1014560" source="BUGZILLA"/>
		<reference ref_id="1014566" ref_url="https://bugzilla.suse.com/1014566" source="BUGZILLA"/>
		<reference ref_id="1020601" ref_url="https://bugzilla.suse.com/1020601" source="BUGZILLA"/>
		<reference ref_id="997682" ref_url="https://bugzilla.suse.com/997682" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00057.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

This security issue was fixed:

- CVE-2016-10156: Fix permissions set on permanent timer timestamp files, preventing local unprivileged users from escalating privileges (bsc#1020601).

These non-security issues were fixed:

- Fix permission set on /var/lib/systemd/linger/*
- install: follow config_path symlink (#3362)
- install: fix disable when /etc/systemd/system is a symlink (bsc#1014560)
- run: make --slice= work in conjunction with --scope (bsc#1014566)
- core: don't dispatch load queue when setting Slice= for transient units
- systemctl: remove duplicate entries showed by list-dependencies (#5049) (bsc#1012266)
- rule: don't automatically online standby memory on s390x (bsc#997682)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012266">SUSE bug 1012266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014560">SUSE bug 1014560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014566">SUSE bug 1014566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020601">SUSE bug 1020601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997682">SUSE bug 997682</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549619" comment="libsystemd0-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549620" comment="libsystemd0-32bit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549621" comment="libudev1-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549622" comment="libudev1-32bit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549623" comment="systemd-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549624" comment="systemd-32bit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518084" comment="systemd-bash-completion-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549625" comment="systemd-sysvinit-228-132.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549626" comment="udev-228-132.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79903" version="1" class="patch">
	<metadata>
		<title>Security update for cvs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1053364" ref_url="https://bugzilla.suse.com/1053364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html" source="SUSE-SU"/>
		<description>
This update for cvs fixes the following issues:

  - CVE-2017-12836: A leading dash in the argument of the '-d' option could lead to argument injection (bsc#1053364)

  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-12"/>
	<updated date="2017-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549627" comment="cvs-1.12.12-182.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532408" comment="cvs-doc-1.12.12-182.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79904" version="1" class="patch">
	<metadata>
		<title>Security update for pcsc-lite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017902" ref_url="https://bugzilla.suse.com/1017902" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002597.html" source="SUSE-SU"/>
		<description>

pcsc-lite was updated to fix one security issue.

This security issue was fixed:

- CVE-2016-10109: This use-after-free and double-free issue allowed local attacker to cause a Denial of Service and possible privilege escalation (bsc#1017902).
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-25"/>
	<updated date="2017-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017902">SUSE bug 1017902</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549628" comment="libpcsclite1-1.8.10-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549629" comment="pcsc-lite-1.8.10-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79905" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1003898" ref_url="https://bugzilla.suse.com/1003898" source="BUGZILLA"/>
		<reference ref_id="1018556" ref_url="https://bugzilla.suse.com/1018556" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002599.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 to version 1.8.22 fixes one security issue and bugs.

The following security issue was fixed:

- bsc#1003898: Do not treat ActivationFailure message received from root-owned systemd name as a format string.

The following upstream changes are included:

- Change the default configuration for the session bus to only allow EXTERNAL authentication (secure kernel-mediated credentials-passing), as was already done for the system bus.
- Fix a memory leak when GetConnectionCredentials() succeeds (fdo#91008)
- Ensure that dbus-monitor does not reply to messages intended for others (fdo#90952)
- Add locking to DBusCounter's reference count and notify function (fdo#89297)
- Ensure that DBusTransport's reference count is protected by the corresponding DBusConnection's lock (fdo#90312)
- Correctly release DBusServer mutex before early-return if we run out of memory while copying authentication mechanisms (fdo#90021)
- Correctly initialize all fields of DBusTypeReader (fdo#90021)
- Fix some missing \n in verbose (debug log) messages (fdo#90004)
- Clean up some memory leaks in test code (fdo#90021)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-26"/>
	<updated date="2017-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018556">SUSE bug 1018556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549630" comment="dbus-1-1.8.22-24.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549631" comment="dbus-1-x11-1.8.22-24.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549632" comment="libdbus-1-3-1.8.22-24.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549633" comment="libdbus-1-3-32bit-1.8.22-24.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79906" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055695" ref_url="https://bugzilla.suse.com/1055695" source="BUGZILLA"/>
		<reference ref_id="1056278" ref_url="https://bugzilla.suse.com/1056278" source="BUGZILLA"/>
		<reference ref_id="1056280" ref_url="https://bugzilla.suse.com/1056280" source="BUGZILLA"/>
		<reference ref_id="1056281" ref_url="https://bugzilla.suse.com/1056281" source="BUGZILLA"/>
		<reference ref_id="1056282" ref_url="https://bugzilla.suse.com/1056282" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316/" source="CVE"/>
		<reference ref_id="CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317/" source="CVE"/>
		<reference ref_id="CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318/" source="CVE"/>
		<reference ref_id="CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055695">SUSE bug 1055695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056280">SUSE bug 1056280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549634" comment="xen-doc-html-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549635" comment="xen-tools-4.7.3_04-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549636" comment="xen-tools-domU-4.7.3_04-43.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79907" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1057389" ref_url="https://bugzilla.suse.com/1057389" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00071.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive the following security fixes:

- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel was
  vulnerable to a stack overflow while processing L2CAP configuration
  responses, resulting in a potential remote denial-of-service vulnerability
  but no remote code execution due to use of CONFIG_CC_STACKPROTECTOR.
  [bnc#1057389]
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-18"/>
	<updated date="2017-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549637" comment="kernel-default-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549638" comment="kernel-default-base-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549639" comment="kernel-default-devel-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549640" comment="kernel-default-man-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518101" comment="kernel-devel-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518102" comment="kernel-macros-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518103" comment="kernel-source-4.4.74-92.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549641" comment="kernel-syms-4.4.74-92.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79908" version="1" class="patch">
	<metadata>
		<title>Security update for gcc48 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1011348" ref_url="https://bugzilla.suse.com/1011348" source="BUGZILLA"/>
		<reference ref_id="1022062" ref_url="https://bugzilla.suse.com/1022062" source="BUGZILLA"/>
		<reference ref_id="1028744" ref_url="https://bugzilla.suse.com/1028744" source="BUGZILLA"/>
		<reference ref_id="1039513" ref_url="https://bugzilla.suse.com/1039513" source="BUGZILLA"/>
		<reference ref_id="1044016" ref_url="https://bugzilla.suse.com/1044016" source="BUGZILLA"/>
		<reference ref_id="1050947" ref_url="https://bugzilla.suse.com/1050947" source="BUGZILLA"/>
		<reference ref_id="988274" ref_url="https://bugzilla.suse.com/988274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
		<description>
This update for gcc48 fixes the following issues:

Security issues fixed:

- A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513]
  Future maintenance releases of packages will be built with this option.
- CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947]

Bugs fixed:

- Enable LFS support in 32bit libgcov.a.  [bsc#1044016]
- Bump libffi version in libffi.pc to 3.0.11.
- Fix libffi issue for armv7l.  [bsc#988274]
- Properly diagnose missing -fsanitize=address support on ppc64le.  [bnc#1028744]
- Backport patch for PR65612.  [bnc#1022062]
- Fixed DR#1288.  [bnc#1011348]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-19"/>
	<updated date="2017-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011348">SUSE bug 1011348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022062">SUSE bug 1022062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028744">SUSE bug 1028744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039513">SUSE bug 1039513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044016">SUSE bug 1044016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988274">SUSE bug 988274</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549642" comment="cpp48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545006" comment="gcc48-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545007" comment="gcc48-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545008" comment="gcc48-c++-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518111" comment="gcc48-info-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545009" comment="gcc48-locale-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518112" comment="libasan0-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518113" comment="libasan0-32bit-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545010" comment="libstdc++48-devel-4.8.5-31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545011" comment="libstdc++48-devel-32bit-4.8.5-31.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79909" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1058425" ref_url="https://bugzilla.suse.com/1058425" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00074.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes one issues.

This security issue was fixed:

- CVE-2017-14482: Remote code execution via mails with 'Content-Type: text/enriched' (bsc#1058425)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-20"/>
	<updated date="2017-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549643" comment="emacs-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532420" comment="emacs-el-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518121" comment="emacs-info-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549644" comment="emacs-nox-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549645" comment="emacs-x11-24.3-25.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549646" comment="etags-24.3-25.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79910" version="1" class="patch">
	<metadata>
		<title>Security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056996" ref_url="https://bugzilla.suse.com/1056996" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003255.html" source="SUSE-SU"/>
		<description>
This update for libzip fixes one issues.

This security issue was fixed:

- CVE-2017-14107: The _zip_read_eocd64 function mishandled EOCD records, which
  allowed remote attackers to cause a denial of service (memory allocation
  failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive (bsc#1056996).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056996">SUSE bug 1056996</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549647" comment="libzip2-0.11.1-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79911" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1058058" ref_url="https://bugzilla.suse.com/1058058" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003254.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following security issue:

- CVE-2017-9798: Prevent use-after-free use of memory that allowed for an
  information leak via OPTIONS (bsc#1058058).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-21"/>
	<updated date="2017-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549648" comment="apache2-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532426" comment="apache2-doc-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549649" comment="apache2-example-pages-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549650" comment="apache2-prefork-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549651" comment="apache2-utils-2.4.23-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549652" comment="apache2-worker-2.4.23-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79912" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1044417" ref_url="https://bugzilla.suse.com/1044417" source="BUGZILLA"/>
		<reference ref_id="1045341" ref_url="https://bugzilla.suse.com/1045341" source="BUGZILLA"/>
		<reference ref_id="1056248" ref_url="https://bugzilla.suse.com/1056248" source="BUGZILLA"/>
		<reference ref_id="1056249" ref_url="https://bugzilla.suse.com/1056249" source="BUGZILLA"/>
		<reference ref_id="1056251" ref_url="https://bugzilla.suse.com/1056251" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617/" source="CVE"/>
		<reference ref_id="CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.9 fixes several issues.

These security issues were fixed:

- CVE-2017-13767: The MSDP dissector could have gone into an infinite loop.
  This was addressed by adding length validation (bsc#1056248).
- CVE-2017-13766: The Profinet I/O dissector could have crash with an
  out-of-bounds write. This was addressed by adding string validation
  (bsc#1056249).
- CVE-2017-13765: The IrCOMM dissector had a buffer over-read and application
  crash. This was addressed by adding length validation (bsc#1056251).
- CVE-2017-9766: PROFINET IO data with a high recursion depth allowed remote
  attackers to cause a denial of service (stack exhaustion) in the
  dissect_IODWriteReq function (bsc#1045341).
- CVE-2017-9617: Deeply nested DAAP data may have cause stack exhaustion
  (uncontrolled recursion) in the dissect_daap_one_tag function in the DAAP
  dissector (bsc#1044417).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-22"/>
	<updated date="2017-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79913" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1033109" ref_url="https://bugzilla.suse.com/1033109" source="BUGZILLA"/>
		<reference ref_id="1033111" ref_url="https://bugzilla.suse.com/1033111" source="BUGZILLA"/>
		<reference ref_id="1033112" ref_url="https://bugzilla.suse.com/1033112" source="BUGZILLA"/>
		<reference ref_id="1033113" ref_url="https://bugzilla.suse.com/1033113" source="BUGZILLA"/>
		<reference ref_id="1033118" ref_url="https://bugzilla.suse.com/1033118" source="BUGZILLA"/>
		<reference ref_id="1033120" ref_url="https://bugzilla.suse.com/1033120" source="BUGZILLA"/>
		<reference ref_id="1033126" ref_url="https://bugzilla.suse.com/1033126" source="BUGZILLA"/>
		<reference ref_id="1033127" ref_url="https://bugzilla.suse.com/1033127" source="BUGZILLA"/>
		<reference ref_id="1033128" ref_url="https://bugzilla.suse.com/1033128" source="BUGZILLA"/>
		<reference ref_id="1033129" ref_url="https://bugzilla.suse.com/1033129" source="BUGZILLA"/>
		<reference ref_id="1033131" ref_url="https://bugzilla.suse.com/1033131" source="BUGZILLA"/>
		<reference ref_id="1038438" ref_url="https://bugzilla.suse.com/1038438" source="BUGZILLA"/>
		<reference ref_id="1042804" ref_url="https://bugzilla.suse.com/1042804" source="BUGZILLA"/>
		<reference ref_id="1042805" ref_url="https://bugzilla.suse.com/1042805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.8 fixes a several bugs and security issues:

These security issues were fixed:

- CVE-2017-7595: The JPEGSetupEncode function allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033127).
- CVE-2016-10371: The TIFFWriteDirectoryTagCheckedRational function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file (bsc#1038438).
- CVE-2017-7598: Error in tif_dirread.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image (bsc#1033118).
- CVE-2017-7596: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033126).
- CVE-2017-7597: Undefined behavior because of floats outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033120).
- CVE-2017-7599: Undefined behavior because of shorts outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033113).
- CVE-2017-7600: Undefined behavior because of chars outside their expected value range, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033112).
- CVE-2017-7601: Because of a shift exponent too large for 64-bit type long undefined behavior was caused, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033111).
- CVE-2017-7602: Prevent signed integer overflow, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033109).
- CVE-2017-7592: The putagreytile function had a left-shift undefined behavior issue, which might allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image (bsc#1033131).
- CVE-2017-7593: Ensure that tif_rawdata is properly initialized, to prevent remote attackers to obtain sensitive information from process memory via a crafted image (bsc#1033129).
- CVE-2017-7594: The OJPEGReadHeaderInfoSecTablesDcTable function allowed remote attackers to cause a denial of service (memory leak) via a crafted image (bsc#1033128).
- CVE-2017-9403: Prevent memory leak in function TIFFReadDirEntryLong8Array, which allowed attackers to cause a denial of service via a crafted file (bsc#1042805).
- CVE-2017-9404: Fixed memory leak vulnerability in function OJPEGReadHeaderInfoSecTablesQTable, which allowed attackers to cause a denial of service via a crafted file (bsc#1042804).

These various other issues were fixed:

- Fix uint32 overflow in TIFFReadEncodedStrip() that caused an
  integer division by zero. Reported by Agostino Sarubbo.
- fix heap-based buffer overflow on generation of PixarLog / LUV
  compressed files, with ColorMap, TransferFunction attached and
  nasty plays with bitspersample. The fix for LUV has not been
  tested, but suffers from the same kind of issue of PixarLog.
- modify ChopUpSingleUncompressedStrip() to instanciate compute
  ntrips as TIFFhowmany_32(td-&gt;td_imagelength, rowsperstrip),
  instead of a logic based on the total size of data. Which is
  faulty is the total size of data is not sufficient to fill the
  whole image, and thus results in reading outside of the
  StripByCounts/StripOffsets arrays when using
  TIFFReadScanline()
- make OJPEGDecode() early exit in case of failure in
  OJPEGPreDecode(). This will avoid a divide by zero, and
  potential other issues.
- fix misleading indentation as warned by GCC.
- revert change done on 2016-01-09 that made Param member of
  TIFFFaxTabEnt structure a uint16 to reduce size of the
  binary. It happens that the Hylafax software uses the tables
  that follow this typedef (TIFFFaxMainTable, TIFFFaxWhiteTable,
  TIFFFaxBlackTable), although they are not in a public libtiff
  header.
- add TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants
  of the functions without ext, with an extra argument to control
  the stop_on_error behaviour.
- fix potential memory leaks in error code path of
  TIFFRGBAImageBegin().
- increase libjpeg max memory usable to 10 MB instead of libjpeg
  1MB default. This helps when creating files with 'big' tile,
  without using libjpeg temporary files.
- add _TIFFcalloc()
- return 0 in Encode functions instead of -1 when
  TIFFFlushData1() fails.
- only run JPEGFixupTagsSubsampling() if the YCbCrSubsampling
  tag is not explicitly present. This helps a bit to reduce the
  I/O amount when the tag is present (especially on cloud hosted
  files).
- in LZWPostEncode(), increase, if necessary, the code bit-width
  after flushing the remaining code and before emitting the EOI
  code.
- fix memory leak in error code path of PixarLogSetupDecode().
- fix potential memory leak in
  OJPEGReadHeaderInfoSecTablesQTable,
  OJPEGReadHeaderInfoSecTablesDcTable and
  OJPEGReadHeaderInfoSecTablesAcTable
- avoid crash in Fax3Close() on empty file.
- TIFFFillStrip(): add limitation to the number of bytes read
  in case td_stripbytecount[strip] is bigger than reasonable,
  so as to avoid excessive memory allocation.
- fix memory leak when the underlying codec (ZIP, PixarLog)
  succeeds its setupdecode() method, but PredictorSetup fails.
- TIFFFillStrip() and TIFFFillTile(): avoid excessive memory
  allocation in case of shorten files. Only effective on 64 bit
  builds and non-mapped cases.
- TIFFFillStripPartial() / TIFFSeek(), avoid potential integer
  overflows with read_ahead in CHUNKY_STRIP_READ_SUPPORT mode.
- avoid excessive memory allocation in case of shorten files.
  Only effective on 64 bit builds.
- update tif_rawcc in CHUNKY_STRIP_READ_SUPPORT mode with
  tif_rawdataloaded when calling TIFFStartStrip() or
  TIFFFillStripPartial(). 
- avoid potential int32 overflow in TIFFYCbCrToRGBInit() Fixes
- avoid potential int32 overflows in multiply_ms() and add_ms().
- fix out-of-buffer read in PackBitsDecode() Fixes
- LogL16InitState(): avoid excessive memory allocation when
  RowsPerStrip tag is missing.
- update dec_bitsleft at beginning of LZWDecode(), and update
  tif_rawcc at end of LZWDecode(). This is needed to properly
  work with the latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- PixarLogDecode(): resync tif_rawcp with next_in and tif_rawcc
  with avail_in at beginning and end of function, similarly to
  what is done in LZWDecode(). Likely needed so that it works
  properly with latest chnges in tif_read.c in
  CHUNKY_STRIP_READ_SUPPORT mode.
- initYCbCrConversion(): add basic validation of luma and
  refBlackWhite coefficients (just check they are not NaN for
  now), to avoid potential float to int overflows.
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid division by zero
- _TIFFVSetField(): fix outside range cast of double to float.
- initYCbCrConversion(): check luma[1] is not zero to avoid
  division by zero.
- initYCbCrConversion(): stricter validation for refBlackWhite
  coefficients values.
- avoid uint32 underflow in cpDecodedStrips that can cause
  various issues, such as buffer overflows in the library.
- fix readContigStripsIntoBuffer() in -i (ignore) mode so that
  the output buffer is correctly incremented to avoid write
  outside bounds.
- add 3 extra bytes at end of strip buffer in
  readSeparateStripsIntoBuffer() to avoid read outside of heap
  allocated buffer.
- fix integer division by zero when BitsPerSample is missing.
- fix null pointer dereference in -r mode when the image has no
  StripByteCount tag.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- when TIFFGetField(, TIFFTAG_NUMBEROFINKS, ) is called, limit
  the return number of inks to SamplesPerPixel, so that code
  that parses ink names doesn't go past the end of the buffer.
- avoid potential division by zero is BitsPerSamples tag is
  missing.
- fix uint32 underflow/overflow that can cause heap-based buffer
  overflow.
- replace assert( (bps % 8) == 0 ) by a non assert check.
- fix 2 heap-based buffer overflows (in PSDataBW and
  PSDataColorContig).
- prevent heap-based buffer overflow in -j mode on a paletted
  image.
- fix wrong usage of memcpy() that can trigger unspecified behaviour.
- avoid potential invalid memory read in t2p_writeproc.
- avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile().
- remove extraneous TIFFClose() in error code path, that caused
  double free.
- error out cleanly in cpContig2SeparateByRow and
  cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap
  based overflow.
- avoid integer division by zero.
- call TIFFClose() in error code paths.
- emit appropriate message if the input file is empty.
- close TIFF handle in error code path.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033118">SUSE bug 1033118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033128">SUSE bug 1033128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033131">SUSE bug 1033131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038438">SUSE bug 1038438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042804">SUSE bug 1042804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042805">SUSE bug 1042805</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79914" version="1" class="patch">
	<metadata>
		<title>Security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056088" ref_url="https://bugzilla.suse.com/1056088" source="BUGZILLA"/>
		<reference ref_id="1056090" ref_url="https://bugzilla.suse.com/1056090" source="BUGZILLA"/>
		<reference ref_id="1056093" ref_url="https://bugzilla.suse.com/1056093" source="BUGZILLA"/>
		<reference ref_id="1056095" ref_url="https://bugzilla.suse.com/1056095" source="BUGZILLA"/>
		<reference ref_id="1056097" ref_url="https://bugzilla.suse.com/1056097" source="BUGZILLA"/>
		<reference ref_id="1056101" ref_url="https://bugzilla.suse.com/1056101" source="BUGZILLA"/>
		<reference ref_id="1056105" ref_url="https://bugzilla.suse.com/1056105" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<description>
This update for liblouis fixes several issues.

These security issues were fixed:

- CVE-2017-13738: Prevent illegal address access in the _lou_getALine function that allowed to cause remote DoS (bsc#1056105).
- CVE-2017-13739: Prevent heap-based buffer overflow in the function resolveSubtable() that could have caused DoS or remote code execution (bsc#1056101).
- CVE-2017-13740: Prevent stack-based buffer overflow in the function parseChars() that could have caused DoS or possibly unspecified other impact (bsc#1056097) 
- CVE-2017-13741: Prevent use-after-free in function compileBrailleIndicator() that allowed to cause remote DoS (bsc#1056095).
- CVE_2017-13742: Prevent stack-based buffer overflow in function includeFile that allowed to cause remote DoS (bsc#1056093).
- CVE-2017-13743: Prevent buffer overflow triggered in the function _lou_showString() that allowed to cause remote DoS (bsc#1056090).
- CVE-2017-13744: Prevent illegal address access in the function _lou_getALine() that allowed to cause remote DoS (bsc#1056088).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-26"/>
	<updated date="2017-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79915" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1052829" ref_url="https://bugzilla.suse.com/1052829" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.3 fixes several issues.

These security issues were fixed: 

- CVE-2017-7807 Domain hijacking through AppCache fallback (bsc#1052829)
- CVE-2017-7791 Spoofing following page navigation with data: protocol and modal alerts (bsc#1052829)
- CVE-2017-7792 Buffer overflow viewing certificates with an extremely long OID (bsc#1052829)
- CVE-2017-7782 WindowsDllDetourPatcher allocates memory without DEP protections (bsc#1052829)
- CVE-2017-7787 Same-origin policy bypass with iframes through page reloads (bsc#1052829)
- CVE-2017-7786 Buffer overflow while painting non-displayable SVG (bsc#1052829)
- CVE-2017-7785 Buffer overflow manipulating ARIA attributes in DOM (bsc#1052829)
- CVE-2017-7784 Use-after-free with image observers (bsc#1052829)
- CVE-2017-7753 Out-of-bounds read with cached style data and pseudo-elements (bsc#1052829)
- CVE-2017-7798 XUL injection in the style editor in devtools (bsc#1052829)
- CVE-2017-7804 Memory protection bypass through WindowsDllDetourPatcher (bsc#1052829)
- CVE-2017-7779 Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3 (bsc#1052829)
- CVE-2017-7800 Use-after-free in WebSockets during disconnection (bsc#1052829)
- CVE-2017-7801 Use-after-free with marquee during window resizing (bsc#1052829)
- CVE-2017-7802 Use-after-free resizing image elements (bsc#1052829)
- CVE-2017-7803 CSP containing 'sandbox' improperly applied (bsc#1052829)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-28"/>
	<updated date="2017-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79916" version="1" class="patch">
	<metadata>
		<title>Security update for tcmu-runner (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049485" ref_url="https://bugzilla.suse.com/1049485" source="BUGZILLA"/>
		<reference ref_id="1049491" ref_url="https://bugzilla.suse.com/1049491" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000198" ref_url="https://www.suse.com/security/cve/CVE-2017-1000198/" source="CVE"/>
		<reference ref_id="CVE-2017-1000199" ref_url="https://www.suse.com/security/cve/CVE-2017-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003265.html" source="SUSE-SU"/>
		<description>
This update for tcmu-runner fixes the following issues:

Security issues fixed:

- CVE-2017-1000198: The glfs handler allowed local DoS via crafted CheckConfig strings (bsc#1049485)
- CVE-2017-1000199: The qcow handler leaked information via the CheckConfig D-Bus method (bsc#1049491)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-09-29"/>
	<updated date="2017-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049485">SUSE bug 1049485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049491">SUSE bug 1049491</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000198/">CVE-2017-1000198</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000199/">CVE-2017-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549668" comment="tcmu-runner-1.0.4-3.3.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79917" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1060354" ref_url="https://bugzilla.suse.com/1060354" source="BUGZILLA"/>
		<reference ref_id="1060355" ref_url="https://bugzilla.suse.com/1060355" source="BUGZILLA"/>
		<reference ref_id="1060360" ref_url="https://bugzilla.suse.com/1060360" source="BUGZILLA"/>
		<reference ref_id="1060361" ref_url="https://bugzilla.suse.com/1060361" source="BUGZILLA"/>
		<reference ref_id="1060362" ref_url="https://bugzilla.suse.com/1060362" source="BUGZILLA"/>
		<reference ref_id="1060364" ref_url="https://bugzilla.suse.com/1060364" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following security issues:

- CVE-2017-14491: 2 byte heap based overflow. [bsc#1060354]
- CVE-2017-14492: heap based overflow. [bsc#1060355]
- CVE-2017-14493: stack based overflow. [bsc#1060360]
- CVE-2017-14494: DHCP - info leak. [bsc#1060361]
- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]
- CVE-2017-14496: DNS - DoS Integer underflow. [bsc#1060364]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-02"/>
	<updated date="2017-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79918" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056421" ref_url="https://bugzilla.suse.com/1056421" source="BUGZILLA"/>
		<reference ref_id="1056562" ref_url="https://bugzilla.suse.com/1056562" source="BUGZILLA"/>
		<reference ref_id="1056621" ref_url="https://bugzilla.suse.com/1056621" source="BUGZILLA"/>
		<reference ref_id="1056622" ref_url="https://bugzilla.suse.com/1056622" source="BUGZILLA"/>
		<reference ref_id="1057511" ref_url="https://bugzilla.suse.com/1057511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes several issues.

These security issues were fixed:

- CVE-2016-10507: Integer overflow vulnerability in the bmp24toimage function
  allowed remote attackers to cause a denial of service (heap-based buffer
  over-read and application crash) via a crafted bmp file (bsc#1056421).
- CVE-2017-14039: A heap-based buffer overflow was discovered in the
  opj_t2_encode_packet function. The vulnerability caused an out-of-bounds write,
  which may have lead to remote denial of service or possibly unspecified other
  impact (bsc#1056622).
- CVE-2017-14164: A size-validation issue was discovered in opj_j2k_write_sot.
  The vulnerability caused an out-of-bounds write, which may have lead to remote
  DoS or possibly remote code execution (bsc#1057511).
- CVE-2017-14040: An invalid write access was discovered in bin/jp2/convert.c,
  triggering a crash in the tgatoimage function. The vulnerability may have lead
  to remote denial of service or possibly unspecified other impact (bsc#1056621).
- CVE-2017-14041: A stack-based buffer overflow was discovered in the
  pgxtoimage function. The vulnerability caused an out-of-bounds write, which may
  have lead to remote denial of service or possibly remote code execution
  (bsc#1056562).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-05"/>
	<updated date="2017-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056421">SUSE bug 1056421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056562">SUSE bug 1056562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056621">SUSE bug 1056621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056622">SUSE bug 1056622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79919" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1044084" ref_url="https://bugzilla.suse.com/1044084" source="BUGZILLA"/>
		<reference ref_id="1050707" ref_url="https://bugzilla.suse.com/1050707" source="BUGZILLA"/>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<description>
This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624).
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622).
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565).

These non-security issues were fixed:

- Fixed error where short name length was read as 2 bytes, should be 1 (bsc#1042419)
- Fixed GUID string format on GetPrinter to prevent published printers from disappearing 7 (bsc#1050707).
- Halt endless forest trust scan to prevent winbind from running out of memory (bsc#1044084).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-05"/>
	<updated date="2017-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044084">SUSE bug 1044084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050707">SUSE bug 1050707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549671" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549672" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549673" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549674" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549675" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549676" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549677" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549678" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549679" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549680" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549681" comment="libndr0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549682" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549683" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549684" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549685" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549686" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549687" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549688" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549689" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549690" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549691" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549692" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549693" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549694" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549695" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549696" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549697" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549698" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549699" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549700" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549701" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549702" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549703" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549704" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549705" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549706" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549707" comment="samba-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549708" comment="samba-client-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549709" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549710" comment="samba-libs-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549711" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549712" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549713" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79920" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1032680" ref_url="https://bugzilla.suse.com/1032680" source="BUGZILLA"/>
		<reference ref_id="1054028" ref_url="https://bugzilla.suse.com/1054028" source="BUGZILLA"/>
		<reference ref_id="1056995" ref_url="https://bugzilla.suse.com/1056995" source="BUGZILLA"/>
		<reference ref_id="903543" ref_url="https://bugzilla.suse.com/903543" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes several issues.

This security issue was fixed:

- CVE-2017-11462: Prevent automatic security context deletion to prevent
  double-free (bsc#1056995)

These non-security issues were fixed:

- Set 'rdns' and 'dns_canonicalize_hostname' to false in krb5.conf
  in order to improve client security in handling service principle
  names. (bsc#1054028)
- Prevent kadmind.service startup failure caused by absence of
  LDAP service. (bsc#903543)
- Remove main package's dependency on systemd (bsc#1032680)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-09"/>
	<updated date="2017-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032680">SUSE bug 1032680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054028">SUSE bug 1054028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903543">SUSE bug 903543</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549714" comment="krb5-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549715" comment="krb5-32bit-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549716" comment="krb5-client-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549717" comment="krb5-doc-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549718" comment="krb5-plugin-kdb-ldap-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549719" comment="krb5-plugin-preauth-otp-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549720" comment="krb5-plugin-preauth-pkinit-1.12.5-40.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549721" comment="krb5-server-1.12.5-40.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79921" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1060445" ref_url="https://bugzilla.suse.com/1060445" source="BUGZILLA"/>
		<reference ref_id="1061005" ref_url="https://bugzilla.suse.com/1061005" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 52.4, mozilla-nss fixes the following issues:

This security issue was fixed for mozilla-nss:

- CVE-2017-7805: Prevent use-after-free in TLS 1.2 when generating handshake hashes (bsc#1061005)

These security issues were fixed for Firefox 

- CVE-2017-7825: Fixed some Tibetan and Arabic unicode characters rendering (bsc#1060445).
- CVE-2017-7805: Prevent Use-after-free in TLS 1.2 generating handshake hashes (bsc#1060445).
- CVE-2017-7819: Prevent Use-after-free while resizing images in design mode (bsc#1060445).
- CVE-2017-7818: Prevent Use-after-free during ARIA array manipulation (bsc#1060445).
- CVE-2017-7793: Prevent Use-after-free with Fetch API (bsc#1060445).
- CVE-2017-7824: Prevent Buffer overflow when drawing and validating elements with ANGLE (bsc#1060445).
- CVE-2017-7810: Fixed several memory safety bugs (bsc#1060445).
- CVE-2017-7823: CSP sandbox directive did not create a unique origin (bsc#1060445).
- CVE-2017-7814: Blob and data URLs bypassed phishing and malware protection warnings (bsc#1060445).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79922" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012143" ref_url="https://bugzilla.suse.com/1012143" source="BUGZILLA"/>
		<reference ref_id="1017189" ref_url="https://bugzilla.suse.com/1017189" source="BUGZILLA"/>
		<reference ref_id="1031056" ref_url="https://bugzilla.suse.com/1031056" source="BUGZILLA"/>
		<reference ref_id="1036785" ref_url="https://bugzilla.suse.com/1036785" source="BUGZILLA"/>
		<reference ref_id="1048783" ref_url="https://bugzilla.suse.com/1048783" source="BUGZILLA"/>
		<reference ref_id="1049505" ref_url="https://bugzilla.suse.com/1049505" source="BUGZILLA"/>
		<reference ref_id="1051017" ref_url="https://bugzilla.suse.com/1051017" source="BUGZILLA"/>
		<reference ref_id="1052151" ref_url="https://bugzilla.suse.com/1052151" source="BUGZILLA"/>
		<reference ref_id="1053600" ref_url="https://bugzilla.suse.com/1053600" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003287.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes several issues.

This security issue was fixed:

- bsc#1053600: Escape ssh commed line to prevent interpreting malicious
  hostname as arguments, allowing for command execution

These non-security issues were fixed:

- bsc#1049505, bsc#1051017: Security manager: Don't autogenerate seclabels of
  type 'none' when AppArmor is inactive
- bsc#1052151: Moved /usr/share/libvirt/libvirtLogo.png symlink from client to
  doc subpackage, where its target resides
- bsc#1048783: Ignore newlines in libvirt-guests.sh guest list
- bsc#1031056: Add default controllers for USB devices
- bsc#1012143: Define path to parted using autoconf cache variable. parted is
  used for management of disk-based storage pools
- bsc#1036785: Prevent output of null target in domxml-to-native
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-10"/>
	<updated date="2017-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012143">SUSE bug 1012143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017189">SUSE bug 1017189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031056">SUSE bug 1031056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036785">SUSE bug 1036785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048783">SUSE bug 1048783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049505">SUSE bug 1049505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051017">SUSE bug 1051017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052151">SUSE bug 1052151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549732" comment="libvirt-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549733" comment="libvirt-client-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549734" comment="libvirt-daemon-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549735" comment="libvirt-daemon-config-network-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549736" comment="libvirt-daemon-config-nwfilter-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549737" comment="libvirt-daemon-driver-interface-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518207" comment="libvirt-daemon-driver-libxl-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549738" comment="libvirt-daemon-driver-lxc-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549739" comment="libvirt-daemon-driver-network-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549740" comment="libvirt-daemon-driver-nodedev-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549741" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549742" comment="libvirt-daemon-driver-qemu-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549743" comment="libvirt-daemon-driver-secret-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549744" comment="libvirt-daemon-driver-storage-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549745" comment="libvirt-daemon-lxc-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549746" comment="libvirt-daemon-qemu-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518217" comment="libvirt-daemon-xen-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549747" comment="libvirt-doc-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549748" comment="libvirt-lock-sanlock-2.0.0-27.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549749" comment="libvirt-nss-2.0.0-27.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79923" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1047536" ref_url="https://bugzilla.suse.com/1047536" source="BUGZILLA"/>
		<reference ref_id="814241" ref_url="https://bugzilla.suse.com/814241" source="BUGZILLA"/>
		<reference ref_id="879138" ref_url="https://bugzilla.suse.com/879138" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003299.html" source="SUSE-SU"/>
		<description>
xerces-j2 was updated to fix several issues.

This security issue was fixed:

- bsc#814241: Prevent possible DoS through very long attribute names

This non-security issue was fixed:

- Prevent StackOverflowError when applying a pattern restriction on long strings
  while trying to validate an XML file against a schema (bsc#1047536, bsc#879138)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047536">SUSE bug 1047536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814241">SUSE bug 814241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879138">SUSE bug 879138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518232" comment="xerces-j2-2.8.1-268.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532505" comment="xerces-j2-xml-apis-2.8.1-268.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532506" comment="xerces-j2-xml-resolver-2.8.1-268.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79924" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1061041" ref_url="https://bugzilla.suse.com/1061041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00021.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

This security issue was fixed:

- CVE-2017-14867: Git used unsafe Perl scripts to support subcommands such as
  cvsserver, which allowed attackers to execute arbitrary OS commands via shell
  metacharacters in a module name (bsc#1061041).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061041">SUSE bug 1061041</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541021" comment="git-core-2.12.3-27.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532508" comment="git-doc-2.12.3-27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79925" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056061" ref_url="https://bugzilla.suse.com/1056061" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the security issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-17"/>
	<updated date="2017-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79926" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000998" ref_url="https://bugzilla.suse.com/1000998" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002610.html" source="SUSE-SU"/>
		<description>

This update for policycoreutils fixes the following issues:

* CVE-2016-7545: nonpriv session can escape to parent [bsc#1000998]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549751" comment="policycoreutils-2.5-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549752" comment="policycoreutils-python-2.5-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79927" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1060653" ref_url="https://bugzilla.suse.com/1060653" source="BUGZILLA"/>
		<reference ref_id="1061876" ref_url="https://bugzilla.suse.com/1061876" source="BUGZILLA"/>
		<reference ref_id="1063824" ref_url="https://bugzilla.suse.com/1063824" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
- CVE-2017-1000257: IMAP FETCH response out of bounds read (bsc#1063824)

Bugs fixed:

- Fixed error 'error:1408F10B:SSL routines' when connecting to ftps via proxy (bsc#1060653)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-23"/>
	<updated date="2017-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1060653">SUSE bug 1060653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549753" comment="curl-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549754" comment="libcurl4-7.37.0-37.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549755" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79928" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020905" ref_url="https://bugzilla.suse.com/1020905" source="BUGZILLA"/>
		<reference ref_id="1022053" ref_url="https://bugzilla.suse.com/1022053" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk fixes the following issues:
Oracle Critical Patch Update of January 2017 (bsc#1020905)
Upgrade to version jdk8u121 (icedtea 3.3.0):
 - S8138725: Add options for Javadoc generation
 - S8140353: Improve signature checking
 - S8151934, CVE-2017-3231: Resolve class resolution
 - S8156804, CVE-2017-3241: Better constraint checking
 - S8158406: Limited Parameter Processing
 - S8158997: JNDI Protocols Switch
 - S8159507: RuntimeVisibleAnnotation validation
 - S8161218: Better bytecode loading
 - S8161743, CVE-2017-3252: Provide proper login context
 - S8162577: Standardize logging levels
 - S8162973: Better component components
 - S8164143, CVE-2017-3260: Improve components for menu items
 - S8164147, CVE-2017-3261: Improve streaming socket output
 - S8165071, CVE-2016-2183: Expand TLS support
 - S8165344, CVE-2017-3272: Update concurrency support
 - S8166988, CVE-2017-3253: Improve image processing performance
 - S8167104, CVE-2017-3289: Additional class construction refinements
 - S8167223, CVE-2016-5552: URL handling improvements
 - S8168705, CVE-2016-5547: Better ObjectIdentifier validation
 - S8168714, CVE-2016-5546: Tighten ECDSA validation
 - S8168728, CVE-2016-5548: DSA signing improvements
 - S8168724, CVE-2016-5549: ECDSA signing improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-31"/>
	<updated date="2017-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022053">SUSE bug 1022053</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79929" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1060877" ref_url="https://bugzilla.suse.com/1060877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00071.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2017-12166: Lack of bound check in read_key in old legacy key handling before using values could be used for a remote buffer overflow (bsc#1060877).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-24"/>
	<updated date="2017-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549760" comment="openvpn-2.3.8-16.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549761" comment="openvpn-auth-pam-plugin-2.3.8-16.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79930" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005879" ref_url="https://bugzilla.suse.com/1005879" source="BUGZILLA"/>
		<reference ref_id="1018832" ref_url="https://bugzilla.suse.com/1018832" source="BUGZILLA"/>
		<reference ref_id="999646" ref_url="https://bugzilla.suse.com/999646" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- GnuTLS could have crashed when processing maliciously crafted OpenPGP
  certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,
  CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
  (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert
  packets during the handshake (bsc#1005879, CVE-2016-8610)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-01"/>
	<updated date="2017-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999646">SUSE bug 999646</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549762" comment="gnutls-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549763" comment="libgnutls-openssl27-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549764" comment="libgnutls28-3.2.15-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547668" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79931" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1047873" ref_url="https://bugzilla.suse.com/1047873" source="BUGZILLA"/>
		<reference ref_id="1057247" ref_url="https://bugzilla.suse.com/1057247" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<description>
This update for tcpdump to version 4.9.2 fixes several issues.

These security issues were fixed:

- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79932" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1062645" ref_url="https://bugzilla.suse.com/1062645" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.2.10, fixing security issues and bugs:

* CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44)
* CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42)
* CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-26"/>
	<updated date="2017-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549766" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549767" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549768" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549769" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549770" comment="wireshark-2.2.10-48.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549771" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79933" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1057358" ref_url="https://bugzilla.suse.com/1057358" source="BUGZILLA"/>
		<reference ref_id="1059777" ref_url="https://bugzilla.suse.com/1059777" source="BUGZILLA"/>
		<reference ref_id="1061076" ref_url="https://bugzilla.suse.com/1061076" source="BUGZILLA"/>
		<reference ref_id="1061077" ref_url="https://bugzilla.suse.com/1061077" source="BUGZILLA"/>
		<reference ref_id="1061080" ref_url="https://bugzilla.suse.com/1061080" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1061082" ref_url="https://bugzilla.suse.com/1061082" source="BUGZILLA"/>
		<reference ref_id="1061084" ref_url="https://bugzilla.suse.com/1061084" source="BUGZILLA"/>
		<reference ref_id="1061086" ref_url="https://bugzilla.suse.com/1061086" source="BUGZILLA"/>
		<reference ref_id="1061087" ref_url="https://bugzilla.suse.com/1061087" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588/" source="CVE"/>
		<reference ref_id="CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589/" source="CVE"/>
		<reference ref_id="CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590/" source="CVE"/>
		<reference ref_id="CVE-2017-15591" ref_url="https://www.suse.com/security/cve/CVE-2017-15591/" source="CVE"/>
		<reference ref_id="CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592/" source="CVE"/>
		<reference ref_id="CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593/" source="CVE"/>
		<reference ref_id="CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594/" source="CVE"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues:

These security issues were fixed:

- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a
  memory leakage issue allowing a privileged user inside the guest to cause a DoS
  and/or potentially crash the Qemu process on the host (bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a malicious or
  buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a malicious or
  buggy HVM guest to cause DoS or cause hypervisor memory corruption potentially
  allowing the guest to escalate its privilege (XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the Interrupt
  Descriptor Table (IDT) allowed a malicious or buggy x86 PV guest to escalate
  its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15591: Missing checks in the handling of DMOPs allowed malicious or
  buggy stub domain kernels or tool stacks otherwise living outside of Domain0 to
  cause a DoS (XSA-238 bsc#1061077)
- CVE-2017-15589: Intercepted I/O write operations with less than a full machine
  word's worth of data were not properly handled, which allowed a malicious
  unprivileged x86 HVM guest to obtain sensitive information from the host or
  other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack overflow
  might have occured that allowed a malicious or buggy PV guest to cause DoS and
  potentially privilege escalation and information leaks (XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused the
  hypervisor to miss a necessary TLB flush for a page. This allowed a malicious
  x86 PV guest to access all of system memory, allowing for privilege escalation,
  DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI interrupts
  that allowed a malicious or buggy guest to cause DoS and potentially privilege
  escalation and information leaks (XSA-237 bsc#1061076)

This non-security issue was fixed:

- bsc#1057358: Fixed boot when secure boot is enabled
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057358">SUSE bug 1057358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061077">SUSE bug 1061077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15591/">CVE-2017-15591</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79934" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1006180" ref_url="https://bugzilla.suse.com/1006180" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1013887" ref_url="https://bugzilla.suse.com/1013887" source="BUGZILLA"/>
		<reference ref_id="1019151" ref_url="https://bugzilla.suse.com/1019151" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1020657" ref_url="https://bugzilla.suse.com/1020657" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022743" ref_url="https://bugzilla.suse.com/1022743" source="BUGZILLA"/>
		<reference ref_id="1022967" ref_url="https://bugzilla.suse.com/1022967" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1024405" ref_url="https://bugzilla.suse.com/1024405" source="BUGZILLA"/>
		<reference ref_id="1028173" ref_url="https://bugzilla.suse.com/1028173" source="BUGZILLA"/>
		<reference ref_id="1028286" ref_url="https://bugzilla.suse.com/1028286" source="BUGZILLA"/>
		<reference ref_id="1029693" ref_url="https://bugzilla.suse.com/1029693" source="BUGZILLA"/>
		<reference ref_id="1030552" ref_url="https://bugzilla.suse.com/1030552" source="BUGZILLA"/>
		<reference ref_id="1030850" ref_url="https://bugzilla.suse.com/1030850" source="BUGZILLA"/>
		<reference ref_id="1031515" ref_url="https://bugzilla.suse.com/1031515" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031784" ref_url="https://bugzilla.suse.com/1031784" source="BUGZILLA"/>
		<reference ref_id="1033587" ref_url="https://bugzilla.suse.com/1033587" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1034075" ref_url="https://bugzilla.suse.com/1034075" source="BUGZILLA"/>
		<reference ref_id="1034762" ref_url="https://bugzilla.suse.com/1034762" source="BUGZILLA"/>
		<reference ref_id="1036303" ref_url="https://bugzilla.suse.com/1036303" source="BUGZILLA"/>
		<reference ref_id="1036632" ref_url="https://bugzilla.suse.com/1036632" source="BUGZILLA"/>
		<reference ref_id="1037344" ref_url="https://bugzilla.suse.com/1037344" source="BUGZILLA"/>
		<reference ref_id="1037404" ref_url="https://bugzilla.suse.com/1037404" source="BUGZILLA"/>
		<reference ref_id="1037994" ref_url="https://bugzilla.suse.com/1037994" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038583" ref_url="https://bugzilla.suse.com/1038583" source="BUGZILLA"/>
		<reference ref_id="1038616" ref_url="https://bugzilla.suse.com/1038616" source="BUGZILLA"/>
		<reference ref_id="1038792" ref_url="https://bugzilla.suse.com/1038792" source="BUGZILLA"/>
		<reference ref_id="1039915" ref_url="https://bugzilla.suse.com/1039915" source="BUGZILLA"/>
		<reference ref_id="1040307" ref_url="https://bugzilla.suse.com/1040307" source="BUGZILLA"/>
		<reference ref_id="1040351" ref_url="https://bugzilla.suse.com/1040351" source="BUGZILLA"/>
		<reference ref_id="1041958" ref_url="https://bugzilla.suse.com/1041958" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1042314" ref_url="https://bugzilla.suse.com/1042314" source="BUGZILLA"/>
		<reference ref_id="1042422" ref_url="https://bugzilla.suse.com/1042422" source="BUGZILLA"/>
		<reference ref_id="1042778" ref_url="https://bugzilla.suse.com/1042778" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1044112" ref_url="https://bugzilla.suse.com/1044112" source="BUGZILLA"/>
		<reference ref_id="1044636" ref_url="https://bugzilla.suse.com/1044636" source="BUGZILLA"/>
		<reference ref_id="1045154" ref_url="https://bugzilla.suse.com/1045154" source="BUGZILLA"/>
		<reference ref_id="1045563" ref_url="https://bugzilla.suse.com/1045563" source="BUGZILLA"/>
		<reference ref_id="1045922" ref_url="https://bugzilla.suse.com/1045922" source="BUGZILLA"/>
		<reference ref_id="1046682" ref_url="https://bugzilla.suse.com/1046682" source="BUGZILLA"/>
		<reference ref_id="1046821" ref_url="https://bugzilla.suse.com/1046821" source="BUGZILLA"/>
		<reference ref_id="1046985" ref_url="https://bugzilla.suse.com/1046985" source="BUGZILLA"/>
		<reference ref_id="1047027" ref_url="https://bugzilla.suse.com/1047027" source="BUGZILLA"/>
		<reference ref_id="1047048" ref_url="https://bugzilla.suse.com/1047048" source="BUGZILLA"/>
		<reference ref_id="1047096" ref_url="https://bugzilla.suse.com/1047096" source="BUGZILLA"/>
		<reference ref_id="1047118" ref_url="https://bugzilla.suse.com/1047118" source="BUGZILLA"/>
		<reference ref_id="1047121" ref_url="https://bugzilla.suse.com/1047121" source="BUGZILLA"/>
		<reference ref_id="1047152" ref_url="https://bugzilla.suse.com/1047152" source="BUGZILLA"/>
		<reference ref_id="1047277" ref_url="https://bugzilla.suse.com/1047277" source="BUGZILLA"/>
		<reference ref_id="1047343" ref_url="https://bugzilla.suse.com/1047343" source="BUGZILLA"/>
		<reference ref_id="1047354" ref_url="https://bugzilla.suse.com/1047354" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1047651" ref_url="https://bugzilla.suse.com/1047651" source="BUGZILLA"/>
		<reference ref_id="1047653" ref_url="https://bugzilla.suse.com/1047653" source="BUGZILLA"/>
		<reference ref_id="1047670" ref_url="https://bugzilla.suse.com/1047670" source="BUGZILLA"/>
		<reference ref_id="1048155" ref_url="https://bugzilla.suse.com/1048155" source="BUGZILLA"/>
		<reference ref_id="1048221" ref_url="https://bugzilla.suse.com/1048221" source="BUGZILLA"/>
		<reference ref_id="1048317" ref_url="https://bugzilla.suse.com/1048317" source="BUGZILLA"/>
		<reference ref_id="1048891" ref_url="https://bugzilla.suse.com/1048891" source="BUGZILLA"/>
		<reference ref_id="1048893" ref_url="https://bugzilla.suse.com/1048893" source="BUGZILLA"/>
		<reference ref_id="1048914" ref_url="https://bugzilla.suse.com/1048914" source="BUGZILLA"/>
		<reference ref_id="1048934" ref_url="https://bugzilla.suse.com/1048934" source="BUGZILLA"/>
		<reference ref_id="1049226" ref_url="https://bugzilla.suse.com/1049226" source="BUGZILLA"/>
		<reference ref_id="1049483" ref_url="https://bugzilla.suse.com/1049483" source="BUGZILLA"/>
		<reference ref_id="1049486" ref_url="https://bugzilla.suse.com/1049486" source="BUGZILLA"/>
		<reference ref_id="1049580" ref_url="https://bugzilla.suse.com/1049580" source="BUGZILLA"/>
		<reference ref_id="1049603" ref_url="https://bugzilla.suse.com/1049603" source="BUGZILLA"/>
		<reference ref_id="1049645" ref_url="https://bugzilla.suse.com/1049645" source="BUGZILLA"/>
		<reference ref_id="1049882" ref_url="https://bugzilla.suse.com/1049882" source="BUGZILLA"/>
		<reference ref_id="1050061" ref_url="https://bugzilla.suse.com/1050061" source="BUGZILLA"/>
		<reference ref_id="1050188" ref_url="https://bugzilla.suse.com/1050188" source="BUGZILLA"/>
		<reference ref_id="1051022" ref_url="https://bugzilla.suse.com/1051022" source="BUGZILLA"/>
		<reference ref_id="1051059" ref_url="https://bugzilla.suse.com/1051059" source="BUGZILLA"/>
		<reference ref_id="1051239" ref_url="https://bugzilla.suse.com/1051239" source="BUGZILLA"/>
		<reference ref_id="1051399" ref_url="https://bugzilla.suse.com/1051399" source="BUGZILLA"/>
		<reference ref_id="1051478" ref_url="https://bugzilla.suse.com/1051478" source="BUGZILLA"/>
		<reference ref_id="1051479" ref_url="https://bugzilla.suse.com/1051479" source="BUGZILLA"/>
		<reference ref_id="1051556" ref_url="https://bugzilla.suse.com/1051556" source="BUGZILLA"/>
		<reference ref_id="1051663" ref_url="https://bugzilla.suse.com/1051663" source="BUGZILLA"/>
		<reference ref_id="1051790" ref_url="https://bugzilla.suse.com/1051790" source="BUGZILLA"/>
		<reference ref_id="1052049" ref_url="https://bugzilla.suse.com/1052049" source="BUGZILLA"/>
		<reference ref_id="1052223" ref_url="https://bugzilla.suse.com/1052223" source="BUGZILLA"/>
		<reference ref_id="1052533" ref_url="https://bugzilla.suse.com/1052533" source="BUGZILLA"/>
		<reference ref_id="1052580" ref_url="https://bugzilla.suse.com/1052580" source="BUGZILLA"/>
		<reference ref_id="1052593" ref_url="https://bugzilla.suse.com/1052593" source="BUGZILLA"/>
		<reference ref_id="1052709" ref_url="https://bugzilla.suse.com/1052709" source="BUGZILLA"/>
		<reference ref_id="1052773" ref_url="https://bugzilla.suse.com/1052773" source="BUGZILLA"/>
		<reference ref_id="1052794" ref_url="https://bugzilla.suse.com/1052794" source="BUGZILLA"/>
		<reference ref_id="1052888" ref_url="https://bugzilla.suse.com/1052888" source="BUGZILLA"/>
		<reference ref_id="1053117" ref_url="https://bugzilla.suse.com/1053117" source="BUGZILLA"/>
		<reference ref_id="1053802" ref_url="https://bugzilla.suse.com/1053802" source="BUGZILLA"/>
		<reference ref_id="1053915" ref_url="https://bugzilla.suse.com/1053915" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1054084" ref_url="https://bugzilla.suse.com/1054084" source="BUGZILLA"/>
		<reference ref_id="1055013" ref_url="https://bugzilla.suse.com/1055013" source="BUGZILLA"/>
		<reference ref_id="1055096" ref_url="https://bugzilla.suse.com/1055096" source="BUGZILLA"/>
		<reference ref_id="1055359" ref_url="https://bugzilla.suse.com/1055359" source="BUGZILLA"/>
		<reference ref_id="1055493" ref_url="https://bugzilla.suse.com/1055493" source="BUGZILLA"/>
		<reference ref_id="1055755" ref_url="https://bugzilla.suse.com/1055755" source="BUGZILLA"/>
		<reference ref_id="1055896" ref_url="https://bugzilla.suse.com/1055896" source="BUGZILLA"/>
		<reference ref_id="1056261" ref_url="https://bugzilla.suse.com/1056261" source="BUGZILLA"/>
		<reference ref_id="1056588" ref_url="https://bugzilla.suse.com/1056588" source="BUGZILLA"/>
		<reference ref_id="1056827" ref_url="https://bugzilla.suse.com/1056827" source="BUGZILLA"/>
		<reference ref_id="1056982" ref_url="https://bugzilla.suse.com/1056982" source="BUGZILLA"/>
		<reference ref_id="1057015" ref_url="https://bugzilla.suse.com/1057015" source="BUGZILLA"/>
		<reference ref_id="1058038" ref_url="https://bugzilla.suse.com/1058038" source="BUGZILLA"/>
		<reference ref_id="1058116" ref_url="https://bugzilla.suse.com/1058116" source="BUGZILLA"/>
		<reference ref_id="1058410" ref_url="https://bugzilla.suse.com/1058410" source="BUGZILLA"/>
		<reference ref_id="1058507" ref_url="https://bugzilla.suse.com/1058507" source="BUGZILLA"/>
		<reference ref_id="1059051" ref_url="https://bugzilla.suse.com/1059051" source="BUGZILLA"/>
		<reference ref_id="1059465" ref_url="https://bugzilla.suse.com/1059465" source="BUGZILLA"/>
		<reference ref_id="1060197" ref_url="https://bugzilla.suse.com/1060197" source="BUGZILLA"/>
		<reference ref_id="1061017" ref_url="https://bugzilla.suse.com/1061017" source="BUGZILLA"/>
		<reference ref_id="1061046" ref_url="https://bugzilla.suse.com/1061046" source="BUGZILLA"/>
		<reference ref_id="1061064" ref_url="https://bugzilla.suse.com/1061064" source="BUGZILLA"/>
		<reference ref_id="1061067" ref_url="https://bugzilla.suse.com/1061067" source="BUGZILLA"/>
		<reference ref_id="1061172" ref_url="https://bugzilla.suse.com/1061172" source="BUGZILLA"/>
		<reference ref_id="1061831" ref_url="https://bugzilla.suse.com/1061831" source="BUGZILLA"/>
		<reference ref_id="1061872" ref_url="https://bugzilla.suse.com/1061872" source="BUGZILLA"/>
		<reference ref_id="1063667" ref_url="https://bugzilla.suse.com/1063667" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064388" ref_url="https://bugzilla.suse.com/1064388" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="974215" ref_url="https://bugzilla.suse.com/974215" source="BUGZILLA"/>
		<reference ref_id="981309" ref_url="https://bugzilla.suse.com/981309" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810/" source="CVE"/>
		<reference ref_id="CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-12134" ref_url="https://www.suse.com/security/cve/CVE-2017-12134/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.90 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering object-initialization failures (bnc#1047277).
- CVE-2017-11472: The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel did not flush the operand cache and causes a kernel stack dump, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table (bnc#1049580).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-12134: The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation (bnc#1051790 bnc#1053919).
- CVE-2017-12153: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel This function did not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel did not ensure that the 'CR8-load exiting' and 'CR8-store exiting' L0 vmcs02 controls exist in cases where L1 omits the 'use TPR shadow' vmcs12 control, which allowed KVM L2 guest OS users to obtain read and write access to the hardware CR8 register (bnc#1058507).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bnc#1063667).
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash) by leveraging root access (bnc#1056588).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel allowed local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (bnc#1056982).
- CVE-2017-14489: The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local users to cause a denial of service (panic) by leveraging incorrect length validation (bnc#1059051).
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bnc#1064388).
- CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug exception(#DB) error. It could occur while emulating a syscall instruction and potentially lead to guest privilege escalation. (bsc#1045922).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bnc#1049882).
- CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a 'double fetch' vulnerability (bnc#1037994).

The following non-security bugs were fixed:

- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: fm801: Initialize chip after IRQ handler is registered (bsc#1031717).
- alsa: hda - Add stereo mic quirk for Lenovo G50-70 (17aa:3978) (bsc#1020657).
- alsa: hda - Fix endless loop of codec configure (bsc#1031717).
- alsa: hda - Implement mic-mute LED mode enum (bsc#1055013).
- alsa: hda/realtek - Add support headphone Mic for ALC221 of HP platform (bsc#1024405).
- alsa: hda - set input_path bitmap to zero after moving it to new place (bsc#1031717).
- alsa: ice1712: Add support for STAudio ADCIII (bsc#1048934).
- alsa: usb-audio: Apply sample rate quirk to Sennheiser headset (bsc#1052580).
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: fault: Route pte translation faults via do_translation_fault (bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
- bcache: correct cache_dirty_target in __update_writeback_rate() (bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: force trigger gc (bsc#1038078).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
- blacklist 2400fd822f46 powerpc/asm: Mark cr0 as clobbered in mftb()
- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
- blacklist.conf: add unapplicable drm fixes (bsc#1031717).
- blacklist.conf: Blacklist 4e201566402c ('genirq/msi: Drop artificial PCI dependency') (bsc#1051478) This commit just removes an include and does not fix a real issue.
- blacklist.conf: Blacklist aa2369f11ff7 ('mm/gup.c: fix access_ok() argument type') (bsc#1051478) Fixes only a compile-warning.
- blacklist.conf: Blacklist c133c7615751 ('x86/nmi: Fix timeout test in test_nmi_ipi()') It only fixes a self-test (bsc#1051478).
- blacklist.conf: Blacklist c9525a3fab63 ('x86/watchdog: Fix Kconfig help text file path reference to lockup watchdog documentation') Updates only kconfig help-text (bsc#1051478).
- blacklist.conf: Blacklist e80e7edc55ba ('PCI/MSI: Initialize MSI capability for all architectures') This only fixes machines not supported by our kernels.
- blkfront: add uevent for size change (bnc#1036632).
- block: Allow bdi re-registration (bsc#1040307).
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: Fix front merge check (bsc#1051239).
- block: Make del_gendisk() safer for disks without queues (bsc#1040307).
- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
- block: Relax a check in blk_start_queue() (bnc#1012382).
- bluetooth: bnep: fix possible might sleep error in bnep_session (bsc#1031784).
- bluetooth: cmtp: fix possible might sleep error in cmtp_session (bsc#1031784).
- bluetooth: hidp: fix possible might sleep error in hidp_session_thread (bsc#1031784).
- bnxt: add a missing rcu synchronization (bnc#1038583).
- bnxt: do not busy-poll when link is down (bnc#1038583).
- bnxt_en: Enable MRU enables bit when configuring VNIC MRU (bnc#1038583).
- bnxt_en: Fix and clarify link_info-&gt;advertising (bnc#1038583).
- bnxt_en: Fix a VXLAN vs GENEVE issue (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in a failure path during open (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in reopen failure path (bnc#1038583).
- bnxt_en: fix pci cleanup in bnxt_init_one() failure path (bnc#1038583).
- bnxt_en: Fix ring arithmetic in bnxt_setup_tc() (bnc#1038583).
- bnxt_en: Fix TX push operation on ARM64 (bnc#1038583).
- bnxt_en: Fix 'uninitialized variable' bug in TPA code path (bnc#1038583).
- bnxt_en: Fix VF virtual link state (bnc#1038583).
- bnxt_en: initialize rc to zero to avoid returning garbage (bnc#1038583).
- bnxt_en: Pad TX packets below 52 bytes (bnc#1038583).
- bnxt_en: Refactor TPA code path (bnc#1038583).
- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: change how we decide to commit transactions during flushing (bsc#1060197).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: fix early ENOSPC due to delalloc (bsc#1049226).
- btrfs: fix lockup in find_free_extent with read-only block groups (bsc#1046682).
- btrfs: fix NULL pointer dereference from free_reloc_roots() (bnc#1012382).
- btrfs: incremental send, fix invalid path for link commands (bsc#1051479).
- btrfs: incremental send, fix invalid path for unlink commands (bsc#1051479).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build (bsc#1055755).
- btrfs: resume qgroup rescan on rw remount (bsc#1047152).
- btrfs: send, fix invalid path after renaming and linking file (bsc#1051479).
- ceph: fix readpage from fscache (bsc#1057015).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- class: Add 'shutdown' to 'struct class' (bsc#1053117).
- cpuidle: dt: Add missing 'of_node_put()' (bnc#1022476).
- crypto: AF_ALG - remove SGL terminator indicator when chaining (bnc#1012382).
- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).
- crypto: talitos - Do not provide setkey for non hmac hashing algs (bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
- cxgb4: Fix stack out-of-bounds read due to wrong size to t4_record_mbox() (bsc#1021424 bsc#1022743).
- cxl: Fix driver use count (bnc#1012382).
- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
- dentry name snapshots (bsc#1049483).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- dm: fix second blk_delay_queue() parameter to be in msec units not (bsc#1047670).
- drivers: hv: Fix the bug in generating the guest ID (fate#320485).
- drivers: hv: util: Fix a typo (fate#320485).
- drivers: hv: vmbus: Get the current time from the current clocksource (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- drivers: hv: vmbus: Increase the time between retries in vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
- drivers: hv: vmbus: Move the definition of generate_guest_id() (fate#320485).
- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents (fate#320485).
- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
- drivers: net: xgene: Fix wrong logical operation (bsc#1056827).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/amdgpu: Fix overflow of watermark calcs at &gt; 4k resolutions (bsc#1031717).
- drm/bochs: Implement nomodeset (bsc#1047096).
- drm/dp: Introduce MST topology state to track available link bandwidth (bsc#1055493).
- drm/i915/fbdev: Stop repeating tile configuration on stagnation (bsc#1031717).
- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
- drm/vmwgfx: Fix large topology crash (bsc#1048155).
- drm/vmwgfx: Limit max desktop dimensions to 8Kx8K (bsc#1048155).
- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix incorrect quotaoff if the quota feature is enabled (bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts (bnc#1012382).
- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors (bsc#1012829).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
- gcov: add support for gcc version &gt;= 6 (bsc#1051663).
- gcov: support GCC 7.1 (bsc#1051663).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Do not clear SGID when inheriting ACLs (bsc#1012829).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gfs2: fix flock panic issue (bsc#1012829).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch (bnc#1022967).
- hrtimer: Catch invalid clockids again (bsc#1047651).
- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- hv_util: switch to using timespec64 (fate#320485).
- i2c: designware-baytrail: fix potential null pointer dereference on dev (bsc#1011913).
- i40e: add hw struct local variable (bsc#1039915).
- i40e: add private flag to control source pruning (bsc#1034075).
- i40e: add VSI info to macaddr messages (bsc#1039915).
- i40e: avoid looping to check whether we're in VLAN mode (bsc#1039915).
- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
- i40e: delete filter after adding its replacement when converting (bsc#1039915).
- i40e: do not add broadcast filter for VFs (bsc#1039915).
- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID&lt;1 (bsc#1039915).
- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter (bsc#1039915).
- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast filter (bsc#1039915).
- i40e: factor out addition/deletion of VLAN per each MAC address (bsc#1039915).
- i40e: fix MAC filters when removing VLANs (bsc#1039915).
- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan (bsc#1039915).
- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).
- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).
- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters (bsc#1039915).
- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: no need to check is_vsi_in_vlan before calling i40e_del_mac_all_vlan (bsc#1039915).
- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters (bsc#1039915).
- i40e: recalculate vsi-&gt;active_filters from hash contents (bsc#1039915).
- i40e: refactor i40e_put_mac_in_vlan to avoid changing f-&gt;vlan (bsc#1039915).
- i40e: refactor i40e_update_filter_state to avoid passing aq_err (bsc#1039915).
- i40e: refactor Rx filter handling (bsc#1039915).
- i40e: Removal of workaround for simple MAC address filter deletion (bsc#1039915).
- i40e: remove code to handle dev_addr specially (bsc#1039915).
- i40e: removed unreachable code (bsc#1039915).
- i40e: remove duplicate add/delete adminq command code for filters (bsc#1039915).
- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid (bsc#1039915).
- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: restore workaround for removing default MAC filter (bsc#1039915).
- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
- i40e: store MAC/VLAN filters in a hash with the MAC Address as key (bsc#1039915).
- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID (bsc#1039915).
- i40e: when adding or removing MAC filters, correctly handle VLANs (bsc#1039915).
- i40e: When searching all MAC/VLAN filters, ignore removed filters (bsc#1039915).
- i40e: write HENA for VFs (bsc#1039915).
- ib/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
- ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709).
- ibmvnic: Clean up resources on probe failure (fate#323285, bsc#1058116).
- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value (bsc#1031717).
- input: gpio-keys - fix check for disabling unsupported keys (bsc#1031717).
- input: i8042 - add Gigabyte P57 to the keyboard reset table (bnc#1012382).
- introduce the walk_process_tree() helper (bnc#1022476).
- iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (bsc#1041958).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt() (bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction (bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (bsc#1041958).
- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not send CTDP commands via debugfs if not supported (bsc#1031717).
- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353, FATE#323335).
- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353, FATE#323335).
- iwlwifi: pcie: fix command completion name debug (bsc#1031717).
- kABI-fix for 'x86/panic: replace smp_send_stop() with kdump friendly version in panic path' (bsc#1051478).
- kABI: protect enum pid_type (kabi).
- kABI: protect lwtunnel include in ip6_route.h (kabi).
- kABI: protect struct iscsi_np (kabi).
- kABI: protect struct iscsi_tpg_attrib (kabi).
- kABI: protect struct se_lun (kabi).
- kABI: protect struct tpm_chip (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kabi/severities: ignore nfs_pgio_data_destroy
- kABI: uninline task_tgid_nr_nr (kabi).
- kernel/*: switch to memdup_user_nul() (bsc#1048893).
- keys: fix writing past end of user-supplied buffer in keyring_read() (bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: async_pf: Fix #DF due to inject 'Page not Present' and 'Page Ready' exceptions simultaneously (bsc#1061017).
- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC (bsc#1051478).
- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce() (bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt (bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
- lib: test_rhashtable: fix for large entry counts (bsc#1055359).
- lib: test_rhashtable: Fix KASAN warning (bsc#1055359).
- lightnvm: remove unused rq parameter of nvme_nvm_rqtocmd() to kill warning (FATE#319466).
- mac80211: flush hw_roc_start work before cancelling the ROC (bnc#1012382).
- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md: fix sleep in atomic (bsc#1040351).
- md/raid5: fix a race condition in stripe batch (linux-stable).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list (bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls (bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of both infinite inputs (bnc#1012382).
- mips: math-emu: &lt;MAXA|MINA&gt;.&lt;D|S&gt;: Fix cases of input values with opposite signs (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix cases of both inputs zero (bnc#1012382).
- mips: math-emu: &lt;MAX|MAXA|MIN|MINA&gt;.&lt;D|S&gt;: Fix quiet NaN propagation (bnc#1012382).
- mips: math-emu: &lt;MAX|MIN&gt;.&lt;D|S&gt;: Fix cases of both inputs negative (bnc#1012382).
- mips: math-emu: MINA.&lt;D|S&gt;: Fix some cases of infinity and zero inputs (bnc#1012382).
- mm: adaptive hash table scaling (bnc#1036303).
- mm: call page_ext_init() after all struct pages are initialized (VM Debugging Functionality, bsc#1047048).
- mm: drop HASH_ADAPT (bnc#1036303).
- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality, bsc#1042314).
- mm, madvise: ensure poisoned pages are removed from per-cpu lists (VM hw poison -- git fixes).
- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
- mm/page_alloc.c: apply gfp_allowed_mask before the first allocation attempt (bnc#971975 VM -- git fixes).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- mptsas: Fixup device hotplug for VMWare ESXi (bsc#1030850).
- mwifiex: do not update MCS set from hostapd (bsc#1031717).
- net: account for current skb length when deciding about UFO (bsc#1041958).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails (bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors (bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: change return value for unsupported features unsupported return value (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close interface (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command (bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address (bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- netfilter: fix IS_ERR_VALUE usage (bsc#1052888).
- netfilter: x_tables: pack percpu counter allocations (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct instead of packet counter (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct to counter allocator (bsc#1052888).
- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() (bsc#1042286).
- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
- new helper: memdup_user_nul() (bsc#1048893).
- nfs: Cache aggressively when file is open for writing (bsc#1033587).
- nfsd: Fix general protection fault in release_lock_stateid() (bnc#1012382).
- nfs: Do not flush caches for a getattr that races with writeback (bsc#1033587).
- nfs: flush data when locking a file to ensure cache coherence for mmap (bsc#981309).
- nfs: invalidate file size when taking a lock (git-fixes).
- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
- of: fix '/cpus' reference leak in of_numa_parse_cpu_nodes() (bsc#1056827).
- ovl: fix dentry leak for default_permissions (bsc#1054084).
- pci: Add Mellanox device IDs (bsc#1051478).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: Convert Mellanox broken INTx quirks to be for listed devices only (bsc#1051478).
- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN (bsc#1051478).
- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq() (bsc#1051478).
- pci: Enable ECRC only if device supports it (bsc#1051478).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci / pm: Fix native PME handling during system suspend/resume (bsc#1051478).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+ (bsc#1051478).
- percpu_ref: allow operation mode switching operations to be called concurrently (bsc#1055096).
- percpu_ref: remove unnecessary RCU grace period for staggered atomic switching confirmation (bsc#1055096).
- percpu_ref: reorganize __percpu_ref_switch_to_atomic() and relocate percpu_ref_switch_to_atomic() (bsc#1055096).
- percpu_ref: restructure operation mode switching (bsc#1055096).
- percpu_ref: unify staggered atomic switching wait behavior (bsc#1055096).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct tracking' (bsc#1061831).
- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill dmi list (bsc#1051022).
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list (bsc#1051022).
- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill (bsc#1051022).
- pm / Hibernate: Fix scheduling while atomic during hibernation (bsc#1051059).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node() (bnc#1012382).
- prctl: propagate has_child_subreaper flag to every descendant (bnc#1022476).
- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- Revert 'ACPI / video: Add force_native quirk for HP Pavilion dv6' (bsc#1031717).
- Revert 'net: fix percpu memory leaks' (bnc#1012382).
- Revert 'net: phy: Correctly process PHY_HALTED in phy_stop_machine()' (bnc#1012382).
- Revert 'net: use lib/percpu_counter API for fragmentation mem accounting' (bnc#1012382).
- Revert 'powerpc/numa: Fix percpu allocations to be NUMA aware' (bsc#1048914).
- Revert 'tpm: Issue a TPM2_Shutdown for TPM2 devices.' (kabi).
- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id This needs rpm-4.14+ (bsc#964063).
- rtnetlink: fix rtnl_vfinfo_size (bsc#1056261).
- s390: export symbols for crash-kmp (bsc#1053915).
- sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (bnc#1022476).
- sched/debug: Print the scheduler topology group mask (bnc#1022476).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all cfs_rqs (bnc#1022476).
- sched/topology: Add sched_group_capacity debugging (bnc#1022476).
- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
- sched/topology: Move comment about asymmetric node setups (bnc#1022476).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Small cleanup (bnc#1022476).
- sched/topology: Verify the first group matches the child domain (bnc#1022476).
- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi_devinfo: fixup string compare (bsc#1037404).
- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
- scsi: ILLEGAL REQUEST + ASC==27 =&amp;gt; target failure (bsc#1059465).
- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic (bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485, bnc#1044636).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path (bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records (bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled (bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout late response (bnc#1012382).
- scsi: zfcp: trace high part of 'new' 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter() (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell (bnc#1012382).
- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- smb: Validate negotiate (to protect against downgrade) even if signing off (bnc#1012382).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- supported.conf: clear mistaken external support flag for cifs.ko (bsc#1053802).
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
- sysctl: fix lax sysctl_check_table() sanity check (bsc#1048893).
- sysctl: fold sysctl_writes_strict checks into helper (bsc#1048893).
- sysctl: kdoc'ify sysctl_writes_strict (bsc#1048893).
- sysctl: simplify unsigned int support (bsc#1048893).
- timers: Plug locking race vs. timer migration (bnc#1022476).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1 (bnc#1012382).
- tpm: fix: return rc when devm_add_action() fails (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 8e0ee3c9faed).
- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
- tpm: KABI fix (bsc#1053117).
- tpm: read burstcount from TPM_STS in one 32-bit transaction (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes 27084efee0c3).
- tpm_tis_core: Choose appropriate timeout for reading burstcount (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tpm_tis_core: convert max timeouts from msec to jiffies (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes aec04cbdf723).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- tty: serial: msm: Support more bauds (git-fixes).
- ubifs: Correctly evict xattr inodes (bsc#1012829).
- ubifs: Do not leak kernel memory to the MTD (bsc#1012829).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
- udf: Fix races with i_size changes during readpage (bsc#1012829).
- usb: core: fix device node leak (bsc#1047487).
- vfs: fix missing inode_get_dev sites (bsc#1052049).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets (bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps (bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- x86/LDT: Print the real LDT base address (bsc#1051478).
- x86/mce: Make timer handling more robust (bsc#1042422).
- x86/panic: replace smp_send_stop() with kdump friendly version in panic path (bsc#1051478).
- xen: allocate page for shared info page from low memory (bnc#1038616).
- xen/balloon: do not online new memory initially (bnc#1028173).
- xen: hold lock_device_hotplug throughout vcpu hotplug operations (bsc#1042422).
- xen-netfront: Rework the fix for Rx stall during OOM and network stress (git-fixes).
- xen/pvh*: Support &amp;gt; 32 VCPUs at domain restore (bnc#1045563).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs/dmapi: fix incorrect file-&amp;gt;f_path.dentry-&amp;gt;d_inode usage (bsc#1055896).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- xfs: fix inobt inode allocation search optimization (bsc#1012829).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-10-27"/>
	<updated date="2017-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006180">SUSE bug 1006180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013887">SUSE bug 1013887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019151">SUSE bug 1019151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020657">SUSE bug 1020657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022743">SUSE bug 1022743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022967">SUSE bug 1022967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024405">SUSE bug 1024405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028173">SUSE bug 1028173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028286">SUSE bug 1028286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029693">SUSE bug 1029693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030552">SUSE bug 1030552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030850">SUSE bug 1030850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031515">SUSE bug 1031515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031784">SUSE bug 1031784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033587">SUSE bug 1033587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034075">SUSE bug 1034075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034762">SUSE bug 1034762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036303">SUSE bug 1036303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036632">SUSE bug 1036632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037344">SUSE bug 1037344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037404">SUSE bug 1037404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038583">SUSE bug 1038583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038616">SUSE bug 1038616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038792">SUSE bug 1038792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039915">SUSE bug 1039915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040307">SUSE bug 1040307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040351">SUSE bug 1040351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041958">SUSE bug 1041958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042314">SUSE bug 1042314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042422">SUSE bug 1042422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042778">SUSE bug 1042778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044112">SUSE bug 1044112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044636">SUSE bug 1044636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045154">SUSE bug 1045154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045563">SUSE bug 1045563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046682">SUSE bug 1046682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046821">SUSE bug 1046821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046985">SUSE bug 1046985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047027">SUSE bug 1047027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047048">SUSE bug 1047048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047096">SUSE bug 1047096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047118">SUSE bug 1047118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047121">SUSE bug 1047121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047152">SUSE bug 1047152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047343">SUSE bug 1047343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047354">SUSE bug 1047354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047651">SUSE bug 1047651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047653">SUSE bug 1047653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047670">SUSE bug 1047670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048155">SUSE bug 1048155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048221">SUSE bug 1048221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048317">SUSE bug 1048317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048891">SUSE bug 1048891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048893">SUSE bug 1048893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048914">SUSE bug 1048914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048934">SUSE bug 1048934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049226">SUSE bug 1049226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049486">SUSE bug 1049486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050061">SUSE bug 1050061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050188">SUSE bug 1050188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051022">SUSE bug 1051022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051059">SUSE bug 1051059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051239">SUSE bug 1051239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051399">SUSE bug 1051399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051478">SUSE bug 1051478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051479">SUSE bug 1051479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051556">SUSE bug 1051556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051663">SUSE bug 1051663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051790">SUSE bug 1051790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052049">SUSE bug 1052049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052223">SUSE bug 1052223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052533">SUSE bug 1052533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052580">SUSE bug 1052580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052593">SUSE bug 1052593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052709">SUSE bug 1052709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052773">SUSE bug 1052773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052794">SUSE bug 1052794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052888">SUSE bug 1052888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053117">SUSE bug 1053117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053802">SUSE bug 1053802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053915">SUSE bug 1053915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054084">SUSE bug 1054084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055013">SUSE bug 1055013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055096">SUSE bug 1055096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055359">SUSE bug 1055359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055493">SUSE bug 1055493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055755">SUSE bug 1055755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055896">SUSE bug 1055896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056261">SUSE bug 1056261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056827">SUSE bug 1056827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057015">SUSE bug 1057015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058116">SUSE bug 1058116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059465">SUSE bug 1059465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060197">SUSE bug 1060197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061017">SUSE bug 1061017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061046">SUSE bug 1061046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061064">SUSE bug 1061064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061067">SUSE bug 1061067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061172">SUSE bug 1061172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061831">SUSE bug 1061831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061872">SUSE bug 1061872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974215">SUSE bug 974215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981309">SUSE bug 981309</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12134/">CVE-2017-12134</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79935" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1064715" ref_url="https://bugzilla.suse.com/1064715" source="BUGZILLA"/>
		<reference ref_id="1064716" ref_url="https://bugzilla.suse.com/1064716" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<description>


This update for wget fixes the following security issues:

- CVE-2017-13089,CVE-2017-13090: Missing checks for negative remaining_chunk_size in skip_short_body and fd_read_body could
  cause stack buffer overflows, which could have been exploited by malicious servers. (bsc#1064715,bsc#1064716)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-16"/>
	<updated date="2017-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549780" comment="wget-1.14-21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79936" version="1" class="patch">
	<metadata>
		<title>Security update for SuSEfirewall2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1064127" ref_url="https://bugzilla.suse.com/1064127" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003373.html" source="SUSE-SU"/>
		<description>
This update for SuSEfirewall2 fixes the following issues:

- CVE-2017-15638: Fixed a security issue with too open implicit portmapper rules
  (bsc#1064127): A source net restriction for _rpc_ services
  was not taken into account for the implicitly added rules for port 111,
  making the portmap service accessible to everyone in the affected zone.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518256" comment="SuSEfirewall2-3.6.312-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79937" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1045460" ref_url="https://bugzilla.suse.com/1045460" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.18.0 fixes the following issues:

These security issues were fixed:

- CVE-2017-7039: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7018: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7030: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7037: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7034: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7055: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7056: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7064: An issue was fixed that allowed remote attackers to bypass
  intended memory-read restrictions via a crafted app (bsc#1050469).
- CVE-2017-7061: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7048: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1050469).
- CVE-2017-7046: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1050469).
- CVE-2017-2538: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1045460)
- CVE-2017-2496: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2539: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site.
- CVE-2017-2510: An issue was fixed that allowed remote attackers to conduct
  Universal XSS (UXSS) attacks via a crafted web site that improperly
  interacts with pageshow events.
- CVE-2017-2365: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2366: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2373: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2363: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2362: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2350: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web site
  (bsc#1024749)
- CVE-2017-2354: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749).
- CVE-2017-2355: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (uninitialized memory
  access and application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2356: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2017-2371: An issue was fixed that allowed remote attackers to launch
  popups via a crafted web site (bsc#1024749)
- CVE-2017-2364: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site (bsc#1024749)
- CVE-2017-2369: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1024749)
- CVE-2016-7656: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7635: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7654: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7639: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7645: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7652: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7641: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7632: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7599: An issue was fixed that allowed remote attackers to bypass the
  Same Origin Policy and obtain sensitive information via a crafted web
  site that used HTTP redirects (bsc#1020950)
- CVE-2016-7592: An issue was fixed that allowed remote attackers to obtain
  sensitive information via crafted JavaScript prompts on a web site (bsc#1020950)
- CVE-2016-7589: An issue was fixed that allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and
  application crash) via a crafted web site (bsc#1020950)
- CVE-2016-7623: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a blob URL on a web site (bsc#1020950)
- CVE-2016-7586: An issue was fixed that allowed remote attackers to obtain
  sensitive information via a crafted web site (bsc#1020950)

For other non-security fixes please check the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045460">SUSE bug 1045460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549781" comment="libjavascriptcoregtk-4_0-18-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549782" comment="libwebkit2gtk-4_0-37-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549783" comment="typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549784" comment="typelib-1_0-WebKit2-4_0-2.18.0-2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549785" comment="webkit2gtk-4_0-injected-bundles-2.18.0-2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79938" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1043176" ref_url="https://bugzilla.suse.com/1043176" source="BUGZILLA"/>
		<reference ref_id="1043808" ref_url="https://bugzilla.suse.com/1043808" source="BUGZILLA"/>
		<reference ref_id="1046636" ref_url="https://bugzilla.suse.com/1046636" source="BUGZILLA"/>
		<reference ref_id="1047674" ref_url="https://bugzilla.suse.com/1047674" source="BUGZILLA"/>
		<reference ref_id="1048902" ref_url="https://bugzilla.suse.com/1048902" source="BUGZILLA"/>
		<reference ref_id="1049381" ref_url="https://bugzilla.suse.com/1049381" source="BUGZILLA"/>
		<reference ref_id="1054724" ref_url="https://bugzilla.suse.com/1054724" source="BUGZILLA"/>
		<reference ref_id="1056334" ref_url="https://bugzilla.suse.com/1056334" source="BUGZILLA"/>
		<reference ref_id="1057378" ref_url="https://bugzilla.suse.com/1057378" source="BUGZILLA"/>
		<reference ref_id="1057585" ref_url="https://bugzilla.suse.com/1057585" source="BUGZILLA"/>
		<reference ref_id="1057966" ref_url="https://bugzilla.suse.com/1057966" source="BUGZILLA"/>
		<reference ref_id="1059369" ref_url="https://bugzilla.suse.com/1059369" source="BUGZILLA"/>
		<reference ref_id="1062069" ref_url="https://bugzilla.suse.com/1062069" source="BUGZILLA"/>
		<reference ref_id="1062942" ref_url="https://bugzilla.suse.com/1062942" source="BUGZILLA"/>
		<reference ref_id="1063122" ref_url="https://bugzilla.suse.com/1063122" source="BUGZILLA"/>
		<reference ref_id="997358" ref_url="https://bugzilla.suse.com/997358" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-15268: Qemu allowed remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c (bsc#1062942).
- CVE-2017-9524: The qemu-nbd server when built with the Network Block Device (NBD) Server support allowed remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs talking to a client in the nbd_negotiate function (bsc#1043808).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063122)
- CVE-2017-15038: Race condition in the v9fs_xattrwalk function local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes (bsc#1062069)
- CVE-2017-10911: The make_response function in the Linux kernel allowed guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures (bsc#1057378)
- CVE-2017-12809: The IDE disk and CD/DVD-ROM Emulator support allowed local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive (bsc#1054724)
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046636)
- CVE-2017-10806: Stack-based buffer overflow allowed local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages (bsc#1047674)
- CVE-2017-14167: Integer overflow in the load_multiboot function allowed local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write (bsc#1057585)
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049381)
- CVE-2017-11334: The address_space_write_continue function allowed local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area (bsc#1048902)
- CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update (bsc#1056334)

These non-security issues were fixed:

- Fixed not being able to build from rpm sources due to undefined macro (bsc#1057966)
- Fixed wrong permissions for kvm_stat.1 file
- Fixed KVM lun resize not working as expected on SLES12 SP2 HV (bsc#1043176)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043176">SUSE bug 1043176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043808">SUSE bug 1043808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054724">SUSE bug 1054724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057966">SUSE bug 1057966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059369">SUSE bug 1059369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997358">SUSE bug 997358</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79939" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1039567" ref_url="https://bugzilla.suse.com/1039567" source="BUGZILLA"/>
		<reference ref_id="1055123" ref_url="https://bugzilla.suse.com/1055123" source="BUGZILLA"/>
		<reference ref_id="1061832" ref_url="https://bugzilla.suse.com/1061832" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

Security issues fixed:

- CVE-2017-12173: Fixed unsanitized input when searching in local cache database (bsc#1061832).

Non security issues fixed:

- Fixed a segfault issue in ldap_rfc_2307_fallback_to_local_users. (bsc#1055123)
- Install /var/lib/sss/mc directory to correct sssd cache invalidation behaviour. (bsc#1039567)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-06"/>
	<updated date="2017-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039567">SUSE bug 1039567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055123">SUSE bug 1055123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549796" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549797" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549798" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549799" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549800" comment="sssd-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549801" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549802" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549803" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549804" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549805" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549806" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549807" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549808" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79940" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1065274" ref_url="https://bugzilla.suse.com/1065274" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00011.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issues fixed:

- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549809" comment="krb5-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549810" comment="krb5-32bit-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549811" comment="krb5-client-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549812" comment="krb5-doc-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549813" comment="krb5-plugin-kdb-ldap-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549814" comment="krb5-plugin-preauth-otp-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549815" comment="krb5-plugin-preauth-pkinit-1.12.5-40.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549816" comment="krb5-server-1.12.5-40.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79941" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049379" ref_url="https://bugzilla.suse.com/1049379" source="BUGZILLA"/>
		<reference ref_id="1050135" ref_url="https://bugzilla.suse.com/1050135" source="BUGZILLA"/>
		<reference ref_id="1052249" ref_url="https://bugzilla.suse.com/1052249" source="BUGZILLA"/>
		<reference ref_id="1052253" ref_url="https://bugzilla.suse.com/1052253" source="BUGZILLA"/>
		<reference ref_id="1052545" ref_url="https://bugzilla.suse.com/1052545" source="BUGZILLA"/>
		<reference ref_id="1054924" ref_url="https://bugzilla.suse.com/1054924" source="BUGZILLA"/>
		<reference ref_id="1055219" ref_url="https://bugzilla.suse.com/1055219" source="BUGZILLA"/>
		<reference ref_id="1055430" ref_url="https://bugzilla.suse.com/1055430" source="BUGZILLA"/>
		<reference ref_id="1061873" ref_url="https://bugzilla.suse.com/1061873" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530/" source="CVE"/>
		<reference ref_id="CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446/" source="CVE"/>
		<reference ref_id="CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534/" source="CVE"/>
		<reference ref_id="CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428/" source="CVE"/>
		<reference ref_id="CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431/" source="CVE"/>
		<reference ref_id="CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433/" source="CVE"/>
		<reference ref_id="CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133/" source="CVE"/>
		<reference ref_id="CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139/" source="CVE"/>
		<reference ref_id="CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

Security issues fixed:

* CVE-2017-15033: A denial of service attack (memory leak) was fixed in ReadYUVImage in coders/yuv.c [bsc#1061873]
* CVE-2017-11446: An infinite loop in ReadPESImage was fixed. (bsc#1049379)
* CVE-2017-12433: A memory leak in ReadPESImage in coders/pes.c was fixed. (bsc#1052545)
* CVE-2017-12428: A memory leak in ReadWMFImage in coders/wmf.c was fixed. (bsc#1052249)
* CVE-2017-12431: A use-after-free in ReadWMFImage was fixed. (bsc#1052253)
* CVE-2017-11534: A memory leak in the lite_font_map() in coders/wmf.c was fixed. (bsc#1050135)
* CVE-2017-13133: A memory exhaustion in load_level function in coders/xcf.c was fixed. (bsc#1055219)
* CVE-2017-13139: A out-of-bounds read in the ReadOneMNGImage was fixed. (bsc#1055430)

This update also reverts an incorrect fix for CVE-2016-7530 [bsc#1054924].
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049379">SUSE bug 1049379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052545">SUSE bug 1052545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79942" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1023895" ref_url="https://bugzilla.suse.com/1023895" source="BUGZILLA"/>
		<reference ref_id="1052261" ref_url="https://bugzilla.suse.com/1052261" source="BUGZILLA"/>
		<reference ref_id="980486" ref_url="https://bugzilla.suse.com/980486" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003379.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes several issues.

This security issue was fixed:

- CVE-2017-12424: The newusers tool could have been forced to manipulate
  internal data structures in ways unintended by the authors. Malformed input may
  have lead to crashes (with a buffer overflow or other memory corruption) or
  other unspecified behaviors (bsc#1052261).

These non-security issues were fixed:

- bsc#1023895: Fixed man page to not contain invalid options and also prevent
  warnings when using these options in certain settings
- bsc#980486: Reset user in /var/log/tallylog because of the usage of pam_tally2
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023895">SUSE bug 1023895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052261">SUSE bug 1052261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980486">SUSE bug 980486</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549819" comment="shadow-4.2.1-27.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79943" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1059066" ref_url="https://bugzilla.suse.com/1059066" source="BUGZILLA"/>
		<reference ref_id="1059101" ref_url="https://bugzilla.suse.com/1059101" source="BUGZILLA"/>
		<reference ref_id="1059155" ref_url="https://bugzilla.suse.com/1059155" source="BUGZILLA"/>
		<reference ref_id="1061265" ref_url="https://bugzilla.suse.com/1061265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520/" source="CVE"/>
		<reference ref_id="CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

This security issue was fixed:

- CVE-2017-14517: Prevent NULL Pointer dereference in the XRef::parseEntry()
  function via a crafted PDF document (bsc#1059066).
- CVE-2017-14518: Remedy a floating point exception in
  isImageInterpolationRequired() that could have been exploited using a
  specially crafted PDF document. (bsc#1059101)
- CVE-2017-14520: Remedy a floating point exception in
  Splash::scaleImageYuXd() that could have been exploited using a specially
  crafted PDF document. (bsc#1059155)
- CVE-2017-14977: Fixed a NULL pointer dereference vulnerability in the
  FoFiTrueType::getCFFBlock() function in FoFiTrueType.cc that occurred
  due to lack of validation of a table pointer, which allows an attacker
  to launch a denial of service attack. (bsc#1061265)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-08"/>
	<updated date="2017-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059066">SUSE bug 1059066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059101">SUSE bug 1059101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059155">SUSE bug 1059155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541472" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79944" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042419" ref_url="https://bugzilla.suse.com/1042419" source="BUGZILLA"/>
		<reference ref_id="1058565" ref_url="https://bugzilla.suse.com/1058565" source="BUGZILLA"/>
		<reference ref_id="1058622" ref_url="https://bugzilla.suse.com/1058622" source="BUGZILLA"/>
		<reference ref_id="1058624" ref_url="https://bugzilla.suse.com/1058624" source="BUGZILLA"/>
		<reference ref_id="1064016" ref_url="https://bugzilla.suse.com/1064016" source="BUGZILLA"/>
		<reference ref_id="1065892" ref_url="https://bugzilla.suse.com/1065892" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<description>

This update for samba fixes several issues.

These security issues were fixed:

- CVE-2017-12163: Prevent client short SMB1 write from writing server memory to
  file, leaking information from the server to the client (bsc#1058624).
- CVE-2017-12150: Always enforce smb signing when it is configured (bsc#1058622).
- CVE-2017-12151: Keep required encryption across SMB3 dfs redirects (bsc#1058565).

This non-security issue was fixed:

- Fix error where short name length was read as 2 bytes, should be 1 (bsc#1042419)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042419">SUSE bug 1042419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064016">SUSE bug 1064016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065892">SUSE bug 1065892</bugzilla>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549820" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79945" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1032647" ref_url="https://bugzilla.suse.com/1032647" source="BUGZILLA"/>
		<reference ref_id="1052009" ref_url="https://bugzilla.suse.com/1052009" source="BUGZILLA"/>
		<reference ref_id="1064069" ref_url="https://bugzilla.suse.com/1064069" source="BUGZILLA"/>
		<reference ref_id="1064070" ref_url="https://bugzilla.suse.com/1064070" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u151 (icedtea 3.6.0)

Security issues fixed:

- CVE-2017-10274: Handle smartcard clean up better (bsc#1064071)
- CVE-2017-10281: Better queuing priorities (bsc#1064072)
- CVE-2017-10285: Unreferenced references (bsc#1064073)
- CVE-2017-10295: Better URL connections (bsc#1064075)
- CVE-2017-10388: Correct Kerberos ticket grants (bsc#1064086)
- CVE-2017-10346: Better invokespecial checks (bsc#1064078)
- CVE-2017-10350: Better Base Exceptions (bsc#1064082)
- CVE-2017-10347: Better timezone processing (bsc#1064079)
- CVE-2017-10349: Better X processing (bsc#1064081)
- CVE-2017-10345: Better keystore handling (bsc#1064077)
- CVE-2017-10348: Better processing of unresolved permissions (bsc#1064080)
- CVE-2017-10357: Process Proxy presentation (bsc#1064085)
- CVE-2017-10355: More stable connection processing (bsc#1064083)
- CVE-2017-10356: Update storage implementations (bsc#1064084)
- CVE-2016-10165: Improve CMS header processing (bsc#1064069)
- CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library (bsc#1064070)

Bug fixes:

- Fix bsc#1032647, bsc#1052009 with btrfs subvolumes and overlayfs
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-10"/>
	<updated date="2017-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1032647">SUSE bug 1032647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052009">SUSE bug 1052009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79946" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020108" ref_url="https://bugzilla.suse.com/1020108" source="BUGZILLA"/>
		<reference ref_id="963448" ref_url="https://bugzilla.suse.com/963448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002615.html" source="SUSE-SU"/>
		<description>

This update for cpio fixes two issues.

This security issue was fixed:

- CVE-2016-2037: The cpio_safer_name_suffix function in util.c in cpio allowed remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file (bsc#963448).

This non-security issue was fixed:

- bsc#1020108: Always use 32 bit CRC to prevent checksum errors for files greater than 32MB
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-02"/>
	<updated date="2017-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020108">SUSE bug 1020108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549825" comment="cpio-2.11-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517073" comment="cpio-lang-2.11-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79947" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005179" ref_url="https://bugzilla.suse.com/1005179" source="BUGZILLA"/>
		<reference ref_id="1007216" ref_url="https://bugzilla.suse.com/1007216" source="BUGZILLA"/>
		<reference ref_id="1008501" ref_url="https://bugzilla.suse.com/1008501" source="BUGZILLA"/>
		<reference ref_id="1008894" ref_url="https://bugzilla.suse.com/1008894" source="BUGZILLA"/>
		<reference ref_id="1014338" ref_url="https://bugzilla.suse.com/1014338" source="BUGZILLA"/>
		<reference ref_id="977940" ref_url="https://bugzilla.suse.com/977940" source="BUGZILLA"/>
		<reference ref_id="982141" ref_url="https://bugzilla.suse.com/982141" source="BUGZILLA"/>
		<reference ref_id="985232" ref_url="https://bugzilla.suse.com/985232" source="BUGZILLA"/>
		<reference ref_id="987144" ref_url="https://bugzilla.suse.com/987144" source="BUGZILLA"/>
		<reference ref_id="990438" ref_url="https://bugzilla.suse.com/990438" source="BUGZILLA"/>
		<reference ref_id="999688" ref_url="https://bugzilla.suse.com/999688" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5009" ref_url="https://www.suse.com/security/cve/CVE-2016-5009/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002616.html" source="SUSE-SU"/>
		<description>

This update for ceph fixes the following issues:

* CVE-2016-5009: moncommand with empty prefix could crash monitor [bsc#987144]
* Invalid commandd in SOC7 with ceph [bsc#1008894]
* Performance fix was missing in SES4 [bsc#1005179]
* ceph build problems on ppc64le [bsc#982141]
* ceph make build unit test failure [bsc#977940]
* ceph-deploy mon create-initial fails on one node [bsc#999688]
* MDS dies while running xfstests  [bsc#985232]
* Typerror while calling _recover_auth_meta() [bsc#1008501]
* OSD daemon uses ~100% CPU load right after OSD creation / first OSD start [bsc#1014338]
* civetweb HTTPS support not working [bsc#990438]
* systemd is killing off OSDs [bsc#1007216]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005179">SUSE bug 1005179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007216">SUSE bug 1007216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008501">SUSE bug 1008501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008894">SUSE bug 1008894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014338">SUSE bug 1014338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977940">SUSE bug 977940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982141">SUSE bug 982141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985232">SUSE bug 985232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987144">SUSE bug 987144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990438">SUSE bug 990438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999688">SUSE bug 999688</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5009/">CVE-2016-5009</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549826" comment="ceph-common-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549827" comment="libcephfs1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549828" comment="librados2-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549829" comment="libradosstriper1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549830" comment="librbd1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549831" comment="python-cephfs-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549832" comment="python-rados-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549833" comment="python-rbd-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79948" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1019016" ref_url="https://bugzilla.suse.com/1019016" source="BUGZILLA"/>
		<reference ref_id="1042910" ref_url="https://bugzilla.suse.com/1042910" source="BUGZILLA"/>
		<reference ref_id="1053352" ref_url="https://bugzilla.suse.com/1053352" source="BUGZILLA"/>
		<reference ref_id="1059554" ref_url="https://bugzilla.suse.com/1059554" source="BUGZILLA"/>
		<reference ref_id="977410" ref_url="https://bugzilla.suse.com/977410" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2017-7674" ref_url="https://www.suse.com/security/cve/CVE-2017-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00029.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2017-5664: A problem in handling error pages was fixed, to avoid potential file overwrites during error page handling. (bsc#1042910).
- CVE-2017-7674: A CORS Filter issue could lead to client and server side cache poisoning (bsc#1053352)
- CVE-2017-12617: A remote code execution possibility via JSP Upload was fixed (bsc#1059554)


Non security bugs fixed:

- Fix tomcat-digest classpath error (bsc#977410) 
- Fix packaged /etc/alternatives symlinks for api libs that caused
  rpm -V to report link mismatch (bsc#1019016)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019016">SUSE bug 1019016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053352">SUSE bug 1053352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977410">SUSE bug 977410</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7674/">CVE-2017-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532585" comment="tomcat-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532586" comment="tomcat-admin-webapps-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532587" comment="tomcat-docs-webapp-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532588" comment="tomcat-el-3_0-api-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532589" comment="tomcat-javadoc-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532590" comment="tomcat-jsp-2_3-api-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532591" comment="tomcat-lib-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532592" comment="tomcat-servlet-3_1-api-8.0.43-29.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532593" comment="tomcat-webapps-8.0.43-29.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79949" version="1" class="patch">
	<metadata>
		<title>Security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009966" ref_url="https://bugzilla.suse.com/1009966" source="BUGZILLA"/>
		<reference ref_id="1063269" ref_url="https://bugzilla.suse.com/1063269" source="BUGZILLA"/>
		<reference ref_id="910252" ref_url="https://bugzilla.suse.com/910252" source="BUGZILLA"/>
		<reference ref_id="910253" ref_url="https://bugzilla.suse.com/910253" source="BUGZILLA"/>
		<reference ref_id="913650" ref_url="https://bugzilla.suse.com/913650" source="BUGZILLA"/>
		<reference ref_id="913651" ref_url="https://bugzilla.suse.com/913651" source="BUGZILLA"/>
		<reference ref_id="917152" ref_url="https://bugzilla.suse.com/917152" source="BUGZILLA"/>
		<reference ref_id="996511" ref_url="https://bugzilla.suse.com/996511" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620/" source="CVE"/>
		<reference ref_id="CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621/" source="CVE"/>
		<reference ref_id="CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<description>


The GNU file utility was updated to version 5.22.

Security issues fixed:

- CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650)
- CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651)
- CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152)
- CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253)
- CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253)

Version update to file version 5.22

* add indirect relative for TIFF/Exif
* restructure elf note printing to avoid repeated messages
* add note limit, suggested by Alexander Cherepanov
* Bail out on partial pread()'s (Alexander Cherepanov)
* Fix incorrect bounds check in file_printable (Alexander Cherepanov)
* PR/405: ignore SIGPIPE from uncompress programs
* change printable -&gt; file_printable and use it in more places for safety
* in ELF, instead of '(uses dynamic libraries)' when PT_INTERP is present print the interpreter name.

Version update to file version 5.21

* there was an incorrect free in magic_load_buffers()
* there was an out of bounds read for some pascal strings
* there was a memory leak in magic lists
* don't interpret strings printed from files using the current
  locale, convert them to ascii format first.
* there was an out of bounds read in elf note reads

Update to file version 5.20

* recognize encrypted CDF documents
* add magic_load_buffers from Brooks Davis
* add thumbs.db support

Additional non-security bug fixes:

* Fixed a memory corruption during rpmbuild (bsc#1063269)
* Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511)
* file command throws 'Composite Document File V2 Document, corrupt: Can't read SSAT' error against excel 97/2003 file format. (bsc#1009966)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009966">SUSE bug 1009966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063269">SUSE bug 1063269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996511">SUSE bug 996511</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79950" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1022727" ref_url="https://bugzilla.suse.com/1022727" source="BUGZILLA"/>
		<reference ref_id="1051150" ref_url="https://bugzilla.suse.com/1051150" source="BUGZILLA"/>
		<reference ref_id="1052984" ref_url="https://bugzilla.suse.com/1052984" source="BUGZILLA"/>
		<reference ref_id="1061107" ref_url="https://bugzilla.suse.com/1061107" source="BUGZILLA"/>
		<reference ref_id="1063034" ref_url="https://bugzilla.suse.com/1063034" source="BUGZILLA"/>
		<reference ref_id="1063035" ref_url="https://bugzilla.suse.com/1063035" source="BUGZILLA"/>
		<reference ref_id="1063037" ref_url="https://bugzilla.suse.com/1063037" source="BUGZILLA"/>
		<reference ref_id="1063038" ref_url="https://bugzilla.suse.com/1063038" source="BUGZILLA"/>
		<reference ref_id="1063039" ref_url="https://bugzilla.suse.com/1063039" source="BUGZILLA"/>
		<reference ref_id="1063040" ref_url="https://bugzilla.suse.com/1063040" source="BUGZILLA"/>
		<reference ref_id="1063041" ref_url="https://bugzilla.suse.com/1063041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177/" source="CVE"/>
		<reference ref_id="CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178/" source="CVE"/>
		<reference ref_id="CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179/" source="CVE"/>
		<reference ref_id="CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180/" source="CVE"/>
		<reference ref_id="CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181/" source="CVE"/>
		<reference ref_id="CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182/" source="CVE"/>
		<reference ref_id="CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183/" source="CVE"/>
		<reference ref_id="CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184/" source="CVE"/>
		<reference ref_id="CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185/" source="CVE"/>
		<reference ref_id="CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<description>


This update for xorg-x11-server fixes several issues.

These security issues were fixed:

- CVE-2017-13721: Missing validation of shmseg resource id in Xext/XShm
  could lead to shared memory segments of other users beeing freed
  (bnc#1052984)
- CVE-2017-13723: A local denial of service via unusual characters in XkbAtomText and XkbStringText was fixed (bnc#1051150)
- CVE-2017-12184,CVE-2017-12185,CVE-2017-12186,CVE-2017-12187: Fixed
  unvalidated lengths in multiple extensions (bsc#1063034)
- CVE-2017-12183: Fixed some unvalidated lengths in the XFIXES
  extension. (bsc#1063035)
- CVE-2017-12180,CVE-2017-12181,CVE-2017-12182: Fixed various unvalidated
  lengths in the XFree86-VidMode/XFree86-DGA/XFree86-DRI extensions
  (bsc#1063037)
- CVE-2017-12179: Fixed an integer overflow and unvalidated length in
  (S)ProcXIBarrierReleasePointer in Xi (bsc#1063038)
- CVE-2017-12178: Fixed a wrong extra length check in
  ProcXIChangeHierarchy in Xi (bsc#1063039)
- CVE-2017-12177: Fixed an unvalidated variable-length request in
  ProcDbeGetVisualInfo (bsc#1063040)
- CVE-2017-12176: Fixed an unvalidated extra length in
  ProcEstablishConnection (bsc#1063041)


These non-security issues were fixed:

- Make colormap/gamma glue code work with the RandR extension disabled. This prevents it
  from crashing and showing wrong colors. (bsc#1061107)
- Recognize ssh as a remote client to fix launching applications remotely when using DRI3.
  (bsc#1022727)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-22"/>
	<updated date="2017-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022727">SUSE bug 1022727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061107">SUSE bug 1061107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79951" version="1" class="patch">
	<metadata>
		<title>Recommended update for tboot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1057555" ref_url="https://bugzilla.suse.com/1057555" source="BUGZILLA"/>
		<reference ref_id="1068390" ref_url="https://bugzilla.suse.com/1068390" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16837" ref_url="https://www.suse.com/security/cve/CVE-2017-16837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003415.html" source="SUSE-SU"/>
		<description>
This update for tboot fixes the following issues:

Security issue fixed:

- CVE-2017-16837: Certain function pointers in Trusted Boot (tboot) through 1.9.6 are
  notvalidated and can cause arbitrary code execution, which allows local users
  tooverwrite dynamic PCRs of Trusted Platform Module (TPM) by h (bsc#1068390)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon 'Purley 8s' processors. The
  following error message showed: 'TBOOT: wait-for-sipi loop timed-out'. Booting continued
  but 'TXT measured launch' was wrongly reported as FALSE. (bsc#1057555)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057555">SUSE bug 1057555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068390">SUSE bug 1068390</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16837/">CVE-2017-16837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549840" comment="tboot-20160518_1.9.4-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79952" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027593" ref_url="https://bugzilla.suse.com/1027593" source="BUGZILLA"/>
		<reference ref_id="1060427" ref_url="https://bugzilla.suse.com/1060427" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00038.html" source="SUSE-SU"/>
		<description>


This update for samba fixes the following issues:

Security issues fixed:

- CVE-2017-14746: Fixed a use-after-free vulnerability that could be used to crash smbd or potentially execute code (bsc#1060427).
- CVE-2017-15275: Fixed a server heap memory information leak (bsc#1063008).

Non-security issues fixed:

- Update 'winbind expand groups' doc in smb.conf man page;
  (bsc#1027593).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027593">SUSE bug 1027593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549841" comment="libdcerpc-atsvc0-4.2.4-28.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79953" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1047178" ref_url="https://bugzilla.suse.com/1047178" source="BUGZILLA"/>
		<reference ref_id="1057721" ref_url="https://bugzilla.suse.com/1057721" source="BUGZILLA"/>
		<reference ref_id="1057724" ref_url="https://bugzilla.suse.com/1057724" source="BUGZILLA"/>
		<reference ref_id="999735" ref_url="https://bugzilla.suse.com/999735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:
- CVE-2017-12837: Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service
  (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive
  modifier. (bnc#1057724)
- CVE-2017-12883: Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before
  5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information
  or cause a denial of service (application crash) via a crafted regular expression with an invalid
  '\N{U+...}' escape. (bnc#1057721)
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the File-Path module
  before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving
  directory-permission loosening logic. (bnc#1047178)

Bug fixes:
- backport set_capture_string changes from upstream (bsc#999735)
- reformat baselibs.conf as source validator workaround
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-24"/>
	<updated date="2017-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999735">SUSE bug 999735</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549842" comment="perl-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549843" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549844" comment="perl-base-5.18.2-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79954" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1066295" ref_url="https://bugzilla.suse.com/1066295" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel WiFi firmwares for the 3160, 7260 and 7265 adapters.

Security issues fixed are part of the 'KRACK' attacks affecting the firmware:

- CVE-2017-13080: The reinstallation of the Group Temporal key could be used for replay attacks (bsc#1066295):
- CVE-2017-13081: The reinstallation of the Integrity Group Temporal key could be used for replay attacks (bsc#1066295):
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79955" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027593" ref_url="https://bugzilla.suse.com/1027593" source="BUGZILLA"/>
		<reference ref_id="1060427" ref_url="https://bugzilla.suse.com/1060427" source="BUGZILLA"/>
		<reference ref_id="1063008" ref_url="https://bugzilla.suse.com/1063008" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00041.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issues fixed:

- CVE-2017-14746: Use-after-free vulnerability (bsc#1060427).
- CVE-2017-15275: Server heap memory information leak (bsc#1063008).

Bug fixes:

- Update 'winbind expand groups' doc in smb.conf man page (bsc#1027593).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-27"/>
	<updated date="2017-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027593">SUSE bug 1027593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549845" comment="libdcerpc-binding0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549846" comment="libdcerpc-binding0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549847" comment="libdcerpc0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549848" comment="libdcerpc0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549849" comment="libndr-krb5pac0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549850" comment="libndr-krb5pac0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549851" comment="libndr-nbt0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549852" comment="libndr-nbt0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549853" comment="libndr-standard0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549854" comment="libndr-standard0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549855" comment="libndr0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549856" comment="libndr0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549857" comment="libnetapi0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549858" comment="libnetapi0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549859" comment="libsamba-credentials0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549860" comment="libsamba-credentials0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549861" comment="libsamba-errors0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549862" comment="libsamba-errors0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549863" comment="libsamba-hostconfig0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549864" comment="libsamba-hostconfig0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549865" comment="libsamba-passdb0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549866" comment="libsamba-passdb0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549867" comment="libsamba-util0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549868" comment="libsamba-util0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549869" comment="libsamdb0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549870" comment="libsamdb0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549871" comment="libsmbclient0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549872" comment="libsmbclient0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549873" comment="libsmbconf0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549874" comment="libsmbconf0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549875" comment="libsmbldap0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549876" comment="libsmbldap0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549877" comment="libtevent-util0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549878" comment="libtevent-util0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549879" comment="libwbclient0-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549880" comment="libwbclient0-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549881" comment="samba-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549882" comment="samba-client-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549883" comment="samba-client-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518364" comment="samba-doc-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549884" comment="samba-libs-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549885" comment="samba-libs-32bit-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549886" comment="samba-winbind-4.4.2-38.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549887" comment="samba-winbind-32bit-4.4.2-38.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79956" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005544" ref_url="https://bugzilla.suse.com/1005544" source="BUGZILLA"/>
		<reference ref_id="1010675" ref_url="https://bugzilla.suse.com/1010675" source="BUGZILLA"/>
		<reference ref_id="1013930" ref_url="https://bugzilla.suse.com/1013930" source="BUGZILLA"/>
		<reference ref_id="1014873" ref_url="https://bugzilla.suse.com/1014873" source="BUGZILLA"/>
		<reference ref_id="1017497" ref_url="https://bugzilla.suse.com/1017497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318/" source="CVE"/>
		<reference ref_id="CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

* CVE-2016-4658: use-after-free error could lead to crash [bsc#1005544]
* Fix NULL dereference in xpointer.c when in recovery mode [bsc#1014873]
* CVE-2016-9597: An XML document with many opening tags could have caused a overflow of the stack not detected by the recursion limits, allowing for DoS (bsc#1017497).

For CVE-2016-9318 we decided not to ship a fix since it can break existing setups. Please take appropriate actions if you parse untrusted XML files
and use the new -noxxe flag if possible (bnc#1010675, bnc#1013930).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-03"/>
	<updated date="2017-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013930">SUSE bug 1013930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549888" comment="libxml2-2-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549889" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532625" comment="libxml2-doc-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549890" comment="libxml2-tools-2.9.4-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549891" comment="python-libxml2-2.9.4-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79957" version="1" class="patch">
	<metadata>
		<title>Security update for guile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1004221" ref_url="https://bugzilla.suse.com/1004221" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002624.html" source="SUSE-SU"/>
		<description>

This update for guile fixes the following issues:

- CVE-2016-8605: Fixed thread-unsafe umask modification (bsc#1004221).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549892" comment="guile-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549893" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549894" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79958" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1055825" ref_url="https://bugzilla.suse.com/1055825" source="BUGZILLA"/>
		<reference ref_id="1056058" ref_url="https://bugzilla.suse.com/1056058" source="BUGZILLA"/>
		<reference ref_id="1065363" ref_url="https://bugzilla.suse.com/1065363" source="BUGZILLA"/>
		<reference ref_id="1066242" ref_url="https://bugzilla.suse.com/1066242" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2017-3735: openssl1,openssl: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- CVE-2017-3736: openssl: bn_sqrx8x_internal carry bug on x86_64 (bsc#1066242)
- Out of bounds read+crash in DES_fcrypt (bsc#1065363)
- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055825">SUSE bug 1055825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065363">SUSE bug 1065363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541071" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549895" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549896" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549897" comment="libopenssl1_0_0-hmac-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549898" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549899" comment="openssl-1.0.2j-60.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532635" comment="openssl-doc-1.0.2j-60.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79959" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1003846" ref_url="https://bugzilla.suse.com/1003846" source="BUGZILLA"/>
		<reference ref_id="1025282" ref_url="https://bugzilla.suse.com/1025282" source="BUGZILLA"/>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1029995" ref_url="https://bugzilla.suse.com/1029995" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030583" ref_url="https://bugzilla.suse.com/1030583" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1033122" ref_url="https://bugzilla.suse.com/1033122" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037062" ref_url="https://bugzilla.suse.com/1037062" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037070" ref_url="https://bugzilla.suse.com/1037070" source="BUGZILLA"/>
		<reference ref_id="1037072" ref_url="https://bugzilla.suse.com/1037072" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1038874" ref_url="https://bugzilla.suse.com/1038874" source="BUGZILLA"/>
		<reference ref_id="1038875" ref_url="https://bugzilla.suse.com/1038875" source="BUGZILLA"/>
		<reference ref_id="1038876" ref_url="https://bugzilla.suse.com/1038876" source="BUGZILLA"/>
		<reference ref_id="1038877" ref_url="https://bugzilla.suse.com/1038877" source="BUGZILLA"/>
		<reference ref_id="1038878" ref_url="https://bugzilla.suse.com/1038878" source="BUGZILLA"/>
		<reference ref_id="1038880" ref_url="https://bugzilla.suse.com/1038880" source="BUGZILLA"/>
		<reference ref_id="1038881" ref_url="https://bugzilla.suse.com/1038881" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1046094" ref_url="https://bugzilla.suse.com/1046094" source="BUGZILLA"/>
		<reference ref_id="1052061" ref_url="https://bugzilla.suse.com/1052061" source="BUGZILLA"/>
		<reference ref_id="1052496" ref_url="https://bugzilla.suse.com/1052496" source="BUGZILLA"/>
		<reference ref_id="1052503" ref_url="https://bugzilla.suse.com/1052503" source="BUGZILLA"/>
		<reference ref_id="1052507" ref_url="https://bugzilla.suse.com/1052507" source="BUGZILLA"/>
		<reference ref_id="1052509" ref_url="https://bugzilla.suse.com/1052509" source="BUGZILLA"/>
		<reference ref_id="1052511" ref_url="https://bugzilla.suse.com/1052511" source="BUGZILLA"/>
		<reference ref_id="1052514" ref_url="https://bugzilla.suse.com/1052514" source="BUGZILLA"/>
		<reference ref_id="1052518" ref_url="https://bugzilla.suse.com/1052518" source="BUGZILLA"/>
		<reference ref_id="1053347" ref_url="https://bugzilla.suse.com/1053347" source="BUGZILLA"/>
		<reference ref_id="1056312" ref_url="https://bugzilla.suse.com/1056312" source="BUGZILLA"/>
		<reference ref_id="1056437" ref_url="https://bugzilla.suse.com/1056437" source="BUGZILLA"/>
		<reference ref_id="1057139" ref_url="https://bugzilla.suse.com/1057139" source="BUGZILLA"/>
		<reference ref_id="1057144" ref_url="https://bugzilla.suse.com/1057144" source="BUGZILLA"/>
		<reference ref_id="1057149" ref_url="https://bugzilla.suse.com/1057149" source="BUGZILLA"/>
		<reference ref_id="1058480" ref_url="https://bugzilla.suse.com/1058480" source="BUGZILLA"/>
		<reference ref_id="1059050" ref_url="https://bugzilla.suse.com/1059050" source="BUGZILLA"/>
		<reference ref_id="1060599" ref_url="https://bugzilla.suse.com/1060599" source="BUGZILLA"/>
		<reference ref_id="1060621" ref_url="https://bugzilla.suse.com/1060621" source="BUGZILLA"/>
		<reference ref_id="1061241" ref_url="https://bugzilla.suse.com/1061241" source="BUGZILLA"/>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="445037" ref_url="https://bugzilla.suse.com/445037" source="BUGZILLA"/>
		<reference ref_id="546106" ref_url="https://bugzilla.suse.com/546106" source="BUGZILLA"/>
		<reference ref_id="561142" ref_url="https://bugzilla.suse.com/561142" source="BUGZILLA"/>
		<reference ref_id="578249" ref_url="https://bugzilla.suse.com/578249" source="BUGZILLA"/>
		<reference ref_id="590820" ref_url="https://bugzilla.suse.com/590820" source="BUGZILLA"/>
		<reference ref_id="691290" ref_url="https://bugzilla.suse.com/691290" source="BUGZILLA"/>
		<reference ref_id="698346" ref_url="https://bugzilla.suse.com/698346" source="BUGZILLA"/>
		<reference ref_id="713504" ref_url="https://bugzilla.suse.com/713504" source="BUGZILLA"/>
		<reference ref_id="776968" ref_url="https://bugzilla.suse.com/776968" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="938658" ref_url="https://bugzilla.suse.com/938658" source="BUGZILLA"/>
		<reference ref_id="970239" ref_url="https://bugzilla.suse.com/970239" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7227" ref_url="https://www.suse.com/security/cve/CVE-2017-7227/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-7614" ref_url="https://www.suse.com/security/cve/CVE-2017-7614/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8395" ref_url="https://www.suse.com/security/cve/CVE-2017-8395/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8397" ref_url="https://www.suse.com/security/cve/CVE-2017-8397/" source="CVE"/>
		<reference ref_id="CVE-2017-8398" ref_url="https://www.suse.com/security/cve/CVE-2017-8398/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9038" ref_url="https://www.suse.com/security/cve/CVE-2017-9038/" source="CVE"/>
		<reference ref_id="CVE-2017-9039" ref_url="https://www.suse.com/security/cve/CVE-2017-9039/" source="CVE"/>
		<reference ref_id="CVE-2017-9040" ref_url="https://www.suse.com/security/cve/CVE-2017-9040/" source="CVE"/>
		<reference ref_id="CVE-2017-9041" ref_url="https://www.suse.com/security/cve/CVE-2017-9041/" source="CVE"/>
		<reference ref_id="CVE-2017-9042" ref_url="https://www.suse.com/security/cve/CVE-2017-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-9043" ref_url="https://www.suse.com/security/cve/CVE-2017-9043/" source="CVE"/>
		<reference ref_id="CVE-2017-9044" ref_url="https://www.suse.com/security/cve/CVE-2017-9044/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2017-9954" ref_url="https://www.suse.com/security/cve/CVE-2017-9954/" source="CVE"/>
		<reference ref_id="CVE-2017-9955" ref_url="https://www.suse.com/security/cve/CVE-2017-9955/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<description>


GNU binutil was updated to the 2.29.1 release, bringing various new features, fixing a lot of bugs and security issues.

Following security issues are being addressed by this release:

  * 18750 bsc#1030296 CVE-2014-9939
  * 20891 bsc#1030585 CVE-2017-7225
  * 20892 bsc#1030588 CVE-2017-7224
  * 20898 bsc#1030589 CVE-2017-7223
  * 20905 bsc#1030584 CVE-2017-7226
  * 20908 bsc#1031644 CVE-2017-7299
  * 20909 bsc#1031656 CVE-2017-7300
  * 20921 bsc#1031595 CVE-2017-7302
  * 20922 bsc#1031593 CVE-2017-7303
  * 20924 bsc#1031638 CVE-2017-7301
  * 20931 bsc#1031590 CVE-2017-7304
  * 21135 bsc#1030298 CVE-2017-7209 
  * 21137 bsc#1029909 CVE-2017-6965
  * 21139 bsc#1029908 CVE-2017-6966
  * 21156 bsc#1029907 CVE-2017-6969
  * 21157 bsc#1030297 CVE-2017-7210
  * 21409 bsc#1037052 CVE-2017-8392
  * 21412 bsc#1037057 CVE-2017-8393
  * 21414 bsc#1037061 CVE-2017-8394
  * 21432 bsc#1037066 CVE-2017-8396
  * 21440 bsc#1037273 CVE-2017-8421
  * 21580 bsc#1044891 CVE-2017-9746
  * 21581 bsc#1044897 CVE-2017-9747
  * 21582 bsc#1044901 CVE-2017-9748
  * 21587 bsc#1044909 CVE-2017-9750
  * 21594 bsc#1044925 CVE-2017-9755
  * 21595 bsc#1044927 CVE-2017-9756
  * 21787 bsc#1052518 CVE-2017-12448
  * 21813 bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450, bsc#1052503, CVE-2017-12456, bsc#1052507, CVE-2017-12454, bsc#1052509, CVE-2017-12453, bsc#1052511, CVE-2017-12452, bsc#1052514, CVE-2017-12450
  * 21933 bsc#1053347 CVE-2017-12799
  * 21990 bsc#1058480 CVE-2017-14333
  * 22018 bsc#1056312 CVE-2017-13757
  * 22047 bsc#1057144 CVE-2017-14129
  * 22058 bsc#1057149 CVE-2017-14130
  * 22059 bsc#1057139 CVE-2017-14128
  * 22113 bsc#1059050 CVE-2017-14529
  * 22148 bsc#1060599 CVE-2017-14745
  * 22163 bsc#1061241 CVE-2017-14974
  * 22170 bsc#1060621 CVE-2017-14729

Update to binutils 2.29. [fate#321454, fate#321494, fate#323293]:

  * The MIPS port now supports microMIPS eXtended Physical Addressing (XPA)
    instructions for assembly and disassembly.
  * The MIPS port now supports the microMIPS Release 5 ISA for assembly and
    disassembly.
  * The MIPS port now supports the Imagination interAptiv MR2 processor,
    which implements the MIPS32r3 ISA, the MIPS16e2 ASE as well as a couple
    of implementation-specific regular MIPS and MIPS16e2 ASE instructions.
  * The SPARC port now supports the SPARC M8 processor, which implements the
    Oracle SPARC Architecture 2017.
  * The MIPS port now supports the MIPS16e2 ASE for assembly and disassembly.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for the wasm32 ELF conversion of the WebAssembly file format.
  * Add --inlines option to objdump, which extends the --line-numbers option
    so that inlined functions will display their nesting information.
  * Add --merge-notes options to objcopy to reduce the size of notes in
    a binary file by merging and deleting redundant notes.
  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.

- GAS specific:

  * Add support for ELF SHF_GNU_MBIND.
  * Add support for the WebAssembly file format and wasm32 ELF conversion.
  * PowerPC gas now checks that the correct register class is used in
    instructions.  For instance, 'addi %f4,%cr3,%r31' warns three times
    that the registers are invalid.
  * Add support for the Texas Instruments PRU processor.
  * Support for the ARMv8-R architecture and Cortex-R52 processor has been
    added to the ARM port.

- GNU ld specific:

  * Support for -z shstk in the x86 ELF linker to generate
    GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program properties.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_SHSTK in ELF GNU program
    properties in the x86 ELF linker.
  * Add support for GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties in the x86 ELF linker.
  * Support for -z ibtplt in the x86 ELF linker to generate IBT-enabled
    PLT.
  * Support for -z ibt in the x86 ELF linker to generate IBT-enabled
    PLT as well as GNU_PROPERTY_X86_FEATURE_1_IBT in ELF GNU program
    properties.
  * Add support for ELF SHF_GNU_MBIND and PT_GNU_MBIND_XXX.
  * Add support for ELF GNU program properties.
  * Add support for the Texas Instruments PRU processor.
  * When configuring for arc*-*-linux* targets the default linker emulation will
    change if --with-cpu=nps400 is used at configure time.
  * Improve assignment of LMAs to orphan sections in some edge cases where a
    mixture of both AT&gt;LMA_REGION and AT(LMA) are used.
  * Orphan sections placed after an empty section that has an AT(LMA) will now
    take an load memory address starting from LMA.
  * Section groups can now be resolved (the group deleted and the group members
    placed like normal sections) at partial link time either using the new
    linker option --force-group-allocation or by placing FORCE_GROUP_ALLOCATION
    into the linker script.

- Add riscv64 target, tested with gcc7 and downstream newlib 2.4.0
- Prepare riscv32 target (gh#riscv/riscv-newlib#8)
- Make compressed debug section handling explicit, disable for
  old products and enable for gas on all architectures otherwise. [bsc#1029995]
- Remove empty rpath component removal optimization from to workaround
  CMake rpath handling.  [bsc#1025282]


  Minor security bugs fixed:
  PR 21147, PR 21148, PR 21149, PR 21150, PR 21151, PR 21155, PR 21158, PR 21159

- Update to binutils 2.28.

  * Add support for locating separate debug info files using the build-id
    method, where the separate file has a name based upon the build-id of
    the original file.
  * This version of binutils fixes a problem with PowerPC VLE 16A and 16D
    relocations which were functionally swapped, for example,
    R_PPC_VLE_HA16A performed like R_PPC_VLE_HA16D while R_PPC_VLE_HA16D
    performed like R_PPC_VLE_HA16A.  This could have been fixed by
    renumbering relocations, which would keep object files created by an
    older version of gas compatible with a newer ld.  However, that would
    require an ABI update, affecting other assemblers and linkers that
    create and process the relocations correctly.  It is recommended that
    all VLE object files be recompiled, but ld can modify the relocations
    if --vle-reloc-fixup is passed to ld.  If the new ld command line
    option is not used, ld will ld warn on finding relocations inconsistent
    with the instructions being relocated.
  * The nm program has a new command line option (--with-version-strings)
    which will display a symbol's version information, if any, after the
    symbol's name.
  * The ARC port of objdump now accepts a -M option to specify the extra
    instruction class(es) that should be disassembled.
  * The --remove-section option for objcopy and strip now accepts section
    patterns starting with an exclamation point to indicate a non-matching
    section.  A non-matching section is removed from the set of sections
    matched by an earlier --remove-section pattern.
  * The --only-section option for objcopy now accepts section patterns
    starting with an exclamation point to indicate a non-matching section.
    A non-matching section is removed from the set of sections matched by
    an earlier --only-section pattern.
  * New --remove-relocations=SECTIONPATTERN option for objcopy and strip.
    This option can be used to remove sections containing relocations.
    The SECTIONPATTERN is the section to which the relocations apply, not
    the relocation section itself.

- GAS specific:

  * Add support for the RISC-V architecture.
  * Add support for the ARM Cortex-M23 and Cortex-M33 processors.

- GNU ld specific:

  * The EXCLUDE_FILE linker script construct can now be applied outside of the
    section list in order for the exclusions to apply over all input sections
    in the list.
  * Add support for the RISC-V architecture.
  * The command line option --no-eh-frame-hdr can now be used in ELF based
    linkers to disable the automatic generation of .eh_frame_hdr sections.
  * Add --in-implib=&lt;infile&gt; to the ARM linker to enable specifying a set of
    Secure Gateway veneers that must exist in the output import library
    specified by --out-implib=&lt;outfile&gt; and the address they must have.
    As such, --in-implib is only supported in combination with --cmse-implib.
  * Extended the --out-implib=&lt;file&gt; option, previously restricted to x86 PE
    targets, to any ELF based target.  This allows the generation of an import
    library for an ELF executable, which can then be used by another application
    to link against the executable.

- GOLD specific:

  * Add -z bndplt option (x86-64 only) to support Intel MPX.
  * Add --orphan-handling option.
  * Add --stub-group-multi option (PowerPC only).
  * Add --target1-rel, --target1-abs, --target2 options (Arm only).
  * Add -z stack-size option.
  * Add --be8 option (Arm only).
  * Add HIDDEN support in linker scripts.
  * Add SORT_BY_INIT_PRIORITY support in linker scripts.

- Other fixes:

  * Fix section alignment on .gnu_debuglink. [bso#21193]
  * Add s390x to gold_archs.
  * Fix alignment frags for aarch64 (bsc#1003846)
  * Call ldconfig for libbfd
  * Fix an assembler problem with clang on ARM.
  * Restore monotonically increasing section offsets.


- Update to binutils 2.27.

  * Add a configure option, --enable-64-bit-archive, to force use of a
    64-bit format when creating an archive symbol index.
  * Add --elf-stt-common= option to objcopy for ELF targets to control
    whether to convert common symbols to the STT_COMMON type.

- GAS specific:

  * Default to --enable-compressed-debug-sections=gas for Linux/x86 targets.
  * Add --no-pad-sections to stop the assembler from padding the end of output
    sections up to their alignment boundary.
  * Support for the ARMv8-M architecture has been added to the ARM port.
    Support for the ARMv8-M Security and DSP Extensions has also been added
    to the ARM port.
  * ARC backend accepts .extInstruction, .extCondCode, .extAuxRegister, and
    .extCoreRegister pseudo-ops that allow an user to define custom
    instructions, conditional codes, auxiliary and core registers.
  * Add a configure option --enable-elf-stt-common to decide whether ELF
    assembler should generate common symbols with the STT_COMMON type by
    default.  Default to no.
  * New command line option --elf-stt-common= for ELF targets to control
    whether to generate common symbols with the STT_COMMON type.
  * Add ability to set section flags and types via numeric values for ELF
    based targets.
  * Add a configure option --enable-x86-relax-relocations to decide whether
    x86 assembler should generate relax relocations by default.  Default to
    yes, except for x86 Solaris targets older than Solaris 12.
  * New command line option -mrelax-relocations= for x86 target to control
    whether to generate relax relocations.
  * New command line option -mfence-as-lock-add=yes for x86 target to encode
    lfence, mfence and sfence as 'lock addl $0x0, (%[re]sp)'.
  * Add assembly-time relaxation option for ARC cpus.
  * Add --with-cpu=TYPE configure option for ARC gas.  This allows the default
    cpu type to be adjusted at configure time.

- GOLD specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled by default.  Default to yes.
  * Add support for s390, MIPS, AArch64, and TILE-Gx architectures.
  * Add support for STT_GNU_IFUNC symbols.
  * Add support for incremental linking (--incremental).

- GNU ld specific:

  * Add a configure option --enable-relro to decide whether -z relro should
    be enabled in ELF linker by default.  Default to yes for all Linux
    targets except FRV, HPPA, IA64 and MIPS.
  * Support for -z noreloc-overflow in the x86-64 ELF linker to disable
    relocation overflow check.
  * Add -z common/-z nocommon options for ELF targets to control whether to
    convert common symbols to the STT_COMMON type during a relocatable link.
  * Support for -z nodynamic-undefined-weak in the x86 ELF linker, which
    avoids dynamic relocations against undefined weak symbols in executable.
  * The NOCROSSREFSTO command was added to the linker script language.
  * Add --no-apply-dynamic-relocs to the AArch64 linker to do not apply
    link-time values for dynamic relocations.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-11-30"/>
	<updated date="2017-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003846">SUSE bug 1003846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025282">SUSE bug 1025282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029995">SUSE bug 1029995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030583">SUSE bug 1030583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033122">SUSE bug 1033122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037062">SUSE bug 1037062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037070">SUSE bug 1037070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037072">SUSE bug 1037072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038875">SUSE bug 1038875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038876">SUSE bug 1038876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038878">SUSE bug 1038878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038880">SUSE bug 1038880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038881">SUSE bug 1038881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046094">SUSE bug 1046094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052061">SUSE bug 1052061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052496">SUSE bug 1052496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052503">SUSE bug 1052503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052507">SUSE bug 1052507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052509">SUSE bug 1052509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052511">SUSE bug 1052511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052514">SUSE bug 1052514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052518">SUSE bug 1052518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053347">SUSE bug 1053347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056312">SUSE bug 1056312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056437">SUSE bug 1056437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057139">SUSE bug 1057139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057144">SUSE bug 1057144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057149">SUSE bug 1057149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058480">SUSE bug 1058480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060599">SUSE bug 1060599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060621">SUSE bug 1060621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061241">SUSE bug 1061241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/445037">SUSE bug 445037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546106">SUSE bug 546106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561142">SUSE bug 561142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578249">SUSE bug 578249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590820">SUSE bug 590820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691290">SUSE bug 691290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698346">SUSE bug 698346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713504">SUSE bug 713504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776968">SUSE bug 776968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938658">SUSE bug 938658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970239">SUSE bug 970239</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7227/">CVE-2017-7227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7614/">CVE-2017-7614</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8395/">CVE-2017-8395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8397/">CVE-2017-8397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8398/">CVE-2017-8398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9038/">CVE-2017-9038</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9039/">CVE-2017-9039</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9040/">CVE-2017-9040</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9041/">CVE-2017-9041</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9042/">CVE-2017-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9043/">CVE-2017-9043</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9044/">CVE-2017-9044</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-9954/">CVE-2017-9954</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9955/">CVE-2017-9955</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79960" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1055047" ref_url="https://bugzilla.suse.com/1055047" source="BUGZILLA"/>
		<reference ref_id="1061075" ref_url="https://bugzilla.suse.com/1061075" source="BUGZILLA"/>
		<reference ref_id="1063123" ref_url="https://bugzilla.suse.com/1063123" source="BUGZILLA"/>
		<reference ref_id="1068187" ref_url="https://bugzilla.suse.com/1068187" source="BUGZILLA"/>
		<reference ref_id="1068191" ref_url="https://bugzilla.suse.com/1068191" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00001.html" source="SUSE-SU"/>
		<description>
This update for xen to version 4.7.4 (bsc#1027519) fixes several issues.

This new feature was added:

- Support migration of HVM domains larger than 1 TB

These security issues were fixed:

- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code
  allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests
  to retain a writable mapping of freed memory leading to information leaks,
  privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds write access and Qemu process
  crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain
  allowed a malicious guest administrator to corrupt hypervisor memory, allowing
  for DoS or potentially privilege escalation and information leaks (bsc#1061075).

This non-security issue was fixed:

- bsc#1055047: Fixed --initrd-inject option in virt-install
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-01"/>
	<updated date="2017-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055047">SUSE bug 1055047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068187">SUSE bug 1068187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068191">SUSE bug 1068191</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518378" comment="xen-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549901" comment="xen-doc-html-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518379" comment="xen-libs-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518380" comment="xen-libs-32bit-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549902" comment="xen-tools-4.7.4_02-43.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549903" comment="xen-tools-domU-4.7.4_02-43.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79961" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068101" ref_url="https://bugzilla.suse.com/1068101" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox ESR 52.5 fixes the following issues:

Security issues fixed:
- CVE-2017-7826: Memory safety bugs fixed (bsc#1068101).
- CVE-2017-7828: Use-after-free of PressShell while restyling layout (bsc#1068101).
- CVE-2017-7830: Cross-origin URL information leak through Resource Timing API (bsc#1068101).

Mozilla Foundation Security Advisory (MFSA 2017-25):
- https://www.mozilla.org/en-US/security/advisories/mfsa2017-25/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549904" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549905" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79962" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1003577" ref_url="https://bugzilla.suse.com/1003577" source="BUGZILLA"/>
		<reference ref_id="1003579" ref_url="https://bugzilla.suse.com/1003579" source="BUGZILLA"/>
		<reference ref_id="1003580" ref_url="https://bugzilla.suse.com/1003580" source="BUGZILLA"/>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<description>

This update for zlib fixes the following issues:

CVE-2016-9843: Big-endian out-of-bounds pointer

CVE-2016-9842: Undefined Left Shift of Negative Number (bsc#1003580) 

CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)

Incompatible declarations for external linkage function deflate (bsc#1003577)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-02"/>
	<updated date="2017-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1003577">SUSE bug 1003577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549906" comment="libz1-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549907" comment="libz1-32bit-1.2.8-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541078" comment="zlib-devel-1.2.8-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79963" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1023078" ref_url="https://bugzilla.suse.com/1023078" source="BUGZILLA"/>
		<reference ref_id="1023079" ref_url="https://bugzilla.suse.com/1023079" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00006.html" source="SUSE-SU"/>
		<description>

This security update for spice fixes the following issues:

CVE-2016-9577: A buffer overflow in the spice server could have potentially been used 
by unauthenticated attackers to execute arbitrary code. (bsc#1023078)
CVE-2016-9578: Unauthenticated attackers could have caused a denial of service via a crafted message. (bsc#1023079)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-06"/>
	<updated date="2017-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518386" comment="libspice-server1-0.12.7-8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79964" version="1" class="patch">
	<metadata>
		<title>Security update for libXcursor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1065386" ref_url="https://bugzilla.suse.com/1065386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003472.html" source="SUSE-SU"/>
		<description>
This update for libXcursor fixes the following issues:

Security issue fixed:

- CVE-2017-16612: Fix integeroverflow while parsing images and a signedness issue while parsing comments (bsc#1065386).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549908" comment="libXcursor1-1.1.14-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549909" comment="libXcursor1-32bit-1.1.14-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79965" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068689" ref_url="https://bugzilla.suse.com/1068689" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16852" ref_url="https://www.suse.com/security/cve/CVE-2017-16852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00008.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2017-16852: Fix critical security checks in the Dynamic MetadataProvider plugin in Shibboleth Service (bsc#1068689).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-05"/>
	<updated date="2017-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068689">SUSE bug 1068689</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16852/">CVE-2017-16852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549910" comment="libshibsp-lite6-2.5.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549911" comment="libshibsp6-2.5.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549912" comment="shibboleth-sp-2.5.5-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79966" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1069496" ref_url="https://bugzilla.suse.com/1069496" source="BUGZILLA"/>
		<reference ref_id="1069702" ref_url="https://bugzilla.suse.com/1069702" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000405" ref_url="https://www.suse.com/security/cve/CVE-2017-1000405/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00012.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-1000405: A bug in the THP CoW support could be used by local attackers to corrupt memory of other processes and cause them to crash (bnc#1069496).
- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).

The following non-security bugs were fixed:

Fix a build issue on ppc64le systems (bsc#1070805)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-06"/>
	<updated date="2017-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000405/">CVE-2017-1000405</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549913" comment="kernel-default-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549914" comment="kernel-default-base-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549915" comment="kernel-default-devel-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549916" comment="kernel-default-man-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518392" comment="kernel-devel-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518393" comment="kernel-macros-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518394" comment="kernel-source-4.4.90-92.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549917" comment="kernel-syms-4.4.90-92.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79967" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1006166" ref_url="https://bugzilla.suse.com/1006166" source="BUGZILLA"/>
		<reference ref_id="1048367" ref_url="https://bugzilla.suse.com/1048367" source="BUGZILLA"/>
		<reference ref_id="1065000" ref_url="https://bugzilla.suse.com/1065000" source="BUGZILLA"/>
		<reference ref_id="1068310" ref_url="https://bugzilla.suse.com/1068310" source="BUGZILLA"/>
		<reference ref_id="1069509" ref_url="https://bugzilla.suse.com/1069509" source="BUGZILLA"/>
		<reference ref_id="CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483/" source="CVE"/>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2017-15906: Stricter checking of operations in read-only mode in sftp server (bsc#1065000).

Bug fixes:

- FIPS: Startup selfchecks (bsc#1068310).
- FIPS: Silent complaints about unsupported key exchange methods (bsc#1006166).
- Refine handling of sockets for X11 forwarding to remove reintroduced CVE-2008-1483 (bsc#1069509).
- Test configuration before running daemon to prevent looping resulting in service shutdown (bsc#1048367)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048367">SUSE bug 1048367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068310">SUSE bug 1068310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549918" comment="openssh-7.2p2-74.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549919" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549920" comment="openssh-fips-7.2p2-74.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549921" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79968" version="1" class="patch">
	<metadata>
		<title>Security update for opensaml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068685" ref_url="https://bugzilla.suse.com/1068685" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16853" ref_url="https://www.suse.com/security/cve/CVE-2017-16853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00015.html" source="SUSE-SU"/>
		<description>
This update for opensaml fixes the following issues:

Security issue fixed:

- CVE-2017-16853: Fix the DynamicMetadataProvider class to properly configure itself with the MetadataFilter plugins, to avoid possible MITM attacks (bsc#1068685).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-07"/>
	<updated date="2017-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068685">SUSE bug 1068685</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16853/">CVE-2017-16853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549922" comment="libsaml8-2.5.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549923" comment="opensaml-bin-2.5.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549924" comment="opensaml-schemas-2.5.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79969" version="1" class="patch">
	<metadata>
		<title>Security update for libapr-util1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1064990" ref_url="https://bugzilla.suse.com/1064990" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003492.html" source="SUSE-SU"/>
		<description>
This update for libapr-util1 fixes the following issues:

Security issue fixed:

- CVE-2017-12618: DoS via crafted SDBM database files in apr_sdbm*() functions (bsc#1064990)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-13"/>
	<updated date="2017-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541094" comment="libapr-util1-1.5.3-2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549925" comment="libapr-util1-dbd-sqlite3-1.5.3-2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79970" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1008253" ref_url="https://bugzilla.suse.com/1008253" source="BUGZILLA"/>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020873" ref_url="https://bugzilla.suse.com/1020873" source="BUGZILLA"/>
		<reference ref_id="1020875" ref_url="https://bugzilla.suse.com/1020875" source="BUGZILLA"/>
		<reference ref_id="1020877" ref_url="https://bugzilla.suse.com/1020877" source="BUGZILLA"/>
		<reference ref_id="1020878" ref_url="https://bugzilla.suse.com/1020878" source="BUGZILLA"/>
		<reference ref_id="1020882" ref_url="https://bugzilla.suse.com/1020882" source="BUGZILLA"/>
		<reference ref_id="1020884" ref_url="https://bugzilla.suse.com/1020884" source="BUGZILLA"/>
		<reference ref_id="1020885" ref_url="https://bugzilla.suse.com/1020885" source="BUGZILLA"/>
		<reference ref_id="1020891" ref_url="https://bugzilla.suse.com/1020891" source="BUGZILLA"/>
		<reference ref_id="1020894" ref_url="https://bugzilla.suse.com/1020894" source="BUGZILLA"/>
		<reference ref_id="1020896" ref_url="https://bugzilla.suse.com/1020896" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<description>

This mariadb version update to 10.0.29 fixes the following issues:

- CVE-2017-3318: unspecified vulnerability affecting Error Handling (bsc#1020896)
- CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894)
- CVE-2017-3312: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873)
- CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884)
- CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885)
- CVE-2017-3258: unspecified vulnerability in the DDL component (bsc#1020875)
- CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878)
- CVE-2017-3244: unspecified vulnerability affecing the DML component (bsc#1020877)
- CVE-2017-3243: unspecified vulnerability affecting the Charsets component (bsc#1020891)
- CVE-2017-3238: unspecified vulnerability affecting the Optimizer component (bsc#1020882)
- CVE-2016-6664: Root Privilege Escalation (bsc#1008253)
- Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428)

- notable changes:
  * XtraDB updated to 5.6.34-79.1
  * TokuDB updated to 5.6.34-79.1
  * Innodb updated to 5.6.35
  * Performance Schema updated to 5.6.35

Release notes and changelog:
  * https://kb.askmonty.org/en/mariadb-10029-release-notes
  * https://kb.askmonty.org/en/mariadb-10029-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-07"/>
	<updated date="2017-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020878">SUSE bug 1020878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79971" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1071905" ref_url="https://bugzilla.suse.com/1071905" source="BUGZILLA"/>
		<reference ref_id="1071906" ref_url="https://bugzilla.suse.com/1071906" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- OpenSSL Security Advisory [07 Dec 2017]
  * CVE-2017-3737: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \'error state\' mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (bsc#1071905)
  * CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. (bsc#1071906)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-16"/>
	<updated date="2017-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541101" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549931" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549932" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549933" comment="libopenssl1_0_0-hmac-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549934" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549935" comment="openssl-1.0.2j-60.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532667" comment="openssl-doc-1.0.2j-60.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79972" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="983215" ref_url="https://bugzilla.suse.com/983215" source="BUGZILLA"/>
		<reference ref_id="983216" ref_url="https://bugzilla.suse.com/983216" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<description>

This update for expat fixes the following security issues:

- CVE-2012-6702: Expat, when used in a parser that has not
  called XML_SetHashSalt or passed it a seed of 0, made it easier for
  context-dependent attackers to defeat cryptographic protection mechanisms
  via vectors involving use of the srand function.  (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
  for hash initialization, which allowed context-dependent attackers to
  cause a denial of service (CPU consumption) via crafted identifiers in
  an XML document. NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2012-0876.  (bsc#983216)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549936" comment="expat-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549937" comment="libexpat1-2.1.0-20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547802" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79973" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1048457" ref_url="https://bugzilla.suse.com/1048457" source="BUGZILLA"/>
		<reference ref_id="1049796" ref_url="https://bugzilla.suse.com/1049796" source="BUGZILLA"/>
		<reference ref_id="1050083" ref_url="https://bugzilla.suse.com/1050083" source="BUGZILLA"/>
		<reference ref_id="1050116" ref_url="https://bugzilla.suse.com/1050116" source="BUGZILLA"/>
		<reference ref_id="1050139" ref_url="https://bugzilla.suse.com/1050139" source="BUGZILLA"/>
		<reference ref_id="1050632" ref_url="https://bugzilla.suse.com/1050632" source="BUGZILLA"/>
		<reference ref_id="1051441" ref_url="https://bugzilla.suse.com/1051441" source="BUGZILLA"/>
		<reference ref_id="1051847" ref_url="https://bugzilla.suse.com/1051847" source="BUGZILLA"/>
		<reference ref_id="1052450" ref_url="https://bugzilla.suse.com/1052450" source="BUGZILLA"/>
		<reference ref_id="1052553" ref_url="https://bugzilla.suse.com/1052553" source="BUGZILLA"/>
		<reference ref_id="1052689" ref_url="https://bugzilla.suse.com/1052689" source="BUGZILLA"/>
		<reference ref_id="1052744" ref_url="https://bugzilla.suse.com/1052744" source="BUGZILLA"/>
		<reference ref_id="1052758" ref_url="https://bugzilla.suse.com/1052758" source="BUGZILLA"/>
		<reference ref_id="1052764" ref_url="https://bugzilla.suse.com/1052764" source="BUGZILLA"/>
		<reference ref_id="1054757" ref_url="https://bugzilla.suse.com/1054757" source="BUGZILLA"/>
		<reference ref_id="1055214" ref_url="https://bugzilla.suse.com/1055214" source="BUGZILLA"/>
		<reference ref_id="1056432" ref_url="https://bugzilla.suse.com/1056432" source="BUGZILLA"/>
		<reference ref_id="1057157" ref_url="https://bugzilla.suse.com/1057157" source="BUGZILLA"/>
		<reference ref_id="1057719" ref_url="https://bugzilla.suse.com/1057719" source="BUGZILLA"/>
		<reference ref_id="1057729" ref_url="https://bugzilla.suse.com/1057729" source="BUGZILLA"/>
		<reference ref_id="1057730" ref_url="https://bugzilla.suse.com/1057730" source="BUGZILLA"/>
		<reference ref_id="1058485" ref_url="https://bugzilla.suse.com/1058485" source="BUGZILLA"/>
		<reference ref_id="1058637" ref_url="https://bugzilla.suse.com/1058637" source="BUGZILLA"/>
		<reference ref_id="1059666" ref_url="https://bugzilla.suse.com/1059666" source="BUGZILLA"/>
		<reference ref_id="1059778" ref_url="https://bugzilla.suse.com/1059778" source="BUGZILLA"/>
		<reference ref_id="1060176" ref_url="https://bugzilla.suse.com/1060176" source="BUGZILLA"/>
		<reference ref_id="1060577" ref_url="https://bugzilla.suse.com/1060577" source="BUGZILLA"/>
		<reference ref_id="1061254" ref_url="https://bugzilla.suse.com/1061254" source="BUGZILLA"/>
		<reference ref_id="1062750" ref_url="https://bugzilla.suse.com/1062750" source="BUGZILLA"/>
		<reference ref_id="1066003" ref_url="https://bugzilla.suse.com/1066003" source="BUGZILLA"/>
		<reference ref_id="1067181" ref_url="https://bugzilla.suse.com/1067181" source="BUGZILLA"/>
		<reference ref_id="1067184" ref_url="https://bugzilla.suse.com/1067184" source="BUGZILLA"/>
		<reference ref_id="1067409" ref_url="https://bugzilla.suse.com/1067409" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188/" source="CVE"/>
		<reference ref_id="CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478/" source="CVE"/>
		<reference ref_id="CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523/" source="CVE"/>
		<reference ref_id="CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527/" source="CVE"/>
		<reference ref_id="CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535/" source="CVE"/>
		<reference ref_id="CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640/" source="CVE"/>
		<reference ref_id="CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752/" source="CVE"/>
		<reference ref_id="CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140/" source="CVE"/>
		<reference ref_id="CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435/" source="CVE"/>
		<reference ref_id="CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587/" source="CVE"/>
		<reference ref_id="CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644/" source="CVE"/>
		<reference ref_id="CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662/" source="CVE"/>
		<reference ref_id="CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669/" source="CVE"/>
		<reference ref_id="CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983/" source="CVE"/>
		<reference ref_id="CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134/" source="CVE"/>
		<reference ref_id="CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769/" source="CVE"/>
		<reference ref_id="CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138/" source="CVE"/>
		<reference ref_id="CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172/" source="CVE"/>
		<reference ref_id="CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173/" source="CVE"/>
		<reference ref_id="CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175/" source="CVE"/>
		<reference ref_id="CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341/" source="CVE"/>
		<reference ref_id="CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342/" source="CVE"/>
		<reference ref_id="CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531/" source="CVE"/>
		<reference ref_id="CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607/" source="CVE"/>
		<reference ref_id="CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682/" source="CVE"/>
		<reference ref_id="CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733/" source="CVE"/>
		<reference ref_id="CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989/" source="CVE"/>
		<reference ref_id="CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217/" source="CVE"/>
		<reference ref_id="CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930/" source="CVE"/>
		<reference ref_id="CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545/" source="CVE"/>
		<reference ref_id="CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546/" source="CVE"/>
		<reference ref_id="CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

  * CVE-2017-14989: use-after-free in RenderFreetype in MagickCore/annotate.c could lead to denial of service [bsc#1061254]
  * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer overflow could lead to denial of service [bsc#1060176]
  * Memory leak in WriteINLINEImage in coders/inline.c could lead to denial of service [bsc#1052744]
  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  could possibly disclose potentially sensitive memory [bsc#1059778]
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]
  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181]
  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  validation problems could lead to denial of service [bsc#1067184]
  * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers to cause a denial of service via crafted file [bsc#1067409]
  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]
  * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in coders/webp.c could lead to denial of service [bsc#1057157]
  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]
  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]
  * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c [bsc#1062750]
  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]
  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers to cause a denial of service [bsc#1054757]
  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]
  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553]
  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]
  * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers to cause a denial of service [bsc#1050083]
  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]
  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 
  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]
  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 
  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 
  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]
  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]
  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]
  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]
  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]

		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-20"/>
	<updated date="2017-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050083">SUSE bug 1050083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052744">SUSE bug 1052744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061254">SUSE bug 1061254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062750">SUSE bug 1062750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79974" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1067841" ref_url="https://bugzilla.suse.com/1067841" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-15099: Ensure that INSERT ... ON CONFLICT DO UPDATE checks table permissions and RLS policies in all cases (bsc#1067841).

Bug fixes:

- Update to version 9.6.6:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-6.html
  * https://www.postgresql.org/docs/9.6/static/release-9-6-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1067841">SUSE bug 1067841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549940" comment="libecpg6-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549941" comment="libpq5-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549942" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549943" comment="postgresql96-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549944" comment="postgresql96-contrib-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532676" comment="postgresql96-docs-9.6.6-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549945" comment="postgresql96-server-9.6.6-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79975" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1010201" ref_url="https://bugzilla.suse.com/1010201" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1017461" ref_url="https://bugzilla.suse.com/1017461" source="BUGZILLA"/>
		<reference ref_id="1020645" ref_url="https://bugzilla.suse.com/1020645" source="BUGZILLA"/>
		<reference ref_id="1021424" ref_url="https://bugzilla.suse.com/1021424" source="BUGZILLA"/>
		<reference ref_id="1022595" ref_url="https://bugzilla.suse.com/1022595" source="BUGZILLA"/>
		<reference ref_id="1022600" ref_url="https://bugzilla.suse.com/1022600" source="BUGZILLA"/>
		<reference ref_id="1022914" ref_url="https://bugzilla.suse.com/1022914" source="BUGZILLA"/>
		<reference ref_id="1024412" ref_url="https://bugzilla.suse.com/1024412" source="BUGZILLA"/>
		<reference ref_id="1025461" ref_url="https://bugzilla.suse.com/1025461" source="BUGZILLA"/>
		<reference ref_id="1027301" ref_url="https://bugzilla.suse.com/1027301" source="BUGZILLA"/>
		<reference ref_id="1028971" ref_url="https://bugzilla.suse.com/1028971" source="BUGZILLA"/>
		<reference ref_id="1030061" ref_url="https://bugzilla.suse.com/1030061" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1034048" ref_url="https://bugzilla.suse.com/1034048" source="BUGZILLA"/>
		<reference ref_id="1037890" ref_url="https://bugzilla.suse.com/1037890" source="BUGZILLA"/>
		<reference ref_id="1046107" ref_url="https://bugzilla.suse.com/1046107" source="BUGZILLA"/>
		<reference ref_id="1050060" ref_url="https://bugzilla.suse.com/1050060" source="BUGZILLA"/>
		<reference ref_id="1050231" ref_url="https://bugzilla.suse.com/1050231" source="BUGZILLA"/>
		<reference ref_id="1053919" ref_url="https://bugzilla.suse.com/1053919" source="BUGZILLA"/>
		<reference ref_id="1055567" ref_url="https://bugzilla.suse.com/1055567" source="BUGZILLA"/>
		<reference ref_id="1056003" ref_url="https://bugzilla.suse.com/1056003" source="BUGZILLA"/>
		<reference ref_id="1056365" ref_url="https://bugzilla.suse.com/1056365" source="BUGZILLA"/>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1056979" ref_url="https://bugzilla.suse.com/1056979" source="BUGZILLA"/>
		<reference ref_id="1057199" ref_url="https://bugzilla.suse.com/1057199" source="BUGZILLA"/>
		<reference ref_id="1058135" ref_url="https://bugzilla.suse.com/1058135" source="BUGZILLA"/>
		<reference ref_id="1059863" ref_url="https://bugzilla.suse.com/1059863" source="BUGZILLA"/>
		<reference ref_id="1060333" ref_url="https://bugzilla.suse.com/1060333" source="BUGZILLA"/>
		<reference ref_id="1060682" ref_url="https://bugzilla.suse.com/1060682" source="BUGZILLA"/>
		<reference ref_id="1060985" ref_url="https://bugzilla.suse.com/1060985" source="BUGZILLA"/>
		<reference ref_id="1061451" ref_url="https://bugzilla.suse.com/1061451" source="BUGZILLA"/>
		<reference ref_id="1061756" ref_url="https://bugzilla.suse.com/1061756" source="BUGZILLA"/>
		<reference ref_id="1062520" ref_url="https://bugzilla.suse.com/1062520" source="BUGZILLA"/>
		<reference ref_id="1062941" ref_url="https://bugzilla.suse.com/1062941" source="BUGZILLA"/>
		<reference ref_id="1062962" ref_url="https://bugzilla.suse.com/1062962" source="BUGZILLA"/>
		<reference ref_id="1063026" ref_url="https://bugzilla.suse.com/1063026" source="BUGZILLA"/>
		<reference ref_id="1063460" ref_url="https://bugzilla.suse.com/1063460" source="BUGZILLA"/>
		<reference ref_id="1063475" ref_url="https://bugzilla.suse.com/1063475" source="BUGZILLA"/>
		<reference ref_id="1063501" ref_url="https://bugzilla.suse.com/1063501" source="BUGZILLA"/>
		<reference ref_id="1063509" ref_url="https://bugzilla.suse.com/1063509" source="BUGZILLA"/>
		<reference ref_id="1063516" ref_url="https://bugzilla.suse.com/1063516" source="BUGZILLA"/>
		<reference ref_id="1063520" ref_url="https://bugzilla.suse.com/1063520" source="BUGZILLA"/>
		<reference ref_id="1063695" ref_url="https://bugzilla.suse.com/1063695" source="BUGZILLA"/>
		<reference ref_id="1064206" ref_url="https://bugzilla.suse.com/1064206" source="BUGZILLA"/>
		<reference ref_id="1064701" ref_url="https://bugzilla.suse.com/1064701" source="BUGZILLA"/>
		<reference ref_id="1064926" ref_url="https://bugzilla.suse.com/1064926" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065639" ref_url="https://bugzilla.suse.com/1065639" source="BUGZILLA"/>
		<reference ref_id="1065692" ref_url="https://bugzilla.suse.com/1065692" source="BUGZILLA"/>
		<reference ref_id="1065717" ref_url="https://bugzilla.suse.com/1065717" source="BUGZILLA"/>
		<reference ref_id="1065866" ref_url="https://bugzilla.suse.com/1065866" source="BUGZILLA"/>
		<reference ref_id="1066045" ref_url="https://bugzilla.suse.com/1066045" source="BUGZILLA"/>
		<reference ref_id="1066192" ref_url="https://bugzilla.suse.com/1066192" source="BUGZILLA"/>
		<reference ref_id="1066213" ref_url="https://bugzilla.suse.com/1066213" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1066285" ref_url="https://bugzilla.suse.com/1066285" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1066470" ref_url="https://bugzilla.suse.com/1066470" source="BUGZILLA"/>
		<reference ref_id="1066471" ref_url="https://bugzilla.suse.com/1066471" source="BUGZILLA"/>
		<reference ref_id="1066472" ref_url="https://bugzilla.suse.com/1066472" source="BUGZILLA"/>
		<reference ref_id="1066573" ref_url="https://bugzilla.suse.com/1066573" source="BUGZILLA"/>
		<reference ref_id="1066606" ref_url="https://bugzilla.suse.com/1066606" source="BUGZILLA"/>
		<reference ref_id="1066629" ref_url="https://bugzilla.suse.com/1066629" source="BUGZILLA"/>
		<reference ref_id="1067105" ref_url="https://bugzilla.suse.com/1067105" source="BUGZILLA"/>
		<reference ref_id="1067132" ref_url="https://bugzilla.suse.com/1067132" source="BUGZILLA"/>
		<reference ref_id="1067494" ref_url="https://bugzilla.suse.com/1067494" source="BUGZILLA"/>
		<reference ref_id="1067888" ref_url="https://bugzilla.suse.com/1067888" source="BUGZILLA"/>
		<reference ref_id="1068671" ref_url="https://bugzilla.suse.com/1068671" source="BUGZILLA"/>
		<reference ref_id="1068978" ref_url="https://bugzilla.suse.com/1068978" source="BUGZILLA"/>
		<reference ref_id="1068980" ref_url="https://bugzilla.suse.com/1068980" source="BUGZILLA"/>
		<reference ref_id="1068982" ref_url="https://bugzilla.suse.com/1068982" source="BUGZILLA"/>
		<reference ref_id="1069270" ref_url="https://bugzilla.suse.com/1069270" source="BUGZILLA"/>
		<reference ref_id="1069793" ref_url="https://bugzilla.suse.com/1069793" source="BUGZILLA"/>
		<reference ref_id="1069942" ref_url="https://bugzilla.suse.com/1069942" source="BUGZILLA"/>
		<reference ref_id="1069996" ref_url="https://bugzilla.suse.com/1069996" source="BUGZILLA"/>
		<reference ref_id="1070006" ref_url="https://bugzilla.suse.com/1070006" source="BUGZILLA"/>
		<reference ref_id="1070145" ref_url="https://bugzilla.suse.com/1070145" source="BUGZILLA"/>
		<reference ref_id="1070535" ref_url="https://bugzilla.suse.com/1070535" source="BUGZILLA"/>
		<reference ref_id="1070767" ref_url="https://bugzilla.suse.com/1070767" source="BUGZILLA"/>
		<reference ref_id="1070771" ref_url="https://bugzilla.suse.com/1070771" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1070825" ref_url="https://bugzilla.suse.com/1070825" source="BUGZILLA"/>
		<reference ref_id="1070964" ref_url="https://bugzilla.suse.com/1070964" source="BUGZILLA"/>
		<reference ref_id="1071231" ref_url="https://bugzilla.suse.com/1071231" source="BUGZILLA"/>
		<reference ref_id="1071693" ref_url="https://bugzilla.suse.com/1071693" source="BUGZILLA"/>
		<reference ref_id="1071694" ref_url="https://bugzilla.suse.com/1071694" source="BUGZILLA"/>
		<reference ref_id="1071695" ref_url="https://bugzilla.suse.com/1071695" source="BUGZILLA"/>
		<reference ref_id="1071833" ref_url="https://bugzilla.suse.com/1071833" source="BUGZILLA"/>
		<reference ref_id="963575" ref_url="https://bugzilla.suse.com/963575" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966316" ref_url="https://bugzilla.suse.com/966316" source="BUGZILLA"/>
		<reference ref_id="966318" ref_url="https://bugzilla.suse.com/966318" source="BUGZILLA"/>
		<reference ref_id="969474" ref_url="https://bugzilla.suse.com/969474" source="BUGZILLA"/>
		<reference ref_id="969475" ref_url="https://bugzilla.suse.com/969475" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="974590" ref_url="https://bugzilla.suse.com/974590" source="BUGZILLA"/>
		<reference ref_id="979928" ref_url="https://bugzilla.suse.com/979928" source="BUGZILLA"/>
		<reference ref_id="989261" ref_url="https://bugzilla.suse.com/989261" source="BUGZILLA"/>
		<reference ref_id="996376" ref_url="https://bugzilla.suse.com/996376" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.103 to receive various security and bugfixes.

This update enables SMB encryption in the CIFS support in the Linux Kernel (fate#324404)

The following security bugs were fixed:

- CVE-2017-1000410: The Linux kernel was affected by an information leak in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. (bnc#1070535).
- CVE-2017-11600: net/xfrm/xfrm_policy.c in the Linux kernel did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bnc#1050231).
- CVE-2017-12193: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel mishandled node splitting, which allowed local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations (bnc#1066192).
- CVE-2017-15115: The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel did not check whether the intended netns is used in a peel-off action, which allowed local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (bnc#1068671).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-16528: sound/core/seq_device.c in the Linux kernel allowed local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066629).
- CVE-2017-16536: The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066606).
- CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066573).
- CVE-2017-16645: The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067132).
- CVE-2017-16646: drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel allowed local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067105).
- CVE-2017-16994: The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel mishandled holes in hugetlb ranges, which allowed local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call (bnc#1069996).
- CVE-2017-17448: net/netfilter/nfnetlink_cthelper.c in the Linux kernel did not require the CAP_NET_ADMIN capability for new, get, and del operations, which allowed local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces (bnc#1071693).
- CVE-2017-17449: The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, did not restrict observations of Netlink messages to a single net namespace, which allowed local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system (bnc#1071694).
- CVE-2017-17450: net/netfilter/xt_osf.c in the Linux kernel did not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allowed local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces (bnc#1071695).
- CVE-2017-7482: Fixed an overflow when decoding a krb5 principal. (bnc#1046107).
- CVE-2017-8824: The dccp_disconnect function in net/dccp/proto.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state (bnc#1070771).

The following non-security bugs were fixed:

- adm80211: return an error if adm8211_alloc_rings() fails (bsc#1031717).
- adv7604: Initialize drive strength to default when using DT (bnc#1012382).
- af_netlink: ensure that NLMSG_DONE never fails in dumps (bnc#1012382).
- alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).
- alsa: caiaq: Fix stray URB at probe error path (bnc#1012382).
- alsa: compress: Remove unused variable (bnc#1012382).
- alsa: hda: Add Raven PCI ID (bnc#1012382).
- alsa: hda - Apply ALC269_FIXUP_NO_SHUTUP on HDA_FIXUP_ACT_PROBE (bnc#1012382).
- alsa: hda/ca0132 - Fix memory leak at error path (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc236 (bnc#1012382).
- alsa: hda - No loopback on ALC299 codec (git-fixes).
- alsa: hda/realtek: Add headset mic support for Intel NUC Skull Canyon (bsc#1031717).
- alsa: hda/realtek - Add new codec ID ALC299 (bnc#1012382).
- alsa: hda/realtek - Add support for ALC236/ALC3204 (bnc#1012382).
- alsa: hda/realtek - Fix ALC700 family no sound issue (bsc#1031717).
- alsa: hda: Remove superfluous '-' added by printk conversion (bnc#1012382).
- alsa: line6: Fix leftover URB at error-path during probe (bnc#1012382).
- alsa: pcm: update tstamp only if audio_tstamp changed (bsc#1031717).
- alsa: seq: Avoid invalid lockdep class warning (bsc#1031717).
- alsa: seq: Enable 'use' locking in all configurations (bnc#1012382).
- alsa: seq: Fix copy_from_user() call inside lock (bnc#1012382).
- alsa: seq: Fix nested rwsem annotation for lockdep splat (bnc#1012382).
- alsa: seq: Fix OSS sysex delivery in OSS emulation (bnc#1012382).
- alsa: timer: Add missing mutex lock for compat ioctls (bnc#1012382).
- alsa: timer: Remove kernel warning at compat ioctl error paths (bsc#1031717).
- alsa: usb-audio: Add native DSD support for Pro-Ject Pre Box S2 Digital (bnc#1012382).
- alsa: usb-audio: Add sanity checks in v2 clock parsers (bsc#1031717).
- alsa: usb-audio: Add sanity checks to FE parser (bsc#1031717).
- alsa: usb-audio: Check out-of-bounds access by corrupted buffer descriptor (bnc#1012382).
- alsa: usb-audio: Fix potential out-of-bound access at parsing SU (bsc#1031717).
- alsa: usb-audio: Kill stray URB at exiting (bnc#1012382).
- alsa: usb-audio: uac1: Invalidate ctl on interrupt (bsc#1031717).
- alsa: usx2y: Suppress kernel warning at page allocation failures (bnc#1012382).
- alsa: vx: Do not try to update capture stream before running (bnc#1012382).
- alsa: vx: Fix possible transfer overflow (bnc#1012382).
- Apply generic ppc build fixes to vanilla (bsc#1070805)
- arm64: dts: NS2: reserve memory for Nitro firmware (bnc#1012382).
- arm64: ensure __dump_instr() checks addr_limit (bnc#1012382).
- arm64: fix dump_instr when PAN and UAO are in use (bnc#1012382).
- arm: 8635/1: nommu: allow enabling REMAP_VECTORS_TO_RAM (bnc#1012382).
- arm: 8715/1: add a private asm/unaligned.h (bnc#1012382).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bnc#1012382).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bnc#1012382).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bnc#1012382).
- arm: crypto: reduce priority of bit-sliced AES cipher (bnc#1012382).
- arm: dts: Fix am335x and dm814x scm syscon to probe children (bnc#1012382).
- arm: dts: Fix compatible for ti81xx uarts for 8250 (bnc#1012382).
- arm: dts: Fix omap3 off mode pull defines (bnc#1012382).
- arm: dts: mvebu: pl310-cache disable double-linefill (bnc#1012382).
- arm: dts: r8a7790: Use R-Car Gen 2 fallback binding for msiof nodes (bnc#1012382).
- arm: OMAP2+: Fix init for multiple quirks for the same SoC (bnc#1012382).
- arm: omap2plus_defconfig: Fix probe errors on UARTs 5 and 6 (bnc#1012382).
- arm: pxa: Do not rely on public mmc header to include leds.h (bnc#1012382).
- arm: remove duplicate 'const' annotations' (bnc#1012382).
- asm/sections: add helpers to check for section data (bsc#1063026).
- asoc: adau17x1: Workaround for noise bug in ADC (bnc#1012382).
- asoc: cs42l56: Fix reset GPIO name in example DT binding (bsc#1031717).
- asoc: dapm: fix some pointer error handling (bnc#1012382).
- asoc: dapm: handle probe deferrals (bnc#1012382).
- asoc: davinci-mcasp: Fix an error handling path in 'davinci_mcasp_probe()' (bsc#1031717).
- asoc: rsnd: do not double free kctrl (bnc#1012382).
- asoc: samsung: Fix possible double iounmap on s3c24xx driver probe failure (bsc#1031717).
- asoc: wm_adsp: Do not overrun firmware file buffer when reading region data (bnc#1012382).
- ata: ATA_BMDMA should depend on HAS_DMA (bnc#1012382).
- ata: fixes kernel crash while tracing ata_eh_link_autopsy event (bnc#1012382).
- ata: SATA_HIGHBANK should depend on HAS_DMA (bnc#1012382).
- ata: SATA_MV should depend on HAS_DMA (bnc#1012382).
- ath10k: convert warning about non-existent OTP board id to debug message (git-fixes).
- ath10k: fix a warning during channel switch with multiple vaps (bsc#1031717).
- ath10k: fix board data fetch error message (bsc#1031717).
- ath10k: fix diag_read to collect data for larger memory (bsc#1031717).
- ath10k: fix incorrect txpower set by P2P_DEVICE interface (bnc#1012382).
- ath10k: fix potential memory leak in ath10k_wmi_tlv_op_pull_fw_stats() (bnc#1012382).
- ath10k: free cached fw bin contents when get board id fails (bsc#1031717).
- ath10k: ignore configuring the incorrect board_id (bnc#1012382).
- ath10k: set CTS protection VDEV param only if VDEV is up (bnc#1012382).
- ath9k_htc: check for underflow in ath9k_htc_rx_msg() (bsc#1031717).
- ath9k: off by one in ath9k_hw_nvram_read_array() (bsc#1031717).
- audit: log 32-bit socketcalls (bnc#1012382).
- autofs: do not fail mount for transient error (bsc#1065180).
- backlight: adp5520: Fix error handling in adp5520_bl_probe() (bnc#1012382).
- backlight: lcd: Fix race condition during register (bnc#1012382).
- bcache: check ca-&gt;alloc_thread initialized before wake up it (bnc#1012382).
- block: Fix a race between blk_cleanup_queue() and timeout handling (FATE#319965, bsc#964944).
- bluetooth: btusb: fix QCA Rome suspend/resume (bnc#1012382).
- bnxt_en: Call firmware to approve the random VF MAC address (bsc#963575 FATE#320144).
- bnxt_en: Do not setup MAC address in bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).
- bnxt_en: Fix possible corrupted NVRAM parameters from firmware response (bsc#963575 FATE#320144).
- bnxt_en: Fix VF PCIe link speed and width logic (bsc#963575 FATE#320144).
- bnxt_en: Re-arrange bnxt_hwrm_func_qcaps() (bsc#963575 FATE#320144).
- bnxt_en: use eth_hw_addr_random() (bsc#963575 FATE#320144).
- bonding: discard lowest hash bit for 802.3ad layer3+4 (bnc#1012382).
- bpf: one perf event close won't free bpf program attached by another perf event (bnc#1012382).
- bpf/verifier: reject BPF_ALU64|BPF_END (bnc#1012382).
- brcmfmac: add length check in brcmf_cfg80211_escan_handler() (bnc#1012382).
- brcmfmac: remove setting IBSS mode when stopping AP (bnc#1012382).
- brcmfmac: setup passive scan if requested by user-space (bnc#1012382).
- brcmsmac: make some local variables 'static const' to reduce stack size (bnc#1012382).
- bridge: netlink: register netdevice before executing changelink (bnc#1012382).
- bt8xx: fix memory leak (bnc#1012382).
- btrfs: add a node counter to each of the rbtrees (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: add cond_resched() calls when resolving backrefs (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: allow backref search checks for shared extents (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, add tracepoints for prelim_ref insertion and merging (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, add unode_aux_to_inode_list helper (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, cleanup __ namespace abuse (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: backref, constify some arguments (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: btrfs_check_shared should manage its own transaction (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: clean up extraneous computations in add_delayed_refs (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: constify tracepoint arguments (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: convert prelimary reference tracking to use rbtrees (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: fix leak and use-after-free in resolve_indirect_refs (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: Fix typo in may_commit_transaction Rather than comparing the result of the percpu comparison I was comparing the value of the percpu counter against 0 or 1.
- btrfs: remove ref_tree implementation from backref.c (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- btrfs: return the actual error value from from btrfs_uuid_tree_iterate (bnc#1012382).
- btrfs: struct-funcs, constify readers (bsc#974590 bsc#1030061 bsc#1022914 bsc#1017461).
- bus: mbus: fix window size calculation for 4GB windows (bnc#1012382).
- can: c_can: do not indicate triple sampling support for D_CAN (bnc#1012382).
- can: esd_usb2: Fix can_dlc value for received RTR, frames (bnc#1012382).
- can: gs_usb: fix busy loop if no more TX context is available (bnc#1012382).
- can: kvaser_usb: Correct return value in printout (bnc#1012382).
- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bnc#1012382).
- can: sun4i: fix loopback mode (bnc#1012382).
- can: sun4i: handle overrun in RX FIFO (bnc#1012382).
- cdc_ncm: Set NTB format again after altsetting switch for Huawei devices (bnc#1012382).
- ceph: avoid panic in create_session_open_msg() if utsname() returns NULL (bsc#1061451).
- ceph: check negative offsets in ceph_llseek() (bsc#1061451).
- ceph: clean up unsafe d_parent accesses in build_dentry_path (bnc#1012382).
- ceph: unlock dangling spinlock in try_flush_caps() (bsc#1065639).
- cgroup, net_cls: iterate the fds of only the tasks which are being migrated (bnc#1064926).
- cifs: add build_path_from_dentry_optional_prefix() (fate#323482)
- cifs: Add capability to decrypt big read responses (FATE#324404). Allow to decrypt transformed packets that are bigger than the big buffer size. In particular it is used for read responses that can only exceed the big buffer size.
- cifs: Add capability to transform requests before sending (FATE#324404). This will allow us to do protocol specific tranformations of packets before sending to the server. For SMB3 it can be used to support encryption.
- cifs: Add copy into pages callback for a read operation (FATE#324404). Since we have two different types of reads (pagecache and direct) we need to process such responses differently after decryption of a packet. The change allows to specify a callback that copies a read payload data into preallocated pages.
- cifs: Add mid handle callback (FATE#324404). We need to process read responses differently because the data should go directly into preallocated pages. This can be done by specifying a mid handle callback.
- cifs: Add soft dependencies (FATE#324404). List soft dependencies of cifs so that mkinitrd and dracut can include the required helper modules.
- cifs: Add transform header handling callbacks (FATE#324404). We need to recognize and parse transformed packets in demultiplex thread to find a corresponsing mid and process it further.
- cifs: add use_ipc flag to SMB2_ioctl() (fate#323482)
- cifs: Allow to switch on encryption with seal mount  option (FATE#324404). This allows users to inforce encryption for SMB3 shares if a server supports it.
- cifs: check MaxPathNameComponentLength != 0 before using it (bnc#1012382).
- cifs: Decrypt and process small encrypted packets (FATE#324404). Allow to decrypt transformed packets, find a corresponding mid and process as usual further.
- cifs: do not bother with kmap on read_pages side (FATE#324404). just do ITER_BVEC recvmsg
- cifs: Enable encryption during session setup phase  (FATE#324404). In order to allow encryption on SMB connection we need to exchange a session key and generate encryption and decryption keys.
- cifs: Encrypt SMB3 requests before sending (FATE#324404). This change allows to encrypt packets if it is required by a server for SMB sessions or tree connections.
- cifs: fix circular locking dependency (bsc#1064701).
- cifs: Fix some return values in case of error in 'crypt_message' (fate#324404).
- cifs: Fix sparse warnings (fate#323482)
- cifs: implement get_dfs_refer for SMB2+ (fate#323482)
- cifs: let ses-&gt;ipc_tid hold smb2 TreeIds (fate#323482)
- cifs: Make send_cancel take rqst as argument (FATE#324404).
- cifs: Make SendReceive2() takes resp iov (FATE#324404). Now SendReceive2 frees the first iov and returns a response buffer in it that increases a code complexity. Simplify this by making a caller responsible for freeing request buffer itself and returning a response buffer in a separate iov.
- cifs: move DFS response parsing out of SMB1 code (fate#323482)
- cifs: no need to wank with copying and advancing iovec on recvmsg side  either (FATE#324404).
- cifs: Only select the required crypto modules (FATE#324404). The sha256 and cmac crypto modules are only needed for SMB2+, so move the select statements to config CIFS_SMB2. Also select CRYPTO_AES there as SMB2+ needs it.
- cifs: Prepare for encryption support (first part). Add decryption and encryption key generation. (FATE#324404).
- cifs_readv_receive: use cifs_read_from_socket() (FATE#324404).
- cifs: Reconnect expired SMB sessions (bnc#1012382).
- cifs: remove any preceding delimiter from prefix_path (fate#323482)
- cifs: Send RFC1001 length in a separate iov (FATE#324404). In order to simplify further encryption support we need to separate RFC1001 length and SMB2 header when sending a request. Put the length field in iov[0] and the rest of the packet into following iovs.
- cifs: Separate RFC1001 length processing for SMB2 read (FATE#324404). Allocate and initialize SMB2 read request without RFC1001 length field to directly call cifs_send_recv() rather than SendReceive2() in a read codepath.
- cifs: Separate SMB2 header structure (FATE#324404). In order to support compounding and encryption we need to separate RFC1001 length field and SMB2 header structure because the protocol treats them differently. This change will allow to simplify parsing of such complex SMB2 packets further.
- cifs: Separate SMB2 sync header processing (FATE#324404). Do not process RFC1001 length in smb2_hdr_assemble() because it is not a part of SMB2 header. This allows to cleanup the code and adds a possibility combine several SMB2 packets into one for compounding.
- cifs: set signing flag in SMB2+ TreeConnect if needed (fate#323482)
- cifs: Simplify SMB2 and SMB311 dependencies (FATE#324404).
- clk: ti: dra7-atl-clock: fix child-node lookups (bnc#1012382).
- clk: ti: dra7-atl-clock: Fix of_node reference counting (bnc#1012382).
- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bnc#1012382).
- cma: fix calculation of aligned offset (VM Functionality, bsc#1050060).
- coda: fix 'kernel memory exposure attempt' in fsync (bnc#1012382).
- cpufreq: CPPC: add ACPI_PROCESSOR dependency (bnc#1012382).
- crypto: shash - Fix zero-length shash ahash digest crash (bnc#1012382).
- crypto: vmx - disable preemption to enable vsx in aes_ctr.c (bnc#1012382).
- crypto: x86/sha1-mb - fix panic due to unaligned access (bnc#1012382).
- crypto: xts - Add ECB dependency (bnc#1012382).
- cx231xx: Fix I2C on Internal Master 3 Bus (bnc#1012382).
- cxgb4: Fix error codes in c4iw_create_cq() (bsc#1021424).
- cxl: Fix DAR check &amp; use REGION_ID instead of opencoding (bsc#1066223).
- cxl: Fix leaking pid refs in some error paths (bsc#1066223).
- cxl: Force context lock during EEH flow (bsc#1066223).
- cxl: Prevent adapter reset if an active context exists (bsc#1066223).
- cxl: Route eeh events to all drivers in cxl_pci_error_detected() (bsc#1066223).
- direct-io: Prevent NULL pointer access in submit_page_section (bnc#1012382).
- Disable patches.kernel.org/4.4.93-022-fix-unbalanced-page-refcounting-in-bio_map_use.patch (bsc#1070767)
- dmaengine: dmatest: warn user when dma test times out (bnc#1012382).
- dmaengine: edma: Align the memcpy acnt array size with the transfer (bnc#1012382).
- dmaengine: zx: set DMA_CYCLIC cap_mask bit (bnc#1012382).
- dm bufio: fix integer overflow when limiting maximum cache size (bnc#1012382).
- dm: fix race between dm_get_from_kobject() and __dm_destroy() (bnc#1012382).
- driver core: platform: Do not read past the end of 'driver_override' buffer (bnc#1012382).
- drivers: dma-mapping: Do not leave an invalid area-&gt;pages pointer in dma_common_contiguous_remap() (Git-fixes, bsc#1065692).
- drivers: firmware: psci: drop duplicate const from psci_of_match (bnc#1012382).
- drivers: hv: fcopy: restore correct transfer length (bnc#1012382).
- drm/amdgpu: when dpm disabled, also need to stop/start vce (bnc#1012382).
- drm/amdkfd: fix improper return value on error (bnc#1012382).
- drm/amdkfd: NULL dereference involving create_process() (bsc#1031717).
- drm: Apply range restriction after color adjustment when allocation (bnc#1012382).
- drm/armada: Fix compile fail (bnc#1012382).
- drm: bridge: add DT bindings for TI ths8135 (bnc#1012382).
- drm: drm_minor_register(): Clean up debugfs on failure (bnc#1012382).
- drm_fourcc: Fix DRM_FORMAT_MOD_LINEAR #define (bnc#1012382).
- drm: gma500: fix logic error (bsc#1031717).
- drm/i915/bios: ignore HDMI on port A (bnc#1012382).
- drm/i915/bxt: set min brightness from VBT (bsc#1031717).
- drm/i915: Do not try indexed reads to alternate slave addresses (bsc#1031717).
- drm/i915: fix backlight invert for non-zero minimum brightness (bsc#1031717).
- drm/i915: Prevent zero length 'index' write (bsc#1031717).
- drm/i915: Read timings from the correct transcoder in intel_crtc_mode_get() (bsc#1031717).
- drm/msm: fix an integer overflow test (bnc#1012382).
- drm/msm: Fix potential buffer overflow issue (bnc#1012382).
- drm/nouveau/bsp/g92: disable by default (bnc#1012382).
- drm/nouveau/gr: fallback to legacy paths during firmware lookup (bsc#1031717).
- drm/nouveau/mmu: flush tlbs before deleting page tables (bnc#1012382).
- drm/omap: Fix error handling path in 'omap_dmm_probe()' (bsc#1031717).
- drm/panel: simple: Add missing panel_simple_unprepare() calls (bsc#1031717).
- drm/sti: sti_vtg: Handle return NULL error from devm_ioremap_nocache (bnc#1012382).
- drm/vc4: Fix leak of HDMI EDID (bsc#1031717).
- drm/vmwgfx: Fix Ubuntu 17.10 Wayland black screen issue (bnc#1012382).
- e1000e: Fix error path in link detection (bnc#1012382).
- e1000e: Fix return value test (bnc#1012382).
- e1000e: Separate signaling for link check/link up (bnc#1012382).
- ecryptfs: fix dereference of NULL user_key_payload (bnc#1012382).
- eCryptfs: use after free in ecryptfs_release_messaging() (bsc#1012829).
- epoll: avoid calling ep_call_nested() from ep_poll_safewake() (bsc#1056427).
- epoll: remove ep_call_nested() from ep_eventpoll_poll() (bsc#1056427).
- ext4: cleanup goto next group (bsc#1066285).
- ext4: do not allow encrypted operations without keys (bnc#1012382). patches.drivers/0001-iwlwifi-nvm-fix-up-phy-section-when-reading-it.patch.
- ext4: do not use stripe_width if it is not set (bnc#1012382).
- ext4: fix interaction between i_size, fallocate, and delalloc after a crash (bnc#1012382).
- ext4: fix stripe-unaligned allocations (bnc#1012382).
- ext4: in ext4_seek_{hole,data}, return -ENXIO for negative offsets (bnc#1012382).
- ext4: reduce lock contention in __ext4_new_inode (bsc#1066285).
- extcon: axp288: Use vbus-valid instead of -present to determine cable presence (bnc#1012382).
- extcon: palmas: Check the parent instance to prevent the NULL (bnc#1012382).
- exynos4-is: fimc-is: Unmap region obtained by of_iomap() (bnc#1012382).
- exynos-gsc: Do not swap cb/cr for semi planar formats (bnc#1012382).
- f2fs crypto: add missing locking for keyring_key access (bnc#1012382).
- f2fs crypto: replace some BUG_ON()'s with error checks (bnc#1012382).
- f2fs: do not wait for writeback in write_begin (bnc#1012382).
- fealnx: Fix building error on MIPS (bnc#1012382).
- fix a page leak in vhost_scsi_iov_to_sgl() error recovery (bnc#1012382).
- Fix serial console on SNI RM400 machines (bsc#1031717).
- Fix tracing sample code warning (bnc#1012382).
- fix unbalanced page refcounting in bio_map_user_iov (bnc#1012382).
- fix whitespace according to upstream commit
- fm10k: request reset when mbx-&gt;state changes (bnc#1012382).
- fm10k: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- fs/9p: Compare qid.path in v9fs_test_inode (bsc#1012829).
- fs-cache: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: fix dereference of NULL user_key_payload (bnc#1012382).
- fscrypt: lock mutex before checking for bounce page pool (bnc#1012382).
- fscrypto: require write access to mount to set encryption policy (bnc#1012382).
- fs/epoll: cache leftmost node (bsc#1056427).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bnc#1012382).
- fuse: fix READDIRPLUS skipping an entry (bnc#1012382).
- gfs2: Fix reference to ERR_PTR in gfs2_glock_iter_next (bnc#1012382).
- gpu: drm: mgag200: mgag200_main:- Handle error from pci_iomap (bnc#1012382).
- hid: elo: clear BTN_LEFT mapping (bsc#1065866).
- hid: i2c-hid: allocate hid buffers for real worst case (bnc#1012382).
- hid: usbhid: fix out-of-bounds bug (bnc#1012382).
- hpsa: correct lun data caching bitmap definition (bsc#1028971).
- hsi: ssi_protocol: double free in ssip_pn_xmit() (bsc#1031717).
- hwmon: (gl520sm) Fix overflows and crash seen when writing into limit attributes (bnc#1012382).
- i2c: at91: ensure state is restored after suspending (bnc#1012382).
- i2c: cadance: fix ctrl/addr reg write order (bsc#1031717).
- i2c: imx: Use correct function to write to register (bsc#1031717).
- i2c: ismt: Separate I2C block read from SMBus block read (bnc#1012382).
- i2c: meson: fix wrong variable usage in meson_i2c_put_data (bnc#1012382).
- i2c: riic: correctly finish transfers (bnc#1012382).
- i2c: riic: fix restart condition (git-fixes).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40e: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40evf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- i40iw: Add missing memory barriers (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Fix port number for query QP (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Fix calculation of maximum RoCE MTU (bsc#1022595 FATE#322350).
- ib/core: Fix for core panic (bsc#1022595 FATE#322350).
- ib/core: Fix the validations of a multicast LID in attach or detach operations (bsc#1022595 FATE#322350).
- ib/core: Namespace is mandatory input for address resolution (bsc#1022595 FATE#322350).
- ib/i40iw: Fix error code in i40iw_create_cq() (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/ipoib: Change list_del to list_del_init in the tx object (bnc#1012382).
- ib/ipoib: Clean error paths in add port (bsc#1022595 FATE#322350).
- ib/ipoib: Fix deadlock over vlan_mutex (bnc#1012382).
- ib/ipoib: Prevent setting negative values to max_nonsrq_conn_qp (bsc#1022595 FATE#322350).
- ib/ipoib: Remove double pointer assigning (bsc#1022595 FATE#322350).
- ib/ipoib: Replace list_del of the neigh-&gt;list with list_del_init (bnc#1012382).
- ib/ipoib: rtnl_unlock can not come after free_netdev (bnc#1012382).
- ib/ipoib: Set IPOIB_NEIGH_TBL_FLUSH after flushed completion initialization (bsc#1022595 FATE#322350).
- ib/mlx5: Fix Raw Packet QP event handler assignment (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix RoCE Address Path fields (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Add netdev_dbg output for debugging (fate#323285).
- ibmvnic: Add vnic client data to login buffer (bsc#1069942).
- ibmvnic: Convert vnic server reported statistics to cpu endian (fate#323285).
- ibmvnic: Enable scatter-gather support (bsc#1066382).
- ibmvnic: Enable TSO support (bsc#1066382).
- ibmvnic: Feature implementation of Vital Product Data (VPD) for the ibmvnic driver (bsc#1069942).
- ibmvnic: Fix calculation of number of TX header descriptors (bsc#1066382).
- ibmvnic: fix dma_mapping_error call (bsc#1069942).
- ibmvnic: Fix failover error path for non-fatal resets (bsc#1066382).
- ibmvnic: Implement .get_channels (fate#323285).
- ibmvnic: Implement .get_ringparam (fate#323285).
- ibmvnic: Implement per-queue statistics reporting (fate#323285).
- ibmvnic: Let users change net device features (bsc#1066382).
- ibmvnic: Set state UP (bsc#1062962).
- ibmvnic: Update reset infrastructure to support tunable parameters (bsc#1066382).
- ib/qib: fix false-postive maybe-uninitialized warning (bnc#1012382).
- ib/srp: Avoid that a cable pull can trigger a kernel crash (bsc#1022595 FATE#322350).
- ib/srpt: Do not accept invalid initiator port names (bnc#1012382).
- ib/uverbs: Fix device cleanup (bsc#1022595 FATE#322350).
- ib/uverbs: Fix NULL pointer dereference during device removal (bsc#1022595 FATE#322350).
- igb: close/suspend race in netif_device_detach (bnc#1012382).
- igb: Fix hw_dbg logging in igb_update_flash_i210 (bnc#1012382).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382).
- igb: reset the PHY before reading the PHY ID (bnc#1012382).
- igb: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- igbvf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- iio: ad7793: Fix the serial interface reset (bnc#1012382).
- iio: adc: axp288: Drop bogus AXP288_ADC_TS_PIN_CTRL register modifications (bnc#1012382).
- iio: adc: hx711: Add DT binding for avia,hx711 (bnc#1012382).
- iio: adc: mcp320x: Fix oops on module unload (bnc#1012382).
- iio: adc: mcp320x: Fix readout of negative voltages (bnc#1012382).
- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: xilinx: Fix error handling (bnc#1012382).
- iio: ad_sigma_delta: Implement a dedicated reset function (bnc#1012382).
- iio: core: Return error for failed read_reg (bnc#1012382).
- iio: dummy: events: Add missing break (bsc#1031717).
- iio: light: fix improper return value (bnc#1012382).
- iio: trigger: free trigger resource correctly (bnc#1012382).
- ima: do not update security.ima if appraisal status is not INTEGRITY_PASS (bnc#1012382).
- input: ar1021_i2c - fix too long name in driver's device table (bsc#1031717).
- input: edt-ft5x06 - fix setting gain, offset, and threshold via device tree (bsc#1031717).
- input: elan_i2c - add ELAN060C to the ACPI table (bnc#1012382).
- input: elan_i2c - add ELAN0611 to the ACPI table (bnc#1012382).
- input: gtco - fix potential out-of-bound access (bnc#1012382).
- input: mpr121 - handle multiple bits change of status register (bnc#1012382).
- input: mpr121 - set missing event capability (bnc#1012382).
- input: ti_am335x_tsc - fix incorrect step config for 5 wire touchscreen (bsc#1031717).
- input: twl4030-pwrbutton - use correct device for irq request (bsc#1031717).
- input: ucb1400_ts - fix suspend and resume handling (bsc#1031717).
- input: uinput - avoid crash when sending FF request to device going away (bsc#1031717).
- iommu/amd: Finish TLB flush in amd_iommu_unmap() (bnc#1012382).
- iommu/arm-smmu-v3: Clear prior settings when updating STEs (bnc#1012382).
- iommu/io-pgtable-arm: Check for leaf entry before dereferencing it (bnc#1012382).
- iommu/vt-d: Do not register bus-notifier under dmar_global_lock (bsc#1069793).
- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (bnc#1012382).
- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (bnc#1012382).
- ipip: only increase err_count for some certain type icmp in ipip_err (bnc#1012382).
- ipmi: Disable IPMI fix patches due to regression (bsc#1071833)
- ipmi: fix unsigned long underflow (bnc#1012382).
- ipmi: Pick up slave address from SMBIOS on an ACPI device (bsc#1070006).
- ipmi: Prefer ACPI system interfaces over SMBIOS ones (bsc#1070006).
- ipmi_si: Clean up printks (bsc#1070006).
- ipmi_si: fix memory leak on new_smi (bsc#1070006).
- ipsec: do not ignore crypto err in ah4 input (bnc#1012382).
- ipv6: flowlabel: do not leave opt-&gt;tot_len with garbage (bnc#1012382).
- ipv6: only call ip6_route_dev_notify() once for NETDEV_UNREGISTER (bnc#1012382).
- ipvs: make drop_entry protection effective for SIP-pe (bsc#1056365).
- irqchip/crossbar: Fix incorrect type of local variables (bnc#1012382).
- isa: Prevent NULL dereference in isa_bus driver callbacks (bsc#1031717).
- iscsi-target: Fix non-immediate TMR reference leak (bnc#1012382).
- isdn/i4l: fetch the ppp_write buffer in one shot (bnc#1012382).
- isofs: fix timestamps beyond 2027 (bnc#1012382).
- iwlwifi: add workaround to disable wide channels in 5GHz (bnc#1012382).
- iwlwifi: mvm: fix the coex firmware API (bsc#1031717).
- iwlwifi: mvm: return -ENODATA when reading the temperature with the FW down (bsc#1031717).
- iwlwifi: mvm: set the RTS_MIMO_PROT bit in flag mask when sending sta to fw (bsc#1031717).
- iwlwifi: mvm: use IWL_HCMD_NOCOPY for MCAST_FILTER_CMD (bnc#1012382).
- iwlwifi: split the regulatory rules when the bandwidth flags require it (bsc#1031717).
- ixgbe: add mask for 64 RSS queues (bnc#1012382).
- ixgbe: do not disable FEC from the driver (bnc#1012382).
- ixgbe: fix AER error handling (bnc#1012382).
- ixgbe: Fix incorrect bitwise operations of PTP Rx timestamp flags (bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- ixgbe: Fix skb list corruption on Power systems (bnc#1012382).
- ixgbe: handle close/suspend race with netif_device_detach/present (bnc#1012382).
- ixgbe: Reduce I2C retry count on X550 devices (bnc#1012382).
- ixgbevf: Use smp_rmb rather than read_barrier_depends (bnc#1012382).
- kABI: protect struct l2tp_tunnel (kabi).
- kABI: protect struct regulator_dev (kabi).
- kABI: protect struct rm_data_op (kabi).
- kABI: protect struct sdio_func (kabi).
- kABI: protect structs rt_rq+root_domain (kabi).
- kABI: protect typedef rds_rdma_cookie_t (kabi).
- kernel-docs: unpack the source instead of using kernel-source (bsc#1057199).
- kernel/sysctl.c: remove duplicate UINT_MAX check on do_proc_douintvec_conv() (bsc#1066470).
- kernel/watchdog: Prevent false positives with turbo modes (bnc#1063516).
- keys: do not let add_key() update an uninstantiated key (bnc#1012382).
- keys: do not revoke uninstantiated key in request_key_auth_new() (bsc#1031717).
- keys: encrypted: fix dereference of NULL user_key_payload (bnc#1012382).
- keys: fix cred refcount leak in request_key_auth_new() (bsc#1031717).
- keys: fix key refcount leak in keyctl_assume_authority() (bsc#1031717).
- keys: fix key refcount leak in keyctl_read_key() (bsc#1031717).
- keys: fix NULL pointer dereference during ASN.1 parsing [ver #2] (bnc#1012382).
- keys: fix out-of-bounds read during ASN.1 parsing (bnc#1012382).
- keys: Fix race between updating and finding a negative key (bnc#1012382).
- keys: return full count in keyring_read() if buffer is too small (bnc#1012382).
- keys: trusted: fix writing past end of buffer in trusted_read() (bnc#1012382).
- keys: trusted: sanitize all key material (bnc#1012382).
- kvm: nVMX: fix guest CR4 loading when emulating L2 to L1 exit (bnc#1012382).
- kvm: nVMX: set IDTR and GDTR limits when loading L1 host state (bnc#1012382).
- kvm: PPC: Book 3S: XICS: correct the real mode ICP rejecting counter (bnc#1012382).
- kvm: SVM: obey guest PAT (bnc#1012382).
- l2tp: Avoid schedule while atomic in exit_net (bnc#1012382).
- l2tp: check ps-&gt;sock before running pppol2tp_session_ioctl() (bnc#1012382).
- l2tp: fix race condition in l2tp_tunnel_delete (bnc#1012382).
- libata: transport: Remove circular dependency at free time (bnc#1012382).
- lib/digsig: fix dereference of NULL user_key_payload (bnc#1012382).
- libertas: Fix lbs_prb_rsp_limit_set() (bsc#1031717).
- lib/mpi: call cond_resched() from mpi_powm() loop (bnc#1012382).
- libnvdimm, namespace: fix label initialization to use valid seq numbers (bnc#1012382).
- libnvdimm, namespace: make 'resource' attribute only readable by root (bnc#1012382).
- libnvdimm, pfn: make 'resource' attribute only readable by root (FATE#319858).
- lib/ratelimit.c: use deferred printk() version (bsc#979928).
- locking/lockdep: Add nest_lock integrity test (bnc#1012382).
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bnc#1012382).
- mac80211: agg-tx: call drv_wake_tx_queue in proper context (bsc#1031717).
- mac80211: do not compare TKIP TX MIC key in reinstall prevention (bsc#1066472).
- mac80211: do not send SMPS action frame in AP mode when not needed (bsc#1031717).
- mac80211: Fix addition of mesh configuration element (git-fixes).
- mac80211: Fix BW upgrade for TDLS peers (bsc#1031717).
- mac80211: fix mgmt-tx abort cookie and leak (bsc#1031717).
- mac80211: fix power saving clients handling in iwlwifi (bnc#1012382).
- mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length (bnc#1012382).
- mac80211_hwsim: Fix memory leak in hwsim_new_radio_nl() (bsc#1031717).
- mac80211: Remove invalid flag operations in mesh TSF synchronization (bnc#1012382).
- mac80211: Remove unused 'beaconint_us' variable (bsc#1031717).
- mac80211: Remove unused 'i' variable (bsc#1031717).
- mac80211: Remove unused 'len' variable (bsc#1031717).
- mac80211: Remove unused 'rates_idx' variable (bsc#1031717).
- mac80211: Remove unused 'sband' and 'local' variables (bsc#1031717).
- mac80211: Remove unused 'struct ieee80211_rx_status' ptr (bsc#1031717).
- mac80211: Suppress NEW_PEER_CANDIDATE event if no room (bnc#1012382).
- mac80211: TDLS: always downgrade invalid chandefs (bsc#1031717).
- mac80211: TDLS: change BW calculation for WIDER_BW peers (bsc#1031717).
- mac80211: use constant time comparison with keys (bsc#1066471).
- md/linear: shutup lockdep warnning (bnc#1012382).
- md/raid10: submit bio directly to replacement disk (bnc#1012382).
- media: au0828: fix RC_CORE dependency (bsc#1031717).
- media: Do not do DMA on stack for firmware upload in the AS102 driver (bnc#1012382).
- media: em28xx: calculate left volume level correctly (bsc#1031717).
- media: mceusb: fix memory leaks in error path (bsc#1031717).
- media: rc: check for integer overflow (bnc#1012382).
- media: v4l2-ctrl: Fix flags field on Control events (bnc#1012382).
- megaraid_sas: Do not fire MR_DCMD_PD_LIST_QUERY to controllers which do not support it (bsc#1027301).
- mei: return error on notification request to a disconnected client (bnc#1012382).
- mfd: ab8500-sysctrl: Handle probe deferral (bnc#1012382).
- mfd: axp20x: Fix axp288 PEK_DBR and PEK_DBF irqs being swapped (bnc#1012382).
- misc: panel: properly restore atomic counter on error path (bnc#1012382).
- mlx5: Avoid that mlx5_ib_sg_to_klms() overflows the klms array (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- mm/backing-dev.c: fix an error handling path in 'cgwb_create()' (bnc#1063475).
- mmc: block: return error on failed mmc_blk_get() (bsc#1031717).
- mmc: core/mmci: restore pre/post_req behaviour (bsc#1031717).
- mmc: dw_mmc: rockchip: Set the drive phase properly (bsc#1031717).
- mm: check the return value of lookup_page_ext for all call sites (bnc#1068982).
- mmc: host: omap_hsmmc: avoid possible overflow of timeout value (bsc#1031717).
- mmc: host: omap_hsmmc: checking for NULL instead of IS_ERR() (bsc#1031717).
- mmc: mediatek: Fixed size in dma_free_coherent (bsc#1031717).
- mm,compaction: serialize waitqueue_active() checks (for real) (bsc#971975).
- mmc: s3cmci: include linux/interrupt.h for tasklet_struct (bnc#1012382).
- mmc: sdio: fix alignment issue in struct sdio_func (bnc#1012382).
- mmc: sd: limit SD card power limit according to cards capabilities (bsc#1031717).
- mm: discard memblock data later (bnc#1063460).
- mm, hwpoison: fixup 'mm: check the return value of lookup_page_ext for all call sites' (bnc#1012382).
- mm/madvise.c: fix madvise() infinite loop under special circumstances (bnc#1070964).
- mm/memblock.c: reversed logic in memblock_discard() (bnc#1063460).
- mm: meminit: mark init_reserved_page as __meminit (bnc#1063509).
- mm/memory_hotplug: change pfn_to_section_nr/section_nr_to_pfn macro to inline function (bnc#1063501).
- mm/memory_hotplug: define find_{smallest|biggest}_section_pfn as unsigned long (bnc#1063520).
- mm/page_alloc.c: broken deferred calculation (bnc#1068980).
- mm, page_alloc: fix potential false positive in __zone_watermark_ok (Git-fixes, bsc#1068978).
- mm/page_ext.c: check if page_ext is not prepared (bnc#1068982).
- mm/page_owner: avoid null pointer dereference (bnc#1068982).
- mm/pagewalk.c: report holes in hugetlb ranges (bnc#1012382).
- net: 3com: typhoon: typhoon_init_one: fix incorrect return values (bnc#1012382).
- net: 3com: typhoon: typhoon_init_one: make return values more specific (bnc#1012382).
- net/9p: Switch to wait_event_killable() (bnc#1012382).
- net: Allow IP_MULTICAST_IF to set index to L3 slave (bnc#1012382).
- net: cdc_ether: fix divide by 0 on bad descriptors (bnc#1012382).
- net: cdc_ncm: GetNtbFormat endian fix (git-fixes).
- net: core: Prevent from dereferencing null pointer when releasing SKB (bnc#1012382).
- net: dsa: select NET_SWITCHDEV (bnc#1012382).
- net: emac: Fix napi poll list corruption (bnc#1012382).
- netfilter: invoke synchronize_rcu after set the _hook_ to NULL (bnc#1012382).
- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (bnc#1012382).
- netfilter: nf_ct_expect: Change __nf_ct_expect_check() return value (bnc#1012382).
- netfilter: nfnl_cthelper: fix incorrect helper-&gt;expect_class_max (bnc#1012382).
- netfilter: nf_tables: fix oob access (bnc#1012382).
- netfilter: nft_meta: deal with PACKET_LOOPBACK in netdev family (bnc#1012382).
- netfilter: nft_queue: use raw_smp_processor_id() (bnc#1012382).
- net: ibm: ibmvnic: constify vio_device_id (fate#323285).
- net/mlx4_core: Enable 4K UAR if SRIOV module parameter is not enabled (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bnc#1012382).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bnc#1012382).
- net/mlx5e: Fix wrong delay calculation for overflow check scheduling (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Schedule overflow check work to mlx5e workqueue (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Skip mlx5_unload_one if mlx5_load_one fails (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: mvpp2: release reference to txq_cpu[] entry after unmapping (bnc#1012382).
- net/packet: check length in getsockopt() called with PACKET_HDRLEN (bnc#1012382).
- net: qmi_wwan: fix divide by 0 on bad descriptors (bnc#1012382).
- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (bnc#1012382).
- net: Set sk_prot_creator when cloning sockets to the right proto (bnc#1012382).
- net/unix: do not show information about sockets from other namespaces (bnc#1012382).
- nfc: fix device-allocation error return (bnc#1012382).
- nfsd/callback: Cleanup callback cred on shutdown (bnc#1012382).
- nfsd: deal with revoked delegations appropriately (bnc#1012382).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Fix typo in nomigration mount option (bnc#1012382).
- nfs: Fix ugly referral attributes (bnc#1012382).
- nilfs2: fix race condition that causes file system corruption (bnc#1012382).
- nl80211: Define policy for packet pattern attributes (bnc#1012382).
- nvme: Fix memory order on async queue deletion (bnc#1012382).
- nvme: protect against simultaneous shutdown invocations (FATE#319965 bnc#1012382 bsc#964944).
- ocfs2: fstrim: Fix start offset of first cluster group during fstrim (bnc#1012382).
- ocfs2: should wait dio before inode lock in ocfs2_setattr() (bnc#1012382).
- packet: avoid panic in packet_getsockopt() (bnc#1012382).
- packet: only test po-&gt;has_vnet_hdr once in packet_snd (bnc#1012382).
- parisc: Avoid trashing sr2 and sr3 in LWS code (bnc#1012382).
- parisc: Fix double-word compare and exchange in LWS code on 32-bit kernels (bnc#1012382).
- parisc: Fix validity check of pointer size argument in new CAS implementation (bnc#1012382).
- parisc: perf: Fix potential NULL pointer dereference (bnc#1012382).
- partitions/efi: Fix integer overflow in GPT size calculation (bnc#1012382).
- pci: Apply _HPX settings only to relevant devices (bnc#1012382).
- pci: mvebu: Handle changes to the bridge windows while enabled (bnc#1012382).
- percpu: make this_cpu_generic_read() atomic w.r.t. interrupts (bnc#1012382).
- perf tools: Fix build failure on perl script context (bnc#1012382).
- perf tools: Only increase index if perf_evsel__new_idx() succeeds (bnc#1012382).
- perf/x86/intel/bts: Fix exclusive event reference leak (git-fixes d2878d642a4ed).
- phy: increase size of MII_BUS_ID_SIZE and bus_id (bnc#1012382).
- pkcs#7: fix unitialized boolean 'want' (bnc#1012382).
- pkcs7: Prevent NULL pointer dereference, since sinfo is not always set (bnc#1012382).
- platform/x86: acer-wmi: setup accelerometer when ACPI device was found (bsc#1031717).
- platform/x86: hp-wmi: Do not shadow error values (bnc#1012382).
- platform/x86: hp-wmi: Fix detection for dock and tablet mode (bnc#1012382).
- platform/x86: hp-wmi: Fix error value for hp_wmi_tablet_state (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix module autoload (bnc#1012382).
- platform/x86: sony-laptop: Fix error handling in sony_nc_setup_rfkill() (bsc#1031717).
- pm / OPP: Add missing of_node_put(np) (bnc#1012382).
- power: bq27xxx_battery: Fix bq27541 AveragePower register address (bsc#1031717).
- power: bq27xxx: fix reading for bq27000 and bq27010 (bsc#1031717).
- powerCap: Fix an error code in powercap_register_zone() (bsc#1031717).
- power: ipaq-micro-battery: freeing the wrong variable (bsc#1031717).
- powerpc/64: Fix race condition in setting lock bit in idle/wakeup code (bsc#1066223).
- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1066223).
- powerpc/corenet: explicitly disable the SDHC controller on kmcoge4 (bnc#1012382).
- powerpc: Correct instruction code for xxlor instruction (bsc#1066223).
- powerpc: Fix VSX enabling/flushing to also test MSR_FP and MSR_VEC (bsc#1066223).
- powerpc/mm: Fix check of multiple 16G pages from device tree (bsc#1066223).
- powerpc/mm: Fix virt_addr_valid() etc. on 64-bit hash (bsc#1066223).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, bsc#1066223).
- powerpc/mm/hash: Free the subpage_prot_table correctly (bsc#1066223).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1066223).
- powerpc/numa: Fix whitespace in hot_add_drconf_memory_max() (bsc#1066223).
- powerpc/opal: Fix EBUSY bug in acquiring tokens (bsc#1066223).
- powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8 (bsc#1066223).
- powerpc/powernv/ioda: Fix endianness when reading TCEs (bsc#1066223).
- powerpc/powernv: Make opal_event_shutdown() callable from IRQ context (bsc#1066223).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).
- powerpc/pseries/vio: Dispose of virq mapping on vdevice unregister (bsc#1067888).
- powerpc/signal: Properly handle return value from uprobe_deny_signal() (bsc#1066223).
- powerpc/sysrq: Fix oops whem ppmu is not registered (bsc#1066223).
- power: supply: bq27xxx_battery: Fix register map for BQ27510 and BQ27520 ('bsc#1069270').
- power: supply: isp1704: Fix unchecked return value of devm_kzalloc (bsc#1031717).
- power: supply: lp8788: prevent out of bounds array access (bsc#1031717).
- power_supply: tps65217-charger: Fix NULL deref during property export (bsc#1031717).
- ppp: fix race in ppp device destruction (bnc#1012382).
- printk/console: Always disable boot consoles that use init memory before it is freed (bsc#1063026).
- printk/console: Enhance the check for consoles using init memory (bsc#1063026).
- printk: include &lt;asm/sections.h&gt; instead of &lt;asm-generic/sections.h&gt; (bsc#1063026).
- printk: only unregister boot consoles when necessary (bsc#1063026).
- qed: Fix stack corruption on probe (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- quota: Check for register_shrinker() failure (bsc#1012829).
- r8169: Do not increment tx_dropped in TX ring cleaning (bsc#1031717).
- rbd: use GFP_NOIO for parent stat and data requests (bnc#1012382).
- rcu: Allow for page faults in NMI handlers (bnc#1012382).
- rdma/uverbs: Prevent leak of reserved field (bsc#1022595 FATE#322350).
- rds: ib: add error handle (bnc#1012382).
- rds: rdma: Fix the composite message user notification (bnc#1012382).
- rds: rdma: return appropriate error on rdma map failures (bnc#1012382).
- regulator: core: Limit propagation of parent voltage count and list (bsc#1070145).
- regulator: fan53555: fix I2C device ids (bnc#1012382).
- Revert 'bpf: one perf event close won't free bpf program attached by another perf event' (kabi).
- Revert 'bsg-lib: do not free job in bsg_prepare_job' (bnc#1012382).
- Revert 'crypto: xts - Add ECB dependency' (bnc#1012382).
- Revert 'drm: bridge: add DT bindings for TI ths8135' (bnc#1012382).
- Revert 'KEYS: Fix race between updating and finding a negative key' (kabi).
- Revert 'phy: increase size of MII_BUS_ID_SIZE and bus_id' (kabi).
- Revert 'sctp: do not peel off an assoc from one netns to another one' (bnc#1012382).
- Revert 'tty: goldfish: Fix a parameter of a call to free_irq' (bnc#1012382).
- Revert 'uapi: fix linux/rds.h userspace compilation errors' (bnc#1012382).
- rpm/kernel-binary.spec.in: add the kernel-binary dependencies to kernel-binary-base (bsc#1060333).
- rpm/kernel-binary.spec.in: Correct supplements for recent SLE products (bsc#1067494)
- rpm/kernel-binary.spec.in: only rewrite modules.dep if non-zero in size (bsc#1056979).
- rtc: ds1307: Fix relying on reset value for weekday (bsc#1031717).
- rtc: ds1374: wdt: Fix issue with timeout scaling from secs to wdt ticks (bsc#1031717).
- rtc: ds1374: wdt: Fix stop/start ioctl always returning -EINVAL (bsc#1031717).
- rtc: rtc-nuc900: fix loop timeout test (bsc#1031717).
- rtc: sa1100: fix unbalanced clk_prepare_enable/clk_disable_unprepare (bsc#1031717).
- rtlwifi: fix uninitialized rtlhal-&gt;last_suspend_sec time (bnc#1012382).
- rtlwifi: rtl8192ee: Fix memory leak when loading firmware (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem (bnc#1012382).
- rtlwifi: rtl8821ae: Fix HW_VAR_NAV_UPPER operation (bsc#1031717).
- s390/dasd: check for device error pointer within state change interrupts (bnc#1012382).
- s390/disassembler: add missing end marker for e7 table (bnc#1012382).
- s390/disassembler: correct disassembly lines alignment (bsc#1070825).
- s390/disassembler: increase show_code buffer size (bnc#1012382).
- s390: fix transactional execution control register handling (bnc#1012382).
- s390/kbuild: enable modversions for symbols exported from asm (bnc#1012382).
- s390/qeth: issue STARTLAN as first IPA command (bnc#1012382).
- s390/runtime instrumention: fix possible memory corruption (bnc#1012382).
- sched/autogroup: Fix autogroup_move_group() to never skip sched_move_task() (bnc#1012382).
- sched/cpuset/pm: Fix cpuset vs. suspend-resume bugs (bnc#1012382).
- sched: Make resched_cpu() unconditional (bnc#1012382).
- sched/rt: Simplify the IPI based RT balancing logic (bnc#1012382).
- scsi: aacraid: Process Error for response I/O (bnc#1012382).
- scsi_devinfo: cleanly zero-pad devinfo strings (bsc#1062941).
- scsi: hpsa: add 'ctlr_num' sysfs attribute (bsc#1028971).
- scsi: hpsa: bump driver version (bsc#1022600 fate#321928).
- scsi: hpsa: change driver version (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: Check for null device pointers (bsc#1028971).
- scsi: hpsa: Check for null devices in ioaccel (bsc#1028971).
- scsi: hpsa: Check for vpd support before sending (bsc#1028971).
- scsi: hpsa: cleanup reset handler (bsc#1022600 fate#321928).
- scsi: hpsa: correct call to hpsa_do_reset (bsc#1028971).
- scsi: hpsa: correct logical resets (bsc#1028971).
- scsi: hpsa: correct queue depth for externals (bsc#1022600 fate#321928).
- scsi: hpsa: correct resets on retried commands (bsc#1022600 fate#321928).
- scsi: hpsa: correct scsi 6byte lba calculation (bsc#1028971).
- scsi: hpsa: Determine device external status earlier (bsc#1028971).
- scsi: hpsa: do not get enclosure info for external devices (bsc#1022600 fate#321928).
- scsi: hpsa: do not reset enclosures (bsc#1022600 fate#321928).
- scsi: hpsa: do not timeout reset operations (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: fallback to use legacy REPORT PHYS command (bsc#1028971).
- scsi: hpsa: fix volume offline state (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: limit outstanding rescans (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: Prevent sending bmic commands to externals (bsc#1028971).
- scsi: hpsa: remove abort handler (bsc#1022600 fate#321928).
- scsi: hpsa: remove coalescing settings for ioaccel2 (bsc#1028971).
- scsi: hpsa: remove memory allocate failure message (bsc#1028971).
- scsi: hpsa: Remove unneeded void pointer cast (bsc#1028971).
- scsi: hpsa: rescan later if reset in progress (bsc#1022600 fate#321928).
- scsi: hpsa: send ioaccel requests with 0 length down raid path (bsc#1022600 fate#321928).
- scsi: hpsa: separate monitor events from rescan worker (bsc#1022600 fate#321928).
- scsi: hpsa: update check for logical volume status (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: update identify physical device structure (bsc#1022600 fate#321928).
- scsi: hpsa: update pci ids (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: update reset handler (bsc#1022600 fate#321928).
- scsi: hpsa: use designated initializers (bsc#1028971).
- scsi: hpsa: use %phN for short hex dumps (bsc#1028971).
- scsi: ipr: Fix scsi-mq lockdep issue (bsc#1066213).
- scsi: ipr: Set no_report_opcodes for RAID arrays (bsc#1066213).
- scsi: libfc: fix a deadlock in fc_rport_work (bsc#1063695).
- scsi: libiscsi: fix shifting of DID_REQUEUE host byte (bsc#1056003).
- scsi: lpfc: Add missing memory barrier (bnc#1012382).
- scsi: lpfc: Clear the VendorVersion in the PLOGI/PLOGI ACC payload (bnc#1012382).
- scsi: lpfc: Correct host name in symbolic_name field (bnc#1012382).
- scsi: lpfc: Correct issue leading to oops during link reset (bnc#1012382).
- scsi: lpfc: FCoE VPort enable-disable does not bring up the VPort (bnc#1012382).
- scsi: reset wait for IO completion (bsc#996376).
- scsi: scsi_devinfo: fixup string compare (bsc#1062941). updated patches.fixes/scsi_devinfo-fixup-string-compare.patch to the version merged upstream.
- scsi: scsi_devinfo: handle non-terminated strings (bsc#1062941).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (bnc#1012382).
- scsi: scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add() (bsc#1037890).
- scsi: scsi_transport_fc: set scsi_target_id upon rescan (bsc#1058135).
- scsi: sd: Do not override max_sectors_kb sysfs setting (bsc#1025461).
- scsi: sd: Remove LBPRZ dependency for discards (bsc#1060985).
- scsi: sg: close race condition in sg_remove_sfp_usercontext() (bsc#1064206).
- scsi: sg: do not return bogus Sg_requests (bsc#1064206).
- scsi: sg: only check for dxfer_len greater than 256M (bsc#1064206).
- scsi: sg: Re-fix off by one in sg_fill_request_table() (bnc#1012382).
- scsi: ufs: add capability to keep auto bkops always enabled (bnc#1012382).
- scsi: ufs-qcom: Fix module autoload (bnc#1012382).
- scsi: virtio_scsi: let host do exception handling (bsc#1060682).
- scsi: zfcp: fix erp_action use-before-initialize in REC action trace (bnc#1012382).
- sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: do not peel off an assoc from one netns to another one (bnc#1012382).
- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (bnc#1012382).
- sctp: reset owner sk for data chunks on out queues when migrating a sock (bnc#1012382).
- security/keys: add CONFIG_KEYS_COMPAT to Kconfig (bnc#1012382).
- selftests: firmware: add empty string and async tests (bnc#1012382).
- selftests: firmware: send expected errors to /dev/null (bnc#1012382).
- serial: 8250_fintek: Fix rs485 disablement on invalid ioctl() (bsc#1031717).
- serial: 8250_uniphier: fix serial port index in private data (bsc#1031717).
- serial: omap: Fix EFR write on RTS deassertion (bnc#1012382).
- serial: Remove unused port type (bsc#1066045).
- serial: sh-sci: Fix register offsets for the IRDA serial port (bnc#1012382).
- sh_eth: use correct name for ECMR_MPDE bit (bnc#1012382).
- slub: do not merge cache if slub_debug contains a never-merge flag (bnc#1012382).
- smb3: parsing for new snapshot timestamp mount parm (FATE#324404). New mount option 'snapshot=&lt;time&gt;' to allow mounting an earlier version of the remote volume (if such a snapshot exists on the server). Note that eventually specifying a snapshot time of 1 will allow the user to mount the oldest snapshot. A subsequent patch add the processing for that and another for actually specifying the 'time warp' create context on SMB2/SMB3 open. Check to make sure SMB2 negotiated, and ensure that we use a different tcon if mount same share twice but with different snaphshot times
- sparc64: Migrate hvcons irq to panicked cpu (bnc#1012382).
- spi: SPI_FSL_DSPI should depend on HAS_DMA (bnc#1012382).
- spi: uapi: spidev: add missing ioctl header (bnc#1012382).
- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bnc#1012382).
- staging: iio: cdc: fix improper return value (bnc#1012382).
- staging: lustre: hsm: stack overrun in hai_dump_data_field (bnc#1012382).
- staging: lustre: llite: do not invoke direct_IO for the EOF case (bnc#1012382).
- staging: lustre: ptlrpc: skip lock if export failed (bnc#1012382).
- staging: r8712u: Fix Sparse warning in rtl871x_xmit.c (bnc#1012382).
- staging: rtl8188eu: fix incorrect ERROR tags from logs (bnc#1012382).
- staging: rtl8712: fixed little endian problem (bnc#1012382).
- staging: rtl8712u: Fix endian settings for structs describing network packets (bnc#1012382).
- stm class: Fix a use-after-free (bnc#1012382).
- sunrpc: Fix tracepoint storage issues with svc_recv and svc_rqst_status (bnc#1012382).
- supported.conf: mark hid-multitouch as supported (FATE#323670)
- target: fix ALUA state file path truncation (bsc#1071231).
- target: Fix node_acl demo-mode + uncached dynamic shutdown regression (bnc#1012382).
- target: fix PR state file path truncation (bsc#1071231).
- target: Fix QUEUE_FULL + SCSI task attribute handling (bnc#1012382).
- target/iscsi: Fix iSCSI task reassignment handling (bnc#1012382).
- target/iscsi: Fix unsolicited data seq_end_offset calculation (bnc#1012382).
- tcp/dccp: fix ireq-&gt;opt races (bnc#1012382).
- tcp/dccp: fix lockdep splat in inet_csk_route_req() (bnc#1012382).
- tcp/dccp: fix other lockdep splats accessing ireq_opt (bnc#1012382).
- tcp: do not mangle skb-&gt;cb[] in tcp_make_synack() (bnc#1012382).
- tcp: fix tcp_mtu_probe() vs highest_sack (bnc#1012382).
- team: call netdev_change_features out of team lock (bsc#1055567).
- team: fix memory leaks (bnc#1012382).
- test: firmware_class: report errors properly on failure (bnc#1012382).
- timer: Prevent timer value 0 for MWAITX (bsc#1065717).
- tipc: fix link attribute propagation bug (bnc#1012382).
- tipc: use only positive error codes in messages (bnc#1012382).
- tools: firmware: check for distro fallback udev cancel rule (bnc#1012382).
- tpm_tis: Do not fall back to a hardcoded address for TPM2 (bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048).
- tracing/samples: Fix creation and deletion of simple_thread_fn creation (bnc#1012382).
- ttpci: address stringop overflow warning (bnc#1012382).
- tty: goldfish: Fix a parameter of a call to free_irq (bnc#1012382).
- tun: allow positive return values on dev_get_valid_name() call (bnc#1012382).
- tun: bail out from tun_get_user() if the skb is empty (bnc#1012382).
- tun: call dev_get_valid_name() before register_netdevice() (bnc#1012382).
- tun/tap: sanitize TUNSETSNDBUF input (bnc#1012382).
- uapi: fix linux/mroute6.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation error (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- uapi: fix linux/rds.h userspace compilation errors (bnc#1012382).
- udpv6: Fix the checksum computation when HW checksum does not apply (bnc#1012382).
- usb: Add delay-init quirk for Corsair K70 LUX keyboards (bnc#1012382).
- usb: cdc_acm: Add quirk for Elatec TWN3 (bnc#1012382).
- usb: chipidea: vbus event may exist before starting gadget (bnc#1012382).
- usb: core: fix out-of-bounds access bug in usb_get_bos_descriptor() (bnc#1012382).
- usb: core: harden cdc_parse_cdc_header (bnc#1012382).
- usb: devio: Do not corrupt user memory (bnc#1012382).
- usb: devio: Revert 'USB: devio: Do not corrupt user memory' (bnc#1012382).
- usb: dummy-hcd: fix connection failures (wrong speed) (bnc#1012382).
- usb: dummy-hcd: Fix deadlock caused by disconnect detection (bnc#1012382).
- usb: dummy-hcd: Fix erroneous synchronization change (bnc#1012382).
- usb: dummy-hcd: fix infinite-loop resubmission bug (bnc#1012382).
- usb: fix out-of-bounds in usb_set_configuration (bnc#1012382).
- usb: gadget: composite: Fix use-after-free in usb_composite_overwrite_options (bnc#1012382).
- usb: gadgetfs: fix copy_to_user while holding spinlock (bnc#1012382).
- usb: gadgetfs: Fix crash caused by inadequate synchronization (bnc#1012382).
- usb: gadget: inode.c: fix unbalanced spin_lock in ep0_write (bnc#1012382).
- usb: gadget: mass_storage: set msg_registered after msg registered (bnc#1012382).
- usb: gadget: udc: atmel: set vbus irqflags explicitly (bnc#1012382).
- usb: g_mass_storage: Fix deadlock when driver is unbound (bnc#1012382).
- usb: hcd: initialize hcd-&gt;flags to 0 when rm hcd (bnc#1012382).
- usb: hub: Allow reset retry for USB2 devices on connect bounce (bnc#1012382).
- usb: Increase quirk delay for USB devices (bnc#1012382).
- usb: musb: Check for host-mode using is_host_active() on reset interrupt (bnc#1012382).
- usb: musb: sunxi: Explicitly release USB PHY on exit (bnc#1012382).
- usb: pci-quirks.c: Corrected timeout values used in handshake (bnc#1012382).
- usb: plusb: Add support for PL-27A1 (bnc#1012382).
- usb: quirks: add quirk for WORLDE MINI MIDI keyboard (bnc#1012382).
- usb: renesas_usbhs: Fix DMAC sequence for receiving zero-length packet (bnc#1012382).
- usb: renesas_usbhs: fix the BCLR setting condition for non-DCP pipe (bnc#1012382).
- usb: renesas_usbhs: fix usbhsf_fifo_clear() for RX direction (bnc#1012382).
- usb: serial: console: fix use-after-free after failed setup (bnc#1012382).
- usb: serial: cp210x: add support for ELV TFD500 (bnc#1012382).
- usb: serial: ftdi_sio: add id for Cypress WICED dev board (bnc#1012382).
- usb: serial: garmin_gps: fix I/O after failed probe and remove (bnc#1012382).
- usb: serial: garmin_gps: fix memory leak on probe errors (bnc#1012382).
- usb: serial: metro-usb: add MS7820 device id (bnc#1012382).
- usb: serial: mos7720: fix control-message error handling (bnc#1012382).
- usb: serial: mos7840: fix control-message error handling (bnc#1012382).
- usb: serial: option: add support for TP-Link LTE module (bnc#1012382).
- usb: serial: qcserial: add Dell DW5818, DW5819 (bnc#1012382).
- usb: serial: qcserial: add pid/vid for Sierra Wireless EM7355 fw update (bnc#1012382).
- usb-storage: unusual_devs entry to fix write-access regression for Seagate external drives (bnc#1012382).
- usb: uas: fix bug in handling of alternate settings (bnc#1012382).
- usb: usbfs: compute urb-&gt;actual_length for isochronous (bnc#1012382).
- usb: usbtest: fix NULL pointer dereference (bnc#1012382).
- usb: xhci: Handle error condition in xhci_stop_device() (bnc#1012382).
- uwb: ensure that endpoint is interrupt (bnc#1012382).
- uwb: properly check kthread_run return value (bnc#1012382).
- vfs: expedite unmount (bsc#1024412).
- video: fbdev: pmag-ba-fb: Remove bad `__init' annotation (bnc#1012382).
- video: udlfb: Fix read EDID timeout (bsc#1031717).
- vlan: fix a use-after-free in vlan_device_event() (bnc#1012382).
- vsock: use new wait API for vsock_stream_sendmsg() (bnc#1012382).
- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bnc#1012382).
- watchdog: kempld: fix gcc-4.3 build (bnc#1012382).
- workqueue: Fix NULL pointer dereference (bnc#1012382).
- workqueue: replace pool-&gt;manager_arb mutex with a flag (bnc#1012382).
- x86/alternatives: Fix alt_max_short macro to really be a max() (bnc#1012382).
- x86/decoder: Add new TEST instruction pattern (bnc#1012382).
- x86/MCE/AMD: Always give panic severity for UC errors in kernel context (git-fixes bf80bbd7dcf5).
- x86/microcode/AMD: Add support for fam17h microcode loading (bsc#1068032).
- x86/microcode/intel: Disable late loading on model 79 (bnc#1012382).
- x86/oprofile/ppro: Do not use __this_cpu*() in preemptible context (bnc#1012382).
- x86/uaccess, sched/preempt: Verify access_ok() context (bnc#1012382).
- xen: do not print error message in case of missing Xenstore entry (bnc#1012382).
- xen/events: events_fifo: Do not use {get,put}_cpu() in xen_evtchn_fifo_init() (bnc#1065600).
- xen: fix booting ballooned down hvm guest (bnc#1065600).
- xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1012382).
- xen/manage: correct return value check on xenbus_scanf() (bnc#1012382).
- xen-netback: fix error handling output (bnc#1065600).
- xen: x86: mark xen_find_pt_base as __init (bnc#1065600).
- xen: xenbus driver must not accept invalid transaction ids (bnc#1012382).
- xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
- xfs: remove kmem_zalloc_greedy (bnc#1012382).
- xhci: fix finding correct bus_state structure for USB 3.1 hosts (bnc#1012382).
- zd1211rw: fix NULL-deref at probe (bsc#1031717).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-21"/>
	<updated date="2017-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010201">SUSE bug 1010201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017461">SUSE bug 1017461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020645">SUSE bug 1020645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021424">SUSE bug 1021424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022595">SUSE bug 1022595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022600">SUSE bug 1022600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022914">SUSE bug 1022914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024412">SUSE bug 1024412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025461">SUSE bug 1025461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027301">SUSE bug 1027301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028971">SUSE bug 1028971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030061">SUSE bug 1030061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034048">SUSE bug 1034048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037890">SUSE bug 1037890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050060">SUSE bug 1050060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055567">SUSE bug 1055567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056003">SUSE bug 1056003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056365">SUSE bug 1056365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056979">SUSE bug 1056979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057199">SUSE bug 1057199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058135">SUSE bug 1058135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059863">SUSE bug 1059863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060333">SUSE bug 1060333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060682">SUSE bug 1060682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060985">SUSE bug 1060985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061451">SUSE bug 1061451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061756">SUSE bug 1061756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062941">SUSE bug 1062941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062962">SUSE bug 1062962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063026">SUSE bug 1063026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063460">SUSE bug 1063460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063475">SUSE bug 1063475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063501">SUSE bug 1063501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063509">SUSE bug 1063509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063516">SUSE bug 1063516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063520">SUSE bug 1063520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063695">SUSE bug 1063695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064206">SUSE bug 1064206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064701">SUSE bug 1064701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064926">SUSE bug 1064926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065639">SUSE bug 1065639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065692">SUSE bug 1065692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065717">SUSE bug 1065717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065866">SUSE bug 1065866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066045">SUSE bug 1066045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066213">SUSE bug 1066213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066285">SUSE bug 1066285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066470">SUSE bug 1066470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066471">SUSE bug 1066471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066472">SUSE bug 1066472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067132">SUSE bug 1067132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067494">SUSE bug 1067494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067888">SUSE bug 1067888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068978">SUSE bug 1068978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068980">SUSE bug 1068980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068982">SUSE bug 1068982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069270">SUSE bug 1069270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069793">SUSE bug 1069793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069942">SUSE bug 1069942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069996">SUSE bug 1069996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070006">SUSE bug 1070006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070145">SUSE bug 1070145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070767">SUSE bug 1070767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070825">SUSE bug 1070825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070964">SUSE bug 1070964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071231">SUSE bug 1071231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071833">SUSE bug 1071833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963575">SUSE bug 963575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966316">SUSE bug 966316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966318">SUSE bug 966318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969474">SUSE bug 969474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969475">SUSE bug 969475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974590">SUSE bug 974590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979928">SUSE bug 979928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989261">SUSE bug 989261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996376">SUSE bug 996376</bugzilla>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79976" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10309" ref_url="https://www.suse.com/security/cve/CVE-2017-10309/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Security issues fixed:

- Security update to version 8.0.5.5 (bsc#1070162)
  * CVE-2017-10346 CVE-2017-10285 CVE-2017-10388 CVE-2017-10309
    CVE-2017-10356 CVE-2017-10293 CVE-2016-9841  CVE-2016-10165
    CVE-2017-10355 CVE-2017-10357 CVE-2017-10348 CVE-2017-10349
    CVE-2017-10347 CVE-2017-10350 CVE-2017-10281 CVE-2017-10295
    CVE-2017-10345
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-22"/>
	<updated date="2017-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10309/">CVE-2017-10309</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79977" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046856" ref_url="https://bugzilla.suse.com/1046856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00089.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issue fixed:

- CVE-2017-1000083: Remove support for tar and tar-like commands in comics backend (bsc#1046856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-22"/>
	<updated date="2017-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549951" comment="evince-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549952" comment="evince-browser-plugin-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518422" comment="evince-lang-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549953" comment="evince-plugin-djvudocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549954" comment="evince-plugin-dvidocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549955" comment="evince-plugin-pdfdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549956" comment="evince-plugin-psdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549957" comment="evince-plugin-tiffdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549958" comment="evince-plugin-xpsdocument-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549959" comment="libevdocument3-4-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549960" comment="libevview3-3-3.20.2-6.19.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549961" comment="nautilus-evince-3.20.2-6.19.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79978" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1070727" ref_url="https://bugzilla.suse.com/1070727" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:
 
 - CVE-2017-17083: NetBIOS dissector could crash. This was addressed in 
   epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. (bsc#1070727)
 - CVE-2017-17084: IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by 
   validating a ULPDU length. (bsc#1070727)
 - CVE-2017-17085: the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c 
   by validating the packet length. (bsc#1070727)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549962" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549963" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549964" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549965" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549966" comment="wireshark-2.2.11-48.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549967" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79979" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1053417" ref_url="https://bugzilla.suse.com/1053417" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003556.html" source="SUSE-SU"/>
		<description>

This update for gdk-pixbuf provides the following fixes:

- Add overflow checks when creating pixbuf structures in general
- Fix arithmetic overflow in the BMP loader (bsc#1053417) 
- Adds support for BMPv3 with bitmasks (bsc#1053417) 
		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-27"/>
	<updated date="2017-12-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1053417">SUSE bug 1053417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518440" comment="gdk-pixbuf-lang-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549968" comment="gdk-pixbuf-query-loaders-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549969" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549970" comment="libgdk_pixbuf-2_0-0-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549971" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549972" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79980" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1070162" ref_url="https://bugzilla.suse.com/1070162" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Security update to version 7.1.4.15 [bsc#1070162]
  
  * CVE-2017-10349: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10348: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10388: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2016-9841:  'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10293: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10345: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10350: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10356: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10357: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10347: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10355: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10285: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10281: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10295: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2017-10346: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'

  * CVE-2016-10165: 'Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).'
  
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-12-29"/>
	<updated date="2017-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79981" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1021814" ref_url="https://bugzilla.suse.com/1021814" source="BUGZILLA"/>
		<reference ref_id="1021817" ref_url="https://bugzilla.suse.com/1021817" source="BUGZILLA"/>
		<reference ref_id="1021818" ref_url="https://bugzilla.suse.com/1021818" source="BUGZILLA"/>
		<reference ref_id="1021819" ref_url="https://bugzilla.suse.com/1021819" source="BUGZILLA"/>
		<reference ref_id="1021820" ref_url="https://bugzilla.suse.com/1021820" source="BUGZILLA"/>
		<reference ref_id="1021821" ref_url="https://bugzilla.suse.com/1021821" source="BUGZILLA"/>
		<reference ref_id="1021822" ref_url="https://bugzilla.suse.com/1021822" source="BUGZILLA"/>
		<reference ref_id="1021823" ref_url="https://bugzilla.suse.com/1021823" source="BUGZILLA"/>
		<reference ref_id="1021824" ref_url="https://bugzilla.suse.com/1021824" source="BUGZILLA"/>
		<reference ref_id="1021991" ref_url="https://bugzilla.suse.com/1021991" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<description>

MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-08"/>
	<updated date="2017-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79982" version="1" class="patch">
	<metadata>
		<title>Security update for opus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020102" ref_url="https://bugzilla.suse.com/1020102" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00018.html" source="SUSE-SU"/>
		<description>

This update for opus fixes the following issues:

- CVE-2017-0381: Fixed a remote code execution vulnerability in silk/NLSF_stabilize.c when playing certain media files (bsc#1020102)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-09"/>
	<updated date="2017-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020102">SUSE bug 1020102</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549975" comment="libopus0-1.1-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79983" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000677" ref_url="https://bugzilla.suse.com/1000677" source="BUGZILLA"/>
		<reference ref_id="1001912" ref_url="https://bugzilla.suse.com/1001912" source="BUGZILLA"/>
		<reference ref_id="1009528" ref_url="https://bugzilla.suse.com/1009528" source="BUGZILLA"/>
		<reference ref_id="1019637" ref_url="https://bugzilla.suse.com/1019637" source="BUGZILLA"/>
		<reference ref_id="1021641" ref_url="https://bugzilla.suse.com/1021641" source="BUGZILLA"/>
		<reference ref_id="1022085" ref_url="https://bugzilla.suse.com/1022085" source="BUGZILLA"/>
		<reference ref_id="1022086" ref_url="https://bugzilla.suse.com/1022086" source="BUGZILLA"/>
		<reference ref_id="1022271" ref_url="https://bugzilla.suse.com/1022271" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7055: The x86_64 optimized montgomery multiplication may produce incorrect results (bsc#1009528)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- CVE-2017-3732: BN_mod_exp may produce incorrect results on x86_64 (bsc#1022086)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)

Non-security issues fixed:
- fix crash in openssl speed (bsc#1000677)
- fix X509_CERT_FILE path (bsc#1022271)
- AES XTS key parts must not be identical in FIPS mode (bsc#1019637)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-10"/>
	<updated date="2017-02-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000677">SUSE bug 1000677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009528">SUSE bug 1009528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019637">SUSE bug 1019637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022271">SUSE bug 1022271</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541126" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549976" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549977" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549978" comment="libopenssl1_0_0-hmac-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549979" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549980" comment="openssl-1.0.2j-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532709" comment="openssl-doc-1.0.2j-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79984" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1019611" ref_url="https://bugzilla.suse.com/1019611" source="BUGZILLA"/>
		<reference ref_id="1022103" ref_url="https://bugzilla.suse.com/1022103" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002639.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- A crafted TIFF image could cause a crash and potential code execution when
processed by the 'tiffcp' utility (CVE-2017-5225, bsc#1019611).

Also a regression from the version update to 4.0.7 was fixed in
handling TIFFTAG_FAXRECVPARAMS. (bsc#1022103)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-13"/>
	<updated date="2017-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022103">SUSE bug 1022103</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549981" comment="libtiff5-4.0.7-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547806" comment="libtiff5-32bit-4.0.7-40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549982" comment="tiff-4.0.7-40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79985" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024218" ref_url="https://bugzilla.suse.com/1024218" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-ibm to version 8.0-4.0 fixes a lot of security issues (bsc#1024218):

Following CVEs are fixed:
  CVE-2016-5552 CVE-2017-3231 CVE-2017-3241 CVE-2017-3253 CVE-2017-3259
  CVE-2017-3261 CVE-2017-3272 CVE-2017-3289 CVE-2016-2183 CVE-2016-5547
  CVE-2016-5548 CVE-2016-5549 CVE-2017-3252

More information can be found on: https://developer.ibm.com/javasdk/support/security-vulnerabilities/
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-14"/>
	<updated date="2017-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79986" version="1" class="patch">
	<metadata>
		<title>Security update for libXpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1021315" ref_url="https://bugzilla.suse.com/1021315" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002644.html" source="SUSE-SU"/>
		<description>

This update for libXpm fixes the following issues:

- A heap overflow in XPM handling could be used by attackers supplying XPM files to 
  crash or potentially execute code. (bsc#1021315)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549983" comment="libXpm4-3.5.11-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547824" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79987" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1022263" ref_url="https://bugzilla.suse.com/1022263" source="BUGZILLA"/>
		<reference ref_id="1022264" ref_url="https://bugzilla.suse.com/1022264" source="BUGZILLA"/>
		<reference ref_id="1022265" ref_url="https://bugzilla.suse.com/1022265" source="BUGZILLA"/>
		<reference ref_id="1022283" ref_url="https://bugzilla.suse.com/1022283" source="BUGZILLA"/>
		<reference ref_id="1022284" ref_url="https://bugzilla.suse.com/1022284" source="BUGZILLA"/>
		<reference ref_id="1022553" ref_url="https://bugzilla.suse.com/1022553" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<description>

This update for gd fixes the following security issues:

- CVE-2016-6906: An out-of-bounds read in TGA decompression was fixed which could have lead to crashes. (bsc#1022553)
- CVE-2016-6912: Double free vulnerability in the gdImageWebPtr function
  in the GD Graphics Library (aka libgd) allowed remote attackers to have
  unspecified impact via large width and height values. (bsc#1022284)
- CVE-2016-9317: The gdImageCreate function in the GD Graphics Library
  (aka libgd) allowed remote attackers to cause a denial of service
  (system hang) via an oversized image.  (bsc#1022283)
- CVE-2016-10166: A potential unsigned underflow in gd interpolation
  functions could lead to memory corruption in the GD Graphics Library (aka libgd) (bsc#1022263)
- CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx()
  could lead to libgd running out of memory even on small files. (bsc#1022264)
- CVE-2016-10168: A signed integer overflow in the GD Graphics Library (aka libgd) could lead
  to memory corruption (bsc#1022265)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022284">SUSE bug 1022284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022553">SUSE bug 1022553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79988" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="927841" ref_url="https://bugzilla.suse.com/927841" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002649.html" source="SUSE-SU"/>
		<description>
The ppp package was updated to fix the following security issue:

- CVE-2015-3310: Fixed a buffer overflow in radius plug-in's rc_mksid() (bsc#927841).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-15"/>
	<updated date="2017-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549985" comment="ppp-2.4.7-3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79989" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020905" ref_url="https://bugzilla.suse.com/1020905" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Oracle Critical Patch Update of January 2017 to OpenJDK 7u131 (bsc#1020905):
  * Security Fixes
    - S8138725: Add options for Javadoc generation
    - S8140353: Improve signature checking
    - S8151934, CVE-2017-3231: Resolve class resolution
    - S8156804, CVE-2017-3241: Better constraint checking
    - S8158406: Limited Parameter Processing
    - S8158997: JNDI Protocols Switch
    - S8159507: RuntimeVisibleAnnotation validation
    - S8161218: Better bytecode loading
    - S8161743, CVE-2017-3252: Provide proper login context
    - S8162577: Standardize logging levels
    - S8162973: Better component components
    - S8164143, CVE-2017-3260: Improve components for menu items
    - S8164147, CVE-2017-3261: Improve streaming socket output
    - S8165071, CVE-2016-2183: Expand TLS support
    - S8165344, CVE-2017-3272: Update concurrency support
    - S8166988, CVE-2017-3253: Improve image processing performance
    - S8167104, CVE-2017-3289: Additional class construction refinements
    - S8167223, CVE-2016-5552: URL handling improvements
    - S8168705, CVE-2016-5547: Better ObjectIdentifier validation
    - S8168714, CVE-2016-5546: Tighten ECDSA validation
    - S8168728, CVE-2016-5548: DSA signing improvments
    - S8168724, CVE-2016-5549: ECDSA signing improvments
    - S6253144: Long narrowing conversion should describe the algorithm used and implied 'risks'
    - S6328537: Improve javadocs for Socket class by adding references to SocketOptions
    - S6978886: javadoc shows stacktrace after print error resulting from disk full
    - S6995421: Eliminate the static dependency to sun.security.ec.ECKeyFactory
    - S6996372: synchronizing handshaking hash
    - S7027045: (doc) java/awt/Window.java has several typos in javadoc
    - S7054969: Null-check-in-finally pattern in java/security documentation
    - S7072353: JNDI libraries do not build with javac -Xlint:all -Werror
    - S7075563: Broken link in 'javax.swing.SwingWorker'
    - S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11
    - S7088502: Security libraries don't build with javac -Werror
    - S7092447: Clarify the default locale used in each locale sensitive operation
    - S7093640: Enable client-side TLS 1.2 by default
    - S7103570: AtomicIntegerFieldUpdater does not work when SecurityManager is installed
    - S7117360: Warnings in java.util.concurrent.atomic package
    - S7117465: Warning cleanup for IMF classes
    - S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an error
    - S8000418: javadoc should used a standard 'generated by javadoc' string
    - S8000666: javadoc should write directly to Writer instead of composing strings
    - S8000673: remove dead code from HtmlWriter and subtypes
    - S8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK
    - S8001669: javadoc internal DocletAbortException should set cause when appropriate
    - S8008949: javadoc stopped copying doc-files
    - S8011402: Move blacklisting certificate logic from hard code to data
    - S8011547: Update XML Signature implementation to Apache Santuario 1.5.4
    - S8012288: XML DSig API allows wrong tag names and extra elements in SignedInfo
    - S8016217: More javadoc warnings
    - S8017325: Cleanup of the javadoc &lt;code&gt; tag in java.security.cert
    - S8017326: Cleanup of the javadoc &lt;code&gt; tag in java.security.spec
    - S8019772: Fix doclint issues in javax.crypto and javax.security subpackages
    - S8020557: javadoc cleanup in javax.security
    - S8020688: Broken links in documentation at http://docs.oracle.com/javase/6/docs/api/index.
    - S8021108: Clean up doclint warnings and errors in java.text package
    - S8021417: Fix doclint issues in java.util.concurrent
    - S8021833: javadoc cleanup in java.net
    - S8022120: JCK test api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails
    - S8022175: Fix doclint warnings in javax.print
    - S8022406: Fix doclint issues in java.beans
    - S8022746: List of spelling errors in API doc
    - S8024779: [macosx] SwingNode crashes on exit
    - S8025085: [javadoc] some errors in javax/swing
    - S8025218: [javadoc] some errors in java/awt classes
    - S8025249: [javadoc] fix some javadoc errors in javax/swing/
    - S8025409: Fix javadoc comments errors and warning reported by doclint report
    - S8026021: more fix of javadoc errors and warnings reported by doclint, see the description
    - S8037099: [macosx] Remove all references to GC from native OBJ-C code
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException if ID attribute value is empty String
    - S8038349: Signing XML with DSA throws Exception when key is larger than 1024 bits
    - S8049244: XML Signature performance issue caused by unbuffered signature data
    - S8049432: New tests for TLS property jdk.tls.client.protocols
    - S8050893: (smartcardio) Invert reset argument in tests in sun/security/smartcardio
    - S8059212: Modify regression tests so that they do not just fail if no cardreader found
    - S8068279: (typo in the spec) javax.script.ScriptEngineFactory.getLanguageName
    - S8068491: Update the protocol for references of docs.oracle.com to HTTPS.
    - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be updated for JDK-8061210
    - S8076369: Introduce the jdk.tls.client.protocols system property for JDK 7u
    - S8139565: Restrict certificates with DSA keys less than 1024 bits
    - S8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance instead of direct class check
    - S8143959: Certificates requiring blacklisting
    - S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
    - S8148516: Improve the default strength of EC in JDK
    - S8149029: Secure validation of XML based digital signature always enabled when checking wrapping attacks
    - S8151893: Add security property to configure XML Signature secure validation mode
    - S8155760: Implement Serialization Filtering
    - S8156802: Better constraint checking
    - S8161228: URL objects with custom protocol handlers have port changed after deserializing
    - S8161571: Verifying ECDSA signatures permits trailing bytes
    - S8163304: jarsigner -verbose -verify should print the algorithms used to sign the jar
    - S8164908: ReflectionFactory support for IIOP and custom serialization
    - S8165230: RMIConnection addNotificationListeners failing with specific inputs
    - S8166393: disabledAlgorithms property should not be strictly parsed
    - S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12 Sierra is very fast (Trackpad, Retina only)
    - S8166739: Improve extensibility of ObjectInputFilter information passed to the filter
    - S8166875: (tz) Support tzdata2016g
    - S8166878: Connection reset during TLS handshake
    - S8167356: Follow up fix for jdk8 backport of 8164143. Changes for CMenuComponent.m were missed
    - S8167459: Add debug output for indicating if a chosen ciphersuite was legacy
    - S8167472: Chrome interop regression with JDK-8148516
    - S8167591: Add MD5 to signed JAR restrictions
    - S8168861: AnchorCertificates uses hardcoded password for cacerts keystore
    - S8168993: JDK8u121 L10n resource file update
    - S8169191: (tz) Support tzdata2016i
    - S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for January CPU
    - S8169911: Enhanced tests for jarsigner -verbose -verify after JDK-8163304
    - S8170131: Certificates not being blocked by jdk.tls.disabledAlgorithms property
    - S8170268: 8u121 L10n resource file update - msgdrop 20
    - S8173622: Backport of 7180907 is incomplete
    - S8173849: Fix use of java.util.Base64 in test cases
    - S8173854: [TEST] Update DHEKeySizing test case following 8076328 &amp; 8081760
    - CVE-2017-3259 Vulnerability allows unauthenticated attacker with network access via multiple protocols to
      compromise Java SE.
  * Backports
    - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on __APPLE__and _LLP64 systems.
    - S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned
    - S8153711, PR3315, RH1284948: [REDO] GlobalRefs never deleted when processing invokeMethod command
    - S8170888, PR3316, RH1390708: [linux] support for cgroup memory limits in container (ie Docker) environments
  * Bug fixes
    - PR3318: Replace 'infinality' with 'improved font rendering' (--enable-improved-font-rendering)
    - PR3318: Fix compatibility with vanilla Fontconfig
    - PR3318: Fix glyph y advance
    - PR3318: Always round glyph advance in 26.6 space
    - PR3318: Simplify glyph advance handling
    - PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh broken by PR1989
  * AArch64 port
    - S8165673, PR3320: AArch64: Fix JNI floating point argument handling
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-17"/>
	<updated date="2017-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79990" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1010977" ref_url="https://bugzilla.suse.com/1010977" source="BUGZILLA"/>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1011830" ref_url="https://bugzilla.suse.com/1011830" source="BUGZILLA"/>
		<reference ref_id="1012530" ref_url="https://bugzilla.suse.com/1012530" source="BUGZILLA"/>
		<reference ref_id="1015993" ref_url="https://bugzilla.suse.com/1015993" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

- CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec. (bsc#1012530)
- CVE-2016-9395: Invalid jasper files could lead to abort of the library caused by attacker provided image. (bsc#1010977)
- CVE-2016-9398: Invalid jasper files could lead to abort of the library caused by attacker provided image. (bsc#1010979)
- CVE-2016-9560: Stack-based buffer overflow in jpc_tsfb_getbands2. (bsc#1011830)
- CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy. (bsc#1015993)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-08"/>
	<updated date="2017-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549990" comment="libjasper1-1.900.14-184.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547836" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79991" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017308" ref_url="https://bugzilla.suse.com/1017308" source="BUGZILLA"/>
		<reference ref_id="1017310" ref_url="https://bugzilla.suse.com/1017310" source="BUGZILLA"/>
		<reference ref_id="1017311" ref_url="https://bugzilla.suse.com/1017311" source="BUGZILLA"/>
		<reference ref_id="1017312" ref_url="https://bugzilla.suse.com/1017312" source="BUGZILLA"/>
		<reference ref_id="1017313" ref_url="https://bugzilla.suse.com/1017313" source="BUGZILLA"/>
		<reference ref_id="1017314" ref_url="https://bugzilla.suse.com/1017314" source="BUGZILLA"/>
		<reference ref_id="1017318" ref_url="https://bugzilla.suse.com/1017318" source="BUGZILLA"/>
		<reference ref_id="1017319" ref_url="https://bugzilla.suse.com/1017319" source="BUGZILLA"/>
		<reference ref_id="1017320" ref_url="https://bugzilla.suse.com/1017320" source="BUGZILLA"/>
		<reference ref_id="1017321" ref_url="https://bugzilla.suse.com/1017321" source="BUGZILLA"/>
		<reference ref_id="1017322" ref_url="https://bugzilla.suse.com/1017322" source="BUGZILLA"/>
		<reference ref_id="1017324" ref_url="https://bugzilla.suse.com/1017324" source="BUGZILLA"/>
		<reference ref_id="1017325" ref_url="https://bugzilla.suse.com/1017325" source="BUGZILLA"/>
		<reference ref_id="1017326" ref_url="https://bugzilla.suse.com/1017326" source="BUGZILLA"/>
		<reference ref_id="1017421" ref_url="https://bugzilla.suse.com/1017421" source="BUGZILLA"/>
		<reference ref_id="1020433" ref_url="https://bugzilla.suse.com/1020433" source="BUGZILLA"/>
		<reference ref_id="1020435" ref_url="https://bugzilla.suse.com/1020435" source="BUGZILLA"/>
		<reference ref_id="1020436" ref_url="https://bugzilla.suse.com/1020436" source="BUGZILLA"/>
		<reference ref_id="1020439" ref_url="https://bugzilla.suse.com/1020439" source="BUGZILLA"/>
		<reference ref_id="1020441" ref_url="https://bugzilla.suse.com/1020441" source="BUGZILLA"/>
		<reference ref_id="1020443" ref_url="https://bugzilla.suse.com/1020443" source="BUGZILLA"/>
		<reference ref_id="1020446" ref_url="https://bugzilla.suse.com/1020446" source="BUGZILLA"/>
		<reference ref_id="1020448" ref_url="https://bugzilla.suse.com/1020448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046/" source="CVE"/>
		<reference ref_id="CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048/" source="CVE"/>
		<reference ref_id="CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049/" source="CVE"/>
		<reference ref_id="CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050/" source="CVE"/>
		<reference ref_id="CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051/" source="CVE"/>
		<reference ref_id="CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052/" source="CVE"/>
		<reference ref_id="CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059/" source="CVE"/>
		<reference ref_id="CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060/" source="CVE"/>
		<reference ref_id="CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061/" source="CVE"/>
		<reference ref_id="CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062/" source="CVE"/>
		<reference ref_id="CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063/" source="CVE"/>
		<reference ref_id="CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064/" source="CVE"/>
		<reference ref_id="CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065/" source="CVE"/>
		<reference ref_id="CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068/" source="CVE"/>
		<reference ref_id="CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069/" source="CVE"/>
		<reference ref_id="CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070/" source="CVE"/>
		<reference ref_id="CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071/" source="CVE"/>
		<reference ref_id="CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144/" source="CVE"/>
		<reference ref_id="CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145/" source="CVE"/>
		<reference ref_id="CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146/" source="CVE"/>
		<reference ref_id="CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506/" source="CVE"/>
		<reference ref_id="CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507/" source="CVE"/>
		<reference ref_id="CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508/" source="CVE"/>
		<reference ref_id="CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510/" source="CVE"/>
		<reference ref_id="CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<description>


This update for ImageMagick fixes the following issues:

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314)
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319)
- CVE-2016-10061: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10062: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320)
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10069: Add check for invalid mat file (bsc#1017325).
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433)
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435)
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436)
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439)
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441)
- CVE-2017-5510: Prevent out-of-bounds write when reading PSD files (bsc#1020446).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-21"/>
	<updated date="2017-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017325">SUSE bug 1017325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020446">SUSE bug 1020446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79992" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1008965" ref_url="https://bugzilla.suse.com/1008965" source="BUGZILLA"/>
		<reference ref_id="1012504" ref_url="https://bugzilla.suse.com/1012504" source="BUGZILLA"/>
		<reference ref_id="1012632" ref_url="https://bugzilla.suse.com/1012632" source="BUGZILLA"/>
		<reference ref_id="1019332" ref_url="https://bugzilla.suse.com/1019332" source="BUGZILLA"/>
		<reference ref_id="1020077" ref_url="https://bugzilla.suse.com/1020077" source="BUGZILLA"/>
		<reference ref_id="1020985" ref_url="https://bugzilla.suse.com/1020985" source="BUGZILLA"/>
		<reference ref_id="1023041" ref_url="https://bugzilla.suse.com/1023041" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00039.html" source="SUSE-SU"/>
		<description>

This update for util-linux fixes the following issues:

This security issue was fixed:

- CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041).

This non-security issues were fixed:

- lscpu: Implement WSL detection and work around crash (bsc#1019332)
- fstrim: De-duplicate btrfs sub-volumes for 'fstrim -a' and bind mounts (bsc#1020077)
- Fix regressions in safe loop re-use patch set for libmount (bsc#1012504)
- Disable ro checks for mtab (bsc#1012632)
- Ensure that the option 'users,exec,dev,suid' work as expected on NFS mounts (bsc#1008965)
- Fix empty slave detection to prevent 100% CPU load in some cases (bsc#1020985)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-23"/>
	<updated date="2017-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008965">SUSE bug 1008965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012504">SUSE bug 1012504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012632">SUSE bug 1012632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019332">SUSE bug 1019332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020077">SUSE bug 1020077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020985">SUSE bug 1020985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549993" comment="libblkid1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549994" comment="libblkid1-32bit-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549995" comment="libfdisk1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549996" comment="libmount1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549997" comment="libmount1-32bit-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549998" comment="libsmartcols1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549999" comment="libuuid1-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550000" comment="libuuid1-32bit-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550001" comment="python-libmount-2.28-44.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550002" comment="util-linux-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518461" comment="util-linux-lang-2.28-44.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550003" comment="util-linux-systemd-2.28-44.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550004" comment="uuidd-2.28-44.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79993" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000195" ref_url="https://bugzilla.suse.com/1000195" source="BUGZILLA"/>
		<reference ref_id="1002496" ref_url="https://bugzilla.suse.com/1002496" source="BUGZILLA"/>
		<reference ref_id="1005028" ref_url="https://bugzilla.suse.com/1005028" source="BUGZILLA"/>
		<reference ref_id="1012651" ref_url="https://bugzilla.suse.com/1012651" source="BUGZILLA"/>
		<reference ref_id="1014298" ref_url="https://bugzilla.suse.com/1014298" source="BUGZILLA"/>
		<reference ref_id="1014300" ref_url="https://bugzilla.suse.com/1014300" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016340" ref_url="https://bugzilla.suse.com/1016340" source="BUGZILLA"/>
		<reference ref_id="1022871" ref_url="https://bugzilla.suse.com/1022871" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1024834" ref_url="https://bugzilla.suse.com/1024834" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834).
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004).
- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169

These non-security issues were fixed:

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3 
- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd
- bsc#1005028: Fixed building Xen RPMs from Sources
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-27"/>
	<updated date="2017-02-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000195">SUSE bug 1000195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002496">SUSE bug 1002496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005028">SUSE bug 1005028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022871">SUSE bug 1022871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550005" comment="xen-doc-html-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550006" comment="xen-tools-4.7.1_06-31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550007" comment="xen-tools-domU-4.7.1_06-31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79994" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000092" ref_url="https://bugzilla.suse.com/1000092" source="BUGZILLA"/>
		<reference ref_id="1000619" ref_url="https://bugzilla.suse.com/1000619" source="BUGZILLA"/>
		<reference ref_id="1003077" ref_url="https://bugzilla.suse.com/1003077" source="BUGZILLA"/>
		<reference ref_id="1005918" ref_url="https://bugzilla.suse.com/1005918" source="BUGZILLA"/>
		<reference ref_id="1006469" ref_url="https://bugzilla.suse.com/1006469" source="BUGZILLA"/>
		<reference ref_id="1006472" ref_url="https://bugzilla.suse.com/1006472" source="BUGZILLA"/>
		<reference ref_id="1007729" ref_url="https://bugzilla.suse.com/1007729" source="BUGZILLA"/>
		<reference ref_id="1008742" ref_url="https://bugzilla.suse.com/1008742" source="BUGZILLA"/>
		<reference ref_id="1009546" ref_url="https://bugzilla.suse.com/1009546" source="BUGZILLA"/>
		<reference ref_id="1009674" ref_url="https://bugzilla.suse.com/1009674" source="BUGZILLA"/>
		<reference ref_id="1009718" ref_url="https://bugzilla.suse.com/1009718" source="BUGZILLA"/>
		<reference ref_id="1009911" ref_url="https://bugzilla.suse.com/1009911" source="BUGZILLA"/>
		<reference ref_id="1010612" ref_url="https://bugzilla.suse.com/1010612" source="BUGZILLA"/>
		<reference ref_id="1010690" ref_url="https://bugzilla.suse.com/1010690" source="BUGZILLA"/>
		<reference ref_id="1010933" ref_url="https://bugzilla.suse.com/1010933" source="BUGZILLA"/>
		<reference ref_id="1011176" ref_url="https://bugzilla.suse.com/1011176" source="BUGZILLA"/>
		<reference ref_id="1011602" ref_url="https://bugzilla.suse.com/1011602" source="BUGZILLA"/>
		<reference ref_id="1011660" ref_url="https://bugzilla.suse.com/1011660" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012422" ref_url="https://bugzilla.suse.com/1012422" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1012910" ref_url="https://bugzilla.suse.com/1012910" source="BUGZILLA"/>
		<reference ref_id="1013000" ref_url="https://bugzilla.suse.com/1013000" source="BUGZILLA"/>
		<reference ref_id="1013001" ref_url="https://bugzilla.suse.com/1013001" source="BUGZILLA"/>
		<reference ref_id="1013273" ref_url="https://bugzilla.suse.com/1013273" source="BUGZILLA"/>
		<reference ref_id="1013540" ref_url="https://bugzilla.suse.com/1013540" source="BUGZILLA"/>
		<reference ref_id="1013792" ref_url="https://bugzilla.suse.com/1013792" source="BUGZILLA"/>
		<reference ref_id="1013994" ref_url="https://bugzilla.suse.com/1013994" source="BUGZILLA"/>
		<reference ref_id="1014120" ref_url="https://bugzilla.suse.com/1014120" source="BUGZILLA"/>
		<reference ref_id="1014410" ref_url="https://bugzilla.suse.com/1014410" source="BUGZILLA"/>
		<reference ref_id="1015038" ref_url="https://bugzilla.suse.com/1015038" source="BUGZILLA"/>
		<reference ref_id="1015367" ref_url="https://bugzilla.suse.com/1015367" source="BUGZILLA"/>
		<reference ref_id="1015840" ref_url="https://bugzilla.suse.com/1015840" source="BUGZILLA"/>
		<reference ref_id="1016250" ref_url="https://bugzilla.suse.com/1016250" source="BUGZILLA"/>
		<reference ref_id="1016403" ref_url="https://bugzilla.suse.com/1016403" source="BUGZILLA"/>
		<reference ref_id="1016517" ref_url="https://bugzilla.suse.com/1016517" source="BUGZILLA"/>
		<reference ref_id="1016884" ref_url="https://bugzilla.suse.com/1016884" source="BUGZILLA"/>
		<reference ref_id="1016979" ref_url="https://bugzilla.suse.com/1016979" source="BUGZILLA"/>
		<reference ref_id="1017164" ref_url="https://bugzilla.suse.com/1017164" source="BUGZILLA"/>
		<reference ref_id="1017170" ref_url="https://bugzilla.suse.com/1017170" source="BUGZILLA"/>
		<reference ref_id="1017410" ref_url="https://bugzilla.suse.com/1017410" source="BUGZILLA"/>
		<reference ref_id="1018100" ref_url="https://bugzilla.suse.com/1018100" source="BUGZILLA"/>
		<reference ref_id="1018316" ref_url="https://bugzilla.suse.com/1018316" source="BUGZILLA"/>
		<reference ref_id="1018358" ref_url="https://bugzilla.suse.com/1018358" source="BUGZILLA"/>
		<reference ref_id="1018446" ref_url="https://bugzilla.suse.com/1018446" source="BUGZILLA"/>
		<reference ref_id="1018813" ref_url="https://bugzilla.suse.com/1018813" source="BUGZILLA"/>
		<reference ref_id="1018913" ref_url="https://bugzilla.suse.com/1018913" source="BUGZILLA"/>
		<reference ref_id="1019061" ref_url="https://bugzilla.suse.com/1019061" source="BUGZILLA"/>
		<reference ref_id="1019148" ref_url="https://bugzilla.suse.com/1019148" source="BUGZILLA"/>
		<reference ref_id="1019168" ref_url="https://bugzilla.suse.com/1019168" source="BUGZILLA"/>
		<reference ref_id="1019260" ref_url="https://bugzilla.suse.com/1019260" source="BUGZILLA"/>
		<reference ref_id="1019351" ref_url="https://bugzilla.suse.com/1019351" source="BUGZILLA"/>
		<reference ref_id="1019594" ref_url="https://bugzilla.suse.com/1019594" source="BUGZILLA"/>
		<reference ref_id="1019630" ref_url="https://bugzilla.suse.com/1019630" source="BUGZILLA"/>
		<reference ref_id="1019631" ref_url="https://bugzilla.suse.com/1019631" source="BUGZILLA"/>
		<reference ref_id="1019784" ref_url="https://bugzilla.suse.com/1019784" source="BUGZILLA"/>
		<reference ref_id="1019851" ref_url="https://bugzilla.suse.com/1019851" source="BUGZILLA"/>
		<reference ref_id="1020048" ref_url="https://bugzilla.suse.com/1020048" source="BUGZILLA"/>
		<reference ref_id="1020214" ref_url="https://bugzilla.suse.com/1020214" source="BUGZILLA"/>
		<reference ref_id="1020488" ref_url="https://bugzilla.suse.com/1020488" source="BUGZILLA"/>
		<reference ref_id="1020602" ref_url="https://bugzilla.suse.com/1020602" source="BUGZILLA"/>
		<reference ref_id="1020685" ref_url="https://bugzilla.suse.com/1020685" source="BUGZILLA"/>
		<reference ref_id="1020817" ref_url="https://bugzilla.suse.com/1020817" source="BUGZILLA"/>
		<reference ref_id="1020945" ref_url="https://bugzilla.suse.com/1020945" source="BUGZILLA"/>
		<reference ref_id="1020975" ref_url="https://bugzilla.suse.com/1020975" source="BUGZILLA"/>
		<reference ref_id="1021082" ref_url="https://bugzilla.suse.com/1021082" source="BUGZILLA"/>
		<reference ref_id="1021248" ref_url="https://bugzilla.suse.com/1021248" source="BUGZILLA"/>
		<reference ref_id="1021251" ref_url="https://bugzilla.suse.com/1021251" source="BUGZILLA"/>
		<reference ref_id="1021258" ref_url="https://bugzilla.suse.com/1021258" source="BUGZILLA"/>
		<reference ref_id="1021260" ref_url="https://bugzilla.suse.com/1021260" source="BUGZILLA"/>
		<reference ref_id="1021294" ref_url="https://bugzilla.suse.com/1021294" source="BUGZILLA"/>
		<reference ref_id="1021455" ref_url="https://bugzilla.suse.com/1021455" source="BUGZILLA"/>
		<reference ref_id="1021474" ref_url="https://bugzilla.suse.com/1021474" source="BUGZILLA"/>
		<reference ref_id="1022304" ref_url="https://bugzilla.suse.com/1022304" source="BUGZILLA"/>
		<reference ref_id="1022429" ref_url="https://bugzilla.suse.com/1022429" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1022547" ref_url="https://bugzilla.suse.com/1022547" source="BUGZILLA"/>
		<reference ref_id="1022559" ref_url="https://bugzilla.suse.com/1022559" source="BUGZILLA"/>
		<reference ref_id="1022971" ref_url="https://bugzilla.suse.com/1022971" source="BUGZILLA"/>
		<reference ref_id="1023101" ref_url="https://bugzilla.suse.com/1023101" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1023762" ref_url="https://bugzilla.suse.com/1023762" source="BUGZILLA"/>
		<reference ref_id="1023884" ref_url="https://bugzilla.suse.com/1023884" source="BUGZILLA"/>
		<reference ref_id="1023888" ref_url="https://bugzilla.suse.com/1023888" source="BUGZILLA"/>
		<reference ref_id="1024081" ref_url="https://bugzilla.suse.com/1024081" source="BUGZILLA"/>
		<reference ref_id="1024234" ref_url="https://bugzilla.suse.com/1024234" source="BUGZILLA"/>
		<reference ref_id="1024508" ref_url="https://bugzilla.suse.com/1024508" source="BUGZILLA"/>
		<reference ref_id="1024938" ref_url="https://bugzilla.suse.com/1024938" source="BUGZILLA"/>
		<reference ref_id="1025235" ref_url="https://bugzilla.suse.com/1025235" source="BUGZILLA"/>
		<reference ref_id="921494" ref_url="https://bugzilla.suse.com/921494" source="BUGZILLA"/>
		<reference ref_id="959709" ref_url="https://bugzilla.suse.com/959709" source="BUGZILLA"/>
		<reference ref_id="964944" ref_url="https://bugzilla.suse.com/964944" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="969479" ref_url="https://bugzilla.suse.com/969479" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="974215" ref_url="https://bugzilla.suse.com/974215" source="BUGZILLA"/>
		<reference ref_id="981709" ref_url="https://bugzilla.suse.com/981709" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="985561" ref_url="https://bugzilla.suse.com/985561" source="BUGZILLA"/>
		<reference ref_id="987192" ref_url="https://bugzilla.suse.com/987192" source="BUGZILLA"/>
		<reference ref_id="987576" ref_url="https://bugzilla.suse.com/987576" source="BUGZILLA"/>
		<reference ref_id="989056" ref_url="https://bugzilla.suse.com/989056" source="BUGZILLA"/>
		<reference ref_id="991273" ref_url="https://bugzilla.suse.com/991273" source="BUGZILLA"/>
		<reference ref_id="998106" ref_url="https://bugzilla.suse.com/998106" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806/" source="CVE"/>
		<reference ref_id="CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583/" source="CVE"/>
		<reference ref_id="CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584/" source="CVE"/>
		<reference ref_id="CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551/" source="CVE"/>
		<reference ref_id="CVE-2017-5576" ref_url="https://www.suse.com/security/cve/CVE-2017-5576/" source="CVE"/>
		<reference ref_id="CVE-2017-5577" ref_url="https://www.suse.com/security/cve/CVE-2017-5577/" source="CVE"/>
		<reference ref_id="CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.49 to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in
  net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary
  code via vectors involving a recvmmsg system call that was mishandled during
  error processing (bnc#1003077).
- CVE-2017-5576: Integer overflow in the vc4_get_bcl function in
  drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel
  allowed local users to cause a denial of service or possibly have unspecified
  other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call
  (bnc#1021294).
- CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in
  the VideoCore DRM driver in the Linux kernel did not set an errno value upon
  certain overflow detections, which allowed local users to cause a denial of
  service (incorrect pointer dereference and OOPS) via inconsistent size values
  in a VC4_SUBMIT_CL ioctl call (bnc#1021294).
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux
  kernel preserved the setgid bit during a setxattr call involving a tmpfs
  filesystem, which allowed local users to gain group privileges by leveraging
  the existence of a setgid program with restrictions on execute permissions.
  (bnc#1021258).
- CVE-2017-2583: The load_segment_descriptor implementation in
  arch/x86/kvm/emulate.c in the Linux kernel improperly emulated a 'MOV SS,
  NULL selector' instruction, which allowed guest OS users to cause a denial of
  service (guest OS crash) or gain guest OS privileges via a crafted
  application (bnc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users
  to obtain sensitive information from kernel memory or cause a denial of
  service (use-after-free) via a crafted application that leverages instruction
  emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and gid
  mappings, which allowed local users to gain privileges by establishing a user
  namespace, waiting for a root process to enter that namespace with an unsafe
  uid or gid, and then using the ptrace system call.  NOTE: the vendor states
  'there is no kernel bug here' (bnc#1010933).
- CVE-2016-9806: Race condition in the netlink_dump function in
  net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a
  denial of service (double free) or possibly have unspecified other impact via
  a crafted application that made sendmsg system calls, leading to a free
  operation associated with a new dump that started earlier than anticipated
  (bnc#1013540).
- CVE-2017-5897: fixed a bug in the Linux kernel IPv6 implementation which
  allowed remote attackers to trigger an out-of-bounds access, leading to a
  denial-of-service attack (bnc#1023762).
- CVE-2017-5970: Fixed a possible denial-of-service that could have been
  triggered by sending bad IP options on a socket (bsc#1024938).
- CVE-2017-5986: an application could have triggered a BUG_ON() in
  sctp_wait_for_sndbuf() if the socket TX buffer was full, a thread was waiting
  on it to queue more data, and meanwhile another thread peeled off the
  association being used by the first thread (bsc#1025235).

The following non-security bugs were fixed:

- 8250: fintek: rename IRQ_MODE macro (boo#1009546).
- acpi: nfit, libnvdimm: fix / harden ars_status output length handling (bsc#1023175).
- acpi: nfit: fix bus vs dimm confusion in xlat_status (bsc#1023175).
- acpi: nfit: validate ars_status output buffer size (bsc#1023175).
- arm64: numa: fix incorrect log for memory-less node (bsc#1019631).
- asoc: cht_bsw_rt5645: Fix leftover kmalloc (bsc#1010690).
- asoc: rt5670: add HS ground control (bsc#1016250).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1021260).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1019784).
- blk-mq: Allow timeouts to run while queue is freezing (bsc#1020817).
- blk-mq: Always schedule hctx-&gt;next_cpu (bsc#1020817).
- blk-mq: Avoid memory reclaim when remapping queues (bsc#1020817).
- blk-mq: Fix failed allocation path when mapping queues (bsc#1020817).
- blk-mq: do not overwrite rq-&gt;mq_ctx (bsc#1020817).
- blk-mq: improve warning for running a queue on the wrong CPU (bsc#1020817).
- block: Change extern inline to static inline (bsc#1023175).
- bluetooth: btmrvl: fix hung task warning dump (bsc#1018813).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- brcmfmac: Change error print on wlan0 existence (bsc#1000092).
- btrfs: add support for RENAME_EXCHANGE and RENAME_WHITEOUT (bsc#1020975).
- btrfs: bugfix: handle FS_IOC32_{GETFLAGS,SETFLAGS,GETVERSION} in btrfs_ioctl (bsc#1018100).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
- btrfs: fix inode leak on failure to setup whiteout inode in rename (bsc#1020975).
- btrfs: fix lockdep warning about log_mutex (bsc#1021455).
- btrfs: fix lockdep warning on deadlock against an inode's log mutex (bsc#1021455).
- btrfs: fix number of transaction units for renames with whiteout (bsc#1020975).
- btrfs: increment ctx-&gt;pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: incremental send, fix invalid paths for rename operations (bsc#1018316).
- btrfs: incremental send, fix premature rmdir operations (bsc#1018316).
- btrfs: pin log earlier when renaming (bsc#1020975).
- btrfs: pin logs earlier when doing a rename exchange operation (bsc#1020975).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- btrfs: send, add missing error check for calls to path_loop() (bsc#1018316).
- btrfs: send, avoid incorrect leaf accesses when sending utimes operations (bsc#1018316).
- btrfs: send, fix failure to move directories with the same name around (bsc#1018316).
- btrfs: send, fix invalid leaf accesses due to incorrect utimes operations (bsc#1018316).
- btrfs: send, fix warning due to late freeing of orphan_dir_info structures (bsc#1018316).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: unpin log if rename operation fails (bsc#1020975).
- btrfs: unpin logs if rename exchange operation fails (bsc#1020975).
- ceph: fix bad endianness handling in parse_reply_info_extra (bsc#1020488).
- clk: xgene: Add PMD clock (bsc#1019351).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019351).
- clk: xgene: Remove CLK_IS_ROOT (bsc#1019351).
- config: enable CONFIG_OCFS2_DEBUG_MASKLOG for ocfs2    (bsc#1015038)
- config: enable Ceph kernel client modules for ppc64le
- config: enable Ceph kernel client modules for s390x
- crypto: FIPS - allow tests to be disabled in FIPS mode (bsc#1018913).
- crypto: drbg - do not call drbg_instantiate in healt test (bsc#1018913).
- crypto: drbg - remove FIPS 140-2 continuous test (bsc#1018913).
- crypto: qat - fix bar discovery for c62x (bsc#1021251).
- crypto: qat - zero esram only for DH85x devices (bsc#1021248).
- crypto: rsa - allow keys &gt;= 2048 bits in FIPS mode (bsc#1018913).
- crypto: xts - consolidate sanity check for keys (bsc#1018913).
- crypto: xts - fix compile errors (bsc#1018913).
- cxl: fix potential NULL dereference in free_adapter() (bsc#1016517).
- dax: fix deadlock with DAX 4k holes (bsc#1012829).
- dax: fix device-dax region base (bsc#1023175).
- device-dax: check devm_nsio_enable() return value (bsc#1023175).
- device-dax: fail all private mapping attempts (bsc#1023175).
- device-dax: fix percpu_ref_exit ordering (bsc#1023175).
- driver core: fix race between creating/querying glue dir and its cleanup (bnc#1008742).
- drivers: hv: Introduce a policy for controlling channel affinity.
- drivers: hv: balloon: Add logging for dynamic memory operations.
- drivers: hv: balloon: Disable hot add when CONFIG_MEMORY_HOTPLUG is not set.
- drivers: hv: balloon: Fix info request to show max page count.
- drivers: hv: balloon: Use available memory value in pressure report.
- drivers: hv: balloon: account for gaps in hot add regions.
- drivers: hv: balloon: keep track of where ha_region starts.
- drivers: hv: balloon: replace ha_region_mutex with spinlock.
- drivers: hv: cleanup vmbus_open() for wrap around mappings.
- drivers: hv: do not leak memory in vmbus_establish_gpadl().
- drivers: hv: get rid of id in struct vmbus_channel.
- drivers: hv: get rid of redundant messagecount in create_gpadl_header().
- drivers: hv: get rid of timeout in vmbus_open().
- drivers: hv: make VMBus bus ids persistent.
- drivers: hv: ring_buffer: count on wrap around mappings in get_next_pkt_raw() (v2).
- drivers: hv: ring_buffer: use wrap around mappings in hv_copy{from, to}_ringbuffer().
- drivers: hv: ring_buffer: wrap around mappings for ring buffers.
- drivers: hv: utils: Check VSS daemon is listening before a hot backup.
- drivers: hv: utils: Continue to poll VSS channel after handling requests.
- drivers: hv: utils: Fix the mapping between host version and protocol to use.
- drivers: hv: utils: reduce HV_UTIL_NEGO_TIMEOUT timeout.
- drivers: hv: vmbus: Base host signaling strictly on the ring state.
- drivers: hv: vmbus: Enable explicit signaling policy for NIC channels.
- drivers: hv: vmbus: Implement a mechanism to tag the channel for low latency.
- drivers: hv: vmbus: Make mmio resource local.
- drivers: hv: vmbus: On the read path cleanup the logic to interrupt the host.
- drivers: hv: vmbus: On write cleanup the logic to interrupt the host.
- drivers: hv: vmbus: Reduce the delay between retries in vmbus_post_msg().
- drivers: hv: vmbus: finally fix hv_need_to_signal_on_read().
- drivers: hv: vmbus: fix the race when querying and updating the percpu list.
- drivers: hv: vmbus: suppress some 'hv_vmbus: Unknown GUID' warnings.
- drivers: hv: vss: Improve log messages.
- drivers: hv: vss: Operation timeouts should match host expectation.
- drivers: net: phy: mdio-xgene: Add hardware dependency (bsc#1019351).
- drivers: net: phy: xgene: Fix 'remove' function (bsc#1019351).
- drivers: net: xgene: Add change_mtu function (bsc#1019351).
- drivers: net: xgene: Add flow control configuration (bsc#1019351).
- drivers: net: xgene: Add flow control initialization (bsc#1019351).
- drivers: net: xgene: Add helper function (bsc#1019351).
- drivers: net: xgene: Add support for Jumbo frame (bsc#1019351).
- drivers: net: xgene: Configure classifier with pagepool (bsc#1019351).
- drivers: net: xgene: Fix MSS programming (bsc#1019351).
- drivers: net: xgene: fix build after change_mtu function change (bsc#1019351).
- drivers: net: xgene: fix: Coalescing values for v2 hardware (bsc#1019351).
- drivers: net: xgene: fix: Disable coalescing on v1 hardware (bsc#1019351).
- drivers: net: xgene: fix: RSS for non-TCP/UDP (bsc#1019351).
- drivers: net: xgene: fix: Use GPIO to get link status (bsc#1019351).
- drivers: net: xgene: uninitialized variable in xgene_enet_free_pagepool() (bsc#1019351).
- drm: Delete previous two fixes for i915 (bsc#1019061). These upstream fixes brought some regressions, so better to revert for now.
- drm: Disable patches.drivers/drm-i915-Exit-cherryview_irq_handler-after-one-pass The patch seems leading to the instability on Wyse box (bsc#1015367).
- drm: Fix broken VT switch with video=1366x768 option (bsc#1018358).
- drm: Use u64 for intermediate dotclock calculations (bnc#1006472).
- drm: i915: Do not init hpd polling for vlv and chv from runtime_suspend() (bsc#1014120).
- drm: i915: Fix PCODE polling during CDCLK change notification (bsc#1015367).
- drm: i915: Fix watermarks for VLV/CHV (bsc#1011176).
- drm: i915: Force VDD off on the new power seqeuencer before starting to use it (bsc#1009674).
- drm: i915: Mark CPU cache as dirty when used for rendering (bsc#1015367).
- drm: i915: Mark i915_hpd_poll_init_work as static (bsc#1014120).
- drm: i915: Prevent PPS stealing from a normal DP port on VLV/CHV (bsc#1019061).
- drm: i915: Prevent enabling hpd polling in late suspend (bsc#1014120).
- drm: i915: Restore PPS HW state from the encoder resume hook (bsc#1019061).
- drm: i915: Workaround for DP DPMS D3 on Dell monitor (bsc#1019061).
- drm: vc4: Fix an integer overflow in temporary allocation layout (bsc#1021294).
- drm: vc4: Return -EINVAL on the overflow checks failing (bsc#1021294).
- drm: virtio-gpu: get the fb from the plane state for atomic updates (bsc#1023101).
- edac: xgene: Fix spelling mistake in error messages (bsc#1019351).
- efi: libstub: Move Graphics Output Protocol handling to generic code (bnc#974215).
- fbcon: Fix vc attr at deinit (bsc#1000619).
- fs: nfs: avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- gpio: xgene: make explicitly non-modular (bsc#1019351).
- hv: acquire vmbus_connection.channel_mutex in vmbus_free_channels().
- hv: change clockevents unbind tactics.
- hv: do not reset hv_context.tsc_page on crash.
- hv_netvsc: Add handler for physical link speed change.
- hv_netvsc: Add query for initial physical link speed.
- hv_netvsc: Implement batching of receive completions.
- hv_netvsc: Revert 'make inline functions static'.
- hv_netvsc: Revert 'report vmbus name in ethtool'.
- hv_netvsc: add ethtool statistics for tx packet issues.
- hv_netvsc: count multicast packets received.
- hv_netvsc: dev hold/put reference to VF.
- hv_netvsc: fix a race between netvsc_send() and netvsc_init_buf().
- hv_netvsc: fix comments.
- hv_netvsc: fix rtnl locking in callback.
- hv_netvsc: improve VF device matching.
- hv_netvsc: init completion during alloc.
- hv_netvsc: make RSS hash key static.
- hv_netvsc: make device_remove void.
- hv_netvsc: make inline functions static.
- hv_netvsc: make netvsc_destroy_buf void.
- hv_netvsc: make variable local.
- hv_netvsc: rearrange start_xmit.
- hv_netvsc: refactor completion function.
- hv_netvsc: remove VF in flight counters.
- hv_netvsc: remove excessive logging on MTU change.
- hv_netvsc: report vmbus name in ethtool.
- hv_netvsc: simplify callback event code.
- hv_netvsc: style cleanups.
- hv_netvsc: use ARRAY_SIZE() for NDIS versions.
- hv_netvsc: use RCU to protect vf_netdev.
- hv_netvsc: use consume_skb.
- hv_netvsc: use kcalloc.
- hyperv: Fix spelling of HV_UNKOWN.
- i2c: designware-baytrail: Disallow the CPU to enter C6 or C7 while holding the punit semaphore (bsc#1011913).
- i2c: designware: Implement support for SMBus block read and write (bsc#1019351).
- i2c: designware: fix wrong Tx/Rx FIFO for ACPI (bsc#1019351).
- i2c: xgene: Fix missing code of DTB support (bsc#1019351).
- i40e: Be much more verbose about what we can and cannot offload (bsc#985561).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- igb: Workaround for igb i210 firmware issue (bsc#1009911).
- igb: add i211 to i210 PHY workaround (bsc#1009911).
- input: i8042: Trust firmware a bit more when probing on X86 (bsc#1011660).
- intel_idle: Add KBL support (bsc#1016884).
- ip6_gre: fix ip6gre_err() invalid reads (CVE-2017-5897, bsc#1023762).
- ipc: msg, make msgrcv work with LONG_MIN (bnc#1005918).
- iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).
- kgraft: iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612).
- kgraft: xen: Do not block kGraft in xenbus kthread (bsc#1017410).
- libnvdimm: pfn: fix align attribute (bsc#1023175).
- mailbox: xgene-slimpro: Fix wrong test for devm_kzalloc (bsc#1019351).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md-cluster: convert the completion to wait queue.
- md-cluster: protect md_find_rdev_nr_rcu with rcu lock.
- md: ensure md devices are freed before module is unloaded (bsc#1022304).
- md: fix refcount problem on mddev when stopping array (bsc#1022304).
- misc: genwqe: ensure zero initialization.
- mm: do not loop on GFP_REPEAT high order requests if there is no reclaim progress (bnc#1013000).
- mm: memcg: do not retry precharge charges (bnc#1022559).
- mm: page_alloc: fix check for NULL preferred_zone (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: fix fast-path race with cpuset update or removal (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: fix premature OOM when racing with cpuset mems update (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: keep pcp count and list contents in sync if struct page is corrupted (bnc#971975 VM performance -- page allocator).
- mm: page_alloc: move cpuset seqcount checking to slowpath (bnc#971975 VM performance -- page allocator).
- mmc: sdhci-of-arasan: Remove no-hispd and no-cmd23 quirks for sdhci-arasan4.9a (bsc#1019351).
- mwifiex: add missing check for PCIe8997 chipset (bsc#1018813).
- mwifiex: fix IBSS data path issue (bsc#1018813).
- mwifiex: fix PCIe register information for 8997 chipset (bsc#1018813).
- net: af_iucv: do not use paged skbs for TX on HiperSockets (bnc#1020945, LTC#150566).
- net: ethernet: apm: xgene: use phydev from struct net_device (bsc#1019351).
- net: ethtool: Initialize buffer when querying device channel settings (bsc#969479).
- net: hyperv: avoid uninitialized variable.
- net: implement netif_cond_dbg macro (bsc#1019168).
- net: remove useless memset's in drivers get_stats64 (bsc#1019351).
- net: xgene: avoid bogus maybe-uninitialized warning (bsc#1019351).
- net: xgene: fix backward compatibility fix (bsc#1019351).
- net: xgene: fix error handling during reset (bsc#1019351).
- net: xgene: move xgene_cle_ptree_ewdn data off stack (bsc#1019351).
- netvsc: Remove mistaken udp.h inclusion.
- netvsc: add rcu_read locking to netvsc callback.
- netvsc: fix checksum on UDP IPV6.
- netvsc: reduce maximum GSO size.
- nfit: fail DSMs that return non-zero status by default (bsc#1023175).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nvdimm: kabi protect nd_cmd_out_size() (bsc#1023175).
- nvme: apply DELAY_BEFORE_CHK_RDY quirk at probe time too (bsc#1020685).
- ocfs2: fix deadlock on mmapped page in ocfs2_write_begin_nolock() (bnc#921494).
- pci: Add devm_request_pci_bus_resources() (bsc#1019351).
- pci: generic: Fix pci_remap_iospace() failure path (bsc#1019630).
- pci: hv: Allocate physically contiguous hypercall params buffer.
- pci: hv: Fix hv_pci_remove() for hot-remove.
- pci: hv: Handle hv_pci_generic_compl() error case.
- pci: hv: Handle vmbus_sendpacket() failure in hv_compose_msi_msg().
- pci: hv: Make unnecessarily global IRQ masking functions static.
- pci: hv: Remove the unused 'wrk' in struct hv_pcibus_device.
- pci: hv: Use list_move_tail() instead of list_del() + list_add_tail().
- pci: hv: Use pci_function_description in struct definitions.
- pci: hv: Use the correct buffer size in new_pcichild_device().
- pci: hv: Use zero-length array in struct pci_packet.
- pci: include header file (bsc#964944).
- pci: xgene: Add local struct device pointers (bsc#1019351).
- pci: xgene: Add register accessors (bsc#1019351).
- pci: xgene: Free bridge resource list on failure (bsc#1019351).
- pci: xgene: Make explicitly non-modular (bsc#1019351).
- pci: xgene: Pass struct xgene_pcie_port to setup functions (bsc#1019351).
- pci: xgene: Remove unused platform data (bsc#1019351).
- pci: xgene: Request host bridge window resources (bsc#1019351).
- perf: xgene: Remove bogus IS_ERR() check (bsc#1019351).
- phy: xgene: rename 'enum phy_mode' to 'enum xgene_phy_mode' (bsc#1019351).
- power: reset: xgene-reboot: Unmap region obtained by of_iomap (bsc#1019351).
- powerpc: fadump: Fix the race in crash_fadump() (bsc#1022971).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1009718, LTC#148203).
- raid1: Fix a regression observed during the rebuilding of degraded MDRAID VDs (bsc#1020048).
- raid1: ignore discard error (bsc#1017164).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm: kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm: kernel-binary.spec.in: Fix installation of /etc/uefi/certs (bsc#1019594)
- rtc: cmos: Clear ACPI-driven alarms upon resume (bsc#1022429).
- rtc: cmos: Do not enable interrupts in the middle of the interrupt handler (bsc#1022429).
- rtc: cmos: Restore alarm after resume (bsc#1022429).
- rtc: cmos: avoid unused function warning (bsc#1022429).
- s390: Fix invalid domain response handling (bnc#1009718).
- s390: cpuinfo: show maximum thread id (bnc#1009718, LTC#148580).
- s390: sysinfo: show partition extended name and UUID if available (bnc#1009718, LTC#150160).
- s390: time: LPAR offset handling (bnc#1009718, LTC#146920).
- s390: time: move PTFF definitions (bnc#1009718, LTC#146920).
- sched: Allow hotplug notifiers to be setup early (bnc#1022476).
- sched: Make wake_up_nohz_cpu() handle CPUs going offline (bnc#1022476).
- sched: core, x86/topology: Fix NUMA in package topology bug (bnc#1022476).
- sched: core: Fix incorrect utilization accounting when switching to fair class (bnc#1022476).
- sched: core: Fix set_user_nice() (bnc#1022476).
- sched: cputime: Add steal time support to full dynticks CPU time accounting (bnc#1022476).
- sched: cputime: Fix prev steal time accouting during CPU hotplug (bnc#1022476).
- sched: deadline: Always calculate end of period on sched_yield() (bnc#1022476).
- sched: deadline: Fix a bug in dl_overflow() (bnc#1022476).
- sched: deadline: Fix lock pinning warning during CPU hotplug (bnc#1022476).
- sched: deadline: Fix wrap-around in DL heap (bnc#1022476).
- sched: fair: Avoid using decay_load_missed() with a negative value (bnc#1022476).
- sched: fair: Fix fixed point arithmetic width for shares and effective load (bnc#1022476).
- sched: fair: Fix load_above_capacity fixed point arithmetic width (bnc#1022476).
- sched: fair: Fix min_vruntime tracking (bnc#1022476).
- sched: fair: Fix the wrong throttled clock time for cfs_rq_clock_task() (bnc#1022476).
- sched: fair: Improve PELT stuff some more (bnc#1022476).
- sched: rt, sched/dl: Do not push if task's scheduling class was changed (bnc#1022476).
- sched: rt: Fix PI handling vs. sched_setscheduler() (bnc#1022476).
- sched: rt: Kick RT bandwidth timer immediately on start up (bnc#1022476).
- scsi: Add 'AIX VDASD' to blacklist (bsc#1006469).
- scsi: Modify HITACHI OPEN-V blacklist entry (bsc#1006469).
- scsi: bfa: Increase requested firmware version to 3.2.5.1 (bsc#1013273).
- scsi: storvsc: Payload buffer incorrectly sized for 32 bit kernels.
- scsi_dh_alua: uninitialized variable in alua_rtpg() (bsc#1012910).
- sctp: avoid BUG_ON on sctp_wait_for_sndbuf (CVE-2017-5986, bsc#1025235).
- sd: always scan VPD pages if thin provisioning is enabled (bsc#1013792).
- serial: 8250: Integrate Fintek into 8250_base (boo#1016979). Update config files to change CONFIG_SERIAL_8250_FINTEK to boolean accordingly, too. Also, the corresponding entry got removed from supported.conf.
- serial: 8250_fintek: fix the mismatched IRQ mode (boo#1009546).
- serial: Update metadata for serial fixes (bsc#1013001)
- ses: Fix SAS device detection in enclosure (bsc#1016403).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- sfc: refactor debug-or-warnings printks (bsc#1019168).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- supported.conf: Support Marvell WiFi/BT SDIO and pinctrl-cherrytrail (bsc#1018813)
- supported.conf: delete xilinx/ll_temac (bsc#1011602)
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn-&gt;se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- tools: hv: Enable network manager for bonding scripts on RHEL.
- tools: hv: fix a compile warning in snprintf.
- tools: hv: kvp: configurable external scripts path.
- tools: hv: kvp: ensure kvp device fd is closed on exec.
- tools: hv: remove unnecessary header files and netlink related code.
- tools: hv: remove unnecessary link flag.
- tty: n_hdlc, fix lockdep false positive (bnc#1015840).
- uvcvideo: uvc_scan_fallback() for webcams with broken chain (bsc#1021474).
- vmbus: make sysfs names consistent with PCI.
- x86: MCE: Dump MCE to dmesg if no consumers (bsc#1013994).
- x86: hyperv: Handle unknown NMIs on one CPU when unknown_nmi_panic.
- xfs: don't allow di_size with high bit set (bsc#1024234).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-02-28"/>
	<updated date="2017-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000092">SUSE bug 1000092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000619">SUSE bug 1000619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005918">SUSE bug 1005918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006469">SUSE bug 1006469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006472">SUSE bug 1006472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007729">SUSE bug 1007729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008742">SUSE bug 1008742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009546">SUSE bug 1009546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009674">SUSE bug 1009674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009718">SUSE bug 1009718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009911">SUSE bug 1009911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010612">SUSE bug 1010612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010690">SUSE bug 1010690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010933">SUSE bug 1010933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011176">SUSE bug 1011176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011602">SUSE bug 1011602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011660">SUSE bug 1011660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012422">SUSE bug 1012422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012910">SUSE bug 1012910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013000">SUSE bug 1013000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013001">SUSE bug 1013001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013273">SUSE bug 1013273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013540">SUSE bug 1013540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013792">SUSE bug 1013792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013994">SUSE bug 1013994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014120">SUSE bug 1014120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014410">SUSE bug 1014410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015038">SUSE bug 1015038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015367">SUSE bug 1015367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015840">SUSE bug 1015840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016250">SUSE bug 1016250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016403">SUSE bug 1016403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016517">SUSE bug 1016517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016884">SUSE bug 1016884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016979">SUSE bug 1016979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017164">SUSE bug 1017164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017170">SUSE bug 1017170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017410">SUSE bug 1017410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018100">SUSE bug 1018100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018316">SUSE bug 1018316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018358">SUSE bug 1018358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018446">SUSE bug 1018446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018813">SUSE bug 1018813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018913">SUSE bug 1018913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019061">SUSE bug 1019061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019148">SUSE bug 1019148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019168">SUSE bug 1019168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019260">SUSE bug 1019260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019351">SUSE bug 1019351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019594">SUSE bug 1019594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019630">SUSE bug 1019630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019631">SUSE bug 1019631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019784">SUSE bug 1019784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019851">SUSE bug 1019851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020048">SUSE bug 1020048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020214">SUSE bug 1020214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020488">SUSE bug 1020488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020602">SUSE bug 1020602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020685">SUSE bug 1020685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020817">SUSE bug 1020817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020945">SUSE bug 1020945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020975">SUSE bug 1020975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021082">SUSE bug 1021082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021248">SUSE bug 1021248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021251">SUSE bug 1021251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021260">SUSE bug 1021260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021294">SUSE bug 1021294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021455">SUSE bug 1021455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021474">SUSE bug 1021474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022304">SUSE bug 1022304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022429">SUSE bug 1022429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022547">SUSE bug 1022547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022559">SUSE bug 1022559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022971">SUSE bug 1022971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023101">SUSE bug 1023101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023762">SUSE bug 1023762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023884">SUSE bug 1023884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023888">SUSE bug 1023888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024081">SUSE bug 1024081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024234">SUSE bug 1024234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024508">SUSE bug 1024508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921494">SUSE bug 921494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959709">SUSE bug 959709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964944">SUSE bug 964944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969479">SUSE bug 969479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974215">SUSE bug 974215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981709">SUSE bug 981709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985561">SUSE bug 985561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987192">SUSE bug 987192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987576">SUSE bug 987576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989056">SUSE bug 989056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991273">SUSE bug 991273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998106">SUSE bug 998106</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5576/">CVE-2017-5576</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5577/">CVE-2017-5577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79995" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024130" ref_url="https://bugzilla.suse.com/1024130" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002674.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fixed a possible denial of service vulnerability (affected only
  configurations using both DNS64 and RPZ, CVE-2017-3135, bsc#1024130)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-02"/>
	<updated date="2017-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550013" comment="bind-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550014" comment="bind-chrootenv-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532737" comment="bind-doc-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550015" comment="bind-libs-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547858" comment="bind-libs-32bit-9.9.9P1-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550016" comment="bind-utils-9.9.9P1-56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79996" version="1" class="patch">
	<metadata>
		<title>Security update for libquicktime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1022805" ref_url="https://bugzilla.suse.com/1022805" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002681.html" source="SUSE-SU"/>
		<description>

This update for libquicktime fixes the following issues:

- A crafted MP4 file could have caused libquicktime to crash or lead to
  undefined behaviour (bsc#1022805, CVE-2016-2399)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-06"/>
	<updated date="2017-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550017" comment="libquicktime0-1.2.4-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79997" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1019274" ref_url="https://bugzilla.suse.com/1019274" source="BUGZILLA"/>
		<reference ref_id="1023012" ref_url="https://bugzilla.suse.com/1023012" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207/" source="CVE"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<description>

This update for tigervnc provides the following fixes:

- Prevent malicious server from crashing a server via a buffer overflow, a similar flaw as the LibVNCServer issues CVE-2016-9941 and CVE-2016-9942. (bsc#1019274)
- CVE-2016-10207: Prevent potential crash due to insufficient clean-up after failure to establish TLS
  connection. (bsc#1023012)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-07"/>
	<updated date="2017-03-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023012">SUSE bug 1023012</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550018" comment="libXvnc1-1.6.0-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550019" comment="tigervnc-1.6.0-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550020" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79998" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1014702" ref_url="https://bugzilla.suse.com/1014702" source="BUGZILLA"/>
		<reference ref_id="1015169" ref_url="https://bugzilla.suse.com/1015169" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="1017081" ref_url="https://bugzilla.suse.com/1017081" source="BUGZILLA"/>
		<reference ref_id="1017084" ref_url="https://bugzilla.suse.com/1017084" source="BUGZILLA"/>
		<reference ref_id="1020491" ref_url="https://bugzilla.suse.com/1020491" source="BUGZILLA"/>
		<reference ref_id="1020589" ref_url="https://bugzilla.suse.com/1020589" source="BUGZILLA"/>
		<reference ref_id="1020928" ref_url="https://bugzilla.suse.com/1020928" source="BUGZILLA"/>
		<reference ref_id="1021129" ref_url="https://bugzilla.suse.com/1021129" source="BUGZILLA"/>
		<reference ref_id="1021195" ref_url="https://bugzilla.suse.com/1021195" source="BUGZILLA"/>
		<reference ref_id="1021481" ref_url="https://bugzilla.suse.com/1021481" source="BUGZILLA"/>
		<reference ref_id="1022541" ref_url="https://bugzilla.suse.com/1022541" source="BUGZILLA"/>
		<reference ref_id="1023004" ref_url="https://bugzilla.suse.com/1023004" source="BUGZILLA"/>
		<reference ref_id="1023053" ref_url="https://bugzilla.suse.com/1023053" source="BUGZILLA"/>
		<reference ref_id="1023073" ref_url="https://bugzilla.suse.com/1023073" source="BUGZILLA"/>
		<reference ref_id="1023907" ref_url="https://bugzilla.suse.com/1023907" source="BUGZILLA"/>
		<reference ref_id="1024972" ref_url="https://bugzilla.suse.com/1024972" source="BUGZILLA"/>
		<reference ref_id="1026583" ref_url="https://bugzilla.suse.com/1026583" source="BUGZILLA"/>
		<reference ref_id="977027" ref_url="https://bugzilla.suse.com/977027" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<description>

This update for qemu fixes several issues.

These security issues were fixed:

- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1023907).
- CVE-2017-5857: The Virtio GPU Device emulator support was vulnerable to a host memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1023073).
- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024972)
- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004)
- CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1023053)
- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1014702)
- CVE-2016-10029: The Virtio GPU Device emulator support was vulnerable to an OOB read issue allowing a guest user to crash the Qemu process instance resulting in Dos (bsc#1017081).
- CVE-2016-10028: The Virtio GPU Device emulator support was vulnerable to an out of bounds memory access issue allowing a guest user to crash the Qemu process instance on a host, resulting in DoS (bsc#1017084).
- CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1021129)
- CVE-2017-5552: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1021195).
- CVE-2017-5578: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue allowing a guest user to leak host memory resulting in DoS (bsc#1021481).
- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020589).
- CVE-2017-5525: The ac97 audio device emulation support was vulnerable to a memory leakage issue allowing a privileged user inside the guest to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1020491).
- CVE-2017-5667: The SDHCI device emulation support was vulnerable to an OOB heap access issue allowing a privileged user inside the guest to crash the Qemu process resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host (bsc#1022541).
- CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow allowing a privileged user inside the guest to crash the Qemu process resulting in DoS (bnc#1023907)

These non-security issues were fixed:

- Fix name of s390x specific sysctl configuration file to end with .conf (bsc#1026583)
- XHCI fixes (bsc#977027)
- Fixed rare race during s390x guest reboot
- Fixed various inaccuracies in cirrus vga device emulation
- Fixed cause of infrequent migration failures from bad virtio device state (bsc#1020928)
- Fixed graphical update errors introduced by previous security fix (bsc#1016779)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-07"/>
	<updated date="2017-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020491">SUSE bug 1020491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020928">SUSE bug 1020928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021195">SUSE bug 1021195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021481">SUSE bug 1021481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022541">SUSE bug 1022541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023073">SUSE bug 1023073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026583">SUSE bug 1026583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977027">SUSE bug 977027</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79999" version="1" class="patch">
	<metadata>
		<title>Recommended update for dbus-1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1025950" ref_url="https://bugzilla.suse.com/1025950" source="BUGZILLA"/>
		<reference ref_id="1025951" ref_url="https://bugzilla.suse.com/1025951" source="BUGZILLA"/>
		<reference ref_id="974092" ref_url="https://bugzilla.suse.com/974092" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002694.html" source="SUSE-SU"/>
		<description>

This update for dbus-1 fixes the following issues:

Security issues fixed:
- Symlink attack in nonce-tcp transport. (bsc#1025950)
- Symlink attack in unit tests. (bsc#1025951)

Bugfixes:
- Remove sysvinit script, not used under systemd. (bsc#974092)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1025950">SUSE bug 1025950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025951">SUSE bug 1025951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974092">SUSE bug 974092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550031" comment="dbus-1-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550032" comment="dbus-1-x11-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550033" comment="libdbus-1-3-1.8.22-24.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547866" comment="libdbus-1-3-32bit-1.8.22-24.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80000" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1006796" ref_url="https://bugzilla.suse.com/1006796" source="BUGZILLA"/>
		<reference ref_id="1007600" ref_url="https://bugzilla.suse.com/1007600" source="BUGZILLA"/>
		<reference ref_id="1011057" ref_url="https://bugzilla.suse.com/1011057" source="BUGZILLA"/>
		<reference ref_id="1013496" ref_url="https://bugzilla.suse.com/1013496" source="BUGZILLA"/>
		<reference ref_id="1024200" ref_url="https://bugzilla.suse.com/1024200" source="BUGZILLA"/>
		<reference ref_id="971031" ref_url="https://bugzilla.suse.com/971031" source="BUGZILLA"/>
		<reference ref_id="994598" ref_url="https://bugzilla.suse.com/994598" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002697.html" source="SUSE-SU"/>
		<description>

This update for open-vm-tools to 10.1.0 stable brings features, fixes bugs
and security issues:

- New vmware-namespace-cmd command line utility
- GTK3 support
- Common Agent Framework (CAF)
- Guest authentication with xmlsec1
- Sub-command to push updated network information to the host on demand
- Fix for quiesced snapshot failure leaving guest file system quiesced (bsc#1006796)
- Fix for CVE-2015-5191 (bsc#1007600)
- Report SLES for SAP 12 guest OS as SLES 12 (bsc#1013496)
- Add udev rule to increase VMware virtual disk timeout values (bsc#994598) 
- Fix vmtoolsd init script to run vmtoolsd in background (bsc#971031)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-15"/>
	<updated date="2017-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1006796">SUSE bug 1006796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011057">SUSE bug 1011057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013496">SUSE bug 1013496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024200">SUSE bug 1024200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971031">SUSE bug 971031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994598">SUSE bug 994598</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518489" comment="libvmtools0-10.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518490" comment="open-vm-tools-10.1.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518491" comment="open-vm-tools-desktop-10.1.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80001" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1028391" ref_url="https://bugzilla.suse.com/1028391" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox to ESR 45.8 fixes the following issues:

Security issues fixed (bsc#1028391):
- CVE-2017-5402: Use-after-free working with events in FontFace objects
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service
- CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80002" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002707.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545314" comment="java-1_7_1-ibm-1.7.1_sr4.1-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534345" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.1-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545315" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.1-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534348" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.1-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80003" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027197" ref_url="https://bugzilla.suse.com/1027197" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002700.html" source="SUSE-SU"/>
		<description>

This update for sane-backends fixes the following issues:

- saned could have leaked uninitialized memory back to its requesters for some
  opcodes, allowing for information disclosure of saned memory
  (CVE-2017-6318, bsc#1027197).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-17"/>
	<updated date="2017-03-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550036" comment="sane-backends-1.0.24-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80004" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013311" ref_url="https://bugzilla.suse.com/1013311" source="BUGZILLA"/>
		<reference ref_id="911886" ref_url="https://bugzilla.suse.com/911886" source="BUGZILLA"/>
		<reference ref_id="935573" ref_url="https://bugzilla.suse.com/935573" source="BUGZILLA"/>
		<reference ref_id="951404" ref_url="https://bugzilla.suse.com/951404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00010.html" source="SUSE-SU"/>
		<description>

This update of freeradius-server fixes several issues.

Security issue fixed:
- CVE-2015-4680: Fixed Insufficent CRL application for intermediate certificates (bsc#935573)

Non security issues fixed:
- Allows FreeRadius Server to start on SUSE Linux Enterprise Server 12 SP2 systems
  by relaxing a too strict openssl version check. (bsc#1013311)
- Fixed radclient error free() invalid pointer (bsc#911886)
- Fixed failing rebuild of freeradius-server package (bsc#951404)
  
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-10"/>
	<updated date="2017-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013311">SUSE bug 1013311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911886">SUSE bug 911886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951404">SUSE bug 951404</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550037" comment="freeradius-server-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550038" comment="freeradius-server-doc-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550039" comment="freeradius-server-krb5-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550040" comment="freeradius-server-ldap-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550041" comment="freeradius-server-libs-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550042" comment="freeradius-server-mysql-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550043" comment="freeradius-server-perl-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550044" comment="freeradius-server-postgresql-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550045" comment="freeradius-server-python-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550046" comment="freeradius-server-sqlite-3.0.3-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550047" comment="freeradius-server-utils-3.0.3-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80005" version="1" class="patch">
	<metadata>
		<title>Security update for rrdtool (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="828003" ref_url="https://bugzilla.suse.com/828003" source="BUGZILLA"/>
		<reference ref_id="967671" ref_url="https://bugzilla.suse.com/967671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002549.html" source="SUSE-SU"/>
		<description>

This update for rrdtool provides the following fixes:

- CVE-2013-2131: Enhance imginfo format validation checks to prevent crashes. (bsc#828003)
- Add rrdtool-cached sub-package to SLE 12-SP1. (bsc#967671)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-10"/>
	<updated date="2017-01-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/828003">SUSE bug 828003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967671">SUSE bug 967671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550048" comment="rrdtool-1.4.7-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550049" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80006" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1016712" ref_url="https://bugzilla.suse.com/1016712" source="BUGZILLA"/>
		<reference ref_id="1016714" ref_url="https://bugzilla.suse.com/1016714" source="BUGZILLA"/>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1019380" ref_url="https://bugzilla.suse.com/1019380" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following security issues:

Security issues fixed:
- CVE-2016-0736: Protect mod_session_crypto data with a MAC to prevent padding oracle attacks (bsc#1016712).
- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash, resulting in DoS (bsc#1016714).
- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain misinterpretation (bsc#1016715).

Bugfixes:
- Add missing copy of hcuri and hcexpr from the worker to the health check worker (bsc#1019380).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016712">SUSE bug 1016712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019380">SUSE bug 1019380</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550050" comment="apache2-2.4.23-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532772" comment="apache2-doc-2.4.23-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550051" comment="apache2-example-pages-2.4.23-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550052" comment="apache2-prefork-2.4.23-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550053" comment="apache2-utils-2.4.23-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550054" comment="apache2-worker-2.4.23-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80007" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1028301" ref_url="https://bugzilla.suse.com/1028301" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002740.html" source="SUSE-SU"/>
		<description>

This update for wget fixes the following issues:

Security issue fixed:
- CVE-2017-6508: (url_parse): Reject control characters in host part of URL (bsc#1028301).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550055" comment="wget-1.14-20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80008" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1021616" ref_url="https://bugzilla.suse.com/1021616" source="BUGZILLA"/>
		<reference ref_id="1021627" ref_url="https://bugzilla.suse.com/1021627" source="BUGZILLA"/>
		<reference ref_id="1024232" ref_url="https://bugzilla.suse.com/1024232" source="BUGZILLA"/>
		<reference ref_id="1024244" ref_url="https://bugzilla.suse.com/1024244" source="BUGZILLA"/>
		<reference ref_id="1024992" ref_url="https://bugzilla.suse.com/1024992" source="BUGZILLA"/>
		<reference ref_id="1024993" ref_url="https://bugzilla.suse.com/1024993" source="BUGZILLA"/>
		<reference ref_id="1025505" ref_url="https://bugzilla.suse.com/1025505" source="BUGZILLA"/>
		<reference ref_id="1025507" ref_url="https://bugzilla.suse.com/1025507" source="BUGZILLA"/>
		<reference ref_id="1026723" ref_url="https://bugzilla.suse.com/1026723" source="BUGZILLA"/>
		<reference ref_id="1026725" ref_url="https://bugzilla.suse.com/1026725" source="BUGZILLA"/>
		<reference ref_id="1026922" ref_url="https://bugzilla.suse.com/1026922" source="BUGZILLA"/>
		<reference ref_id="1027108" ref_url="https://bugzilla.suse.com/1027108" source="BUGZILLA"/>
		<reference ref_id="1027376" ref_url="https://bugzilla.suse.com/1027376" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163/" source="CVE"/>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209/" source="CVE"/>
		<reference ref_id="CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210/" source="CVE"/>
		<reference ref_id="CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317/" source="CVE"/>
		<reference ref_id="CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<description>

This update for virglrenderer fixes the following issues:

Security issues fixed:
- CVE-2017-6386: memory leakage while in vrend_create_vertex_elements_state (bsc#1027376)
- CVE-2017-6355: integer overflow while creating shader object (bsc#1027108)
- CVE-2017-6317: fix memory leak in add shader program (bsc#1026922)
- CVE-2017-6210: null pointer dereference in vrend_decode_reset (bsc#1026725)
- CVE-2017-6209: stack buffer oveflow in parse_identifier (bsc#1026723)
- CVE-2017-5994: out-of-bounds access in vrend_create_vertex_elements_state (bsc#1025507)
- CVE-2017-5993: host memory leakage when initialising blitter context (bsc#1025505)
- CVE-2017-5957: stack overflow in vrend_decode_set_framebuffer_state (bsc#1024993)
- CVE-2017-5956: OOB access while in vrend_draw_vbo (bsc#1024992)
- CVE-2017-5937: null pointer dereference in vrend_clear (bsc#1024232)
- CVE-2017-5580: OOB access while parsing texture instruction (bsc#1021627)
- CVE-2016-10214: host memory leak issue in virgl_resource_attach_backing (bsc#1024244)
- CVE-2016-10163: host memory leakage when creating decode context (bsc#1021616)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-22"/>
	<updated date="2017-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021616">SUSE bug 1021616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021627">SUSE bug 1021627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024232">SUSE bug 1024232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024244">SUSE bug 1024244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024992">SUSE bug 1024992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024993">SUSE bug 1024993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025505">SUSE bug 1025505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025507">SUSE bug 1025507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026723">SUSE bug 1026723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026725">SUSE bug 1026725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026922">SUSE bug 1026922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027108">SUSE bug 1027108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027376">SUSE bug 1027376</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80009" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1025506" ref_url="https://bugzilla.suse.com/1025506" source="BUGZILLA"/>
		<reference ref_id="1027038" ref_url="https://bugzilla.suse.com/1027038" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002742.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-ibm fixes the following issues:

Security issue fixed:
- CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
  other protocols and products, have a birthday bound of approximately four billion blocks, which
  makes it easier for remote attackers to obtain cleartext data via a birthday attack against a
  long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
  aka a 'Sweet32' attack. (bsc#1027038)

Bugfixes:
- Require the main pkg in post phase of devel (bsc#1025506)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-28"/>
	<updated date="2017-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025506">SUSE bug 1025506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009547888" comment="java-1_8_0-ibm-1.8.0_sr4.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547889" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.1-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547890" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.1-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80010" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002745.html" source="SUSE-SU"/>
		<description>

This update for libpng16 fixes the following issues:

Security issues fixed:
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550057" comment="libpng16-16-1.6.8-14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547892" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80011" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012092" ref_url="https://bugzilla.suse.com/1012092" source="BUGZILLA"/>
		<reference ref_id="1019416" ref_url="https://bugzilla.suse.com/1019416" source="BUGZILLA"/>
		<reference ref_id="1023847" ref_url="https://bugzilla.suse.com/1023847" source="BUGZILLA"/>
		<reference ref_id="1024416" ref_url="https://bugzilla.suse.com/1024416" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="993707" ref_url="https://bugzilla.suse.com/993707" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00044.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:
- CVE-2017-2619: Symlink race permits opening files outside share directory (bsc#1027147).

Bugfixes:
- Force usage of ncurses6-config thru NCURSES_CONFIG env var (bsc#1023847).
- Add missing ldb module directory (bsc#1012092).
- Don't package man pages for VFS modules that aren't built (bsc#993707).
- sync_req: make async_connect_send() 'reentrant'; (bso#12105); (bsc#1024416).
- Document 'winbind: ignore domains' parameter; (bsc#1019416).
- Prevent core, make sure response-&gt;extra_data.data is always cleared out; (bsc#993692).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012092">SUSE bug 1012092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019416">SUSE bug 1019416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023847">SUSE bug 1023847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024416">SUSE bug 1024416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993707">SUSE bug 993707</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550058" comment="libdcerpc-binding0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550059" comment="libdcerpc-binding0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550060" comment="libdcerpc0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550061" comment="libdcerpc0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550062" comment="libndr-krb5pac0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550063" comment="libndr-krb5pac0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550064" comment="libndr-nbt0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550065" comment="libndr-nbt0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550066" comment="libndr-standard0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550067" comment="libndr-standard0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550068" comment="libndr0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550069" comment="libndr0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550070" comment="libnetapi0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550071" comment="libnetapi0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550072" comment="libsamba-credentials0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550073" comment="libsamba-credentials0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550074" comment="libsamba-errors0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550075" comment="libsamba-errors0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550076" comment="libsamba-hostconfig0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550077" comment="libsamba-hostconfig0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550078" comment="libsamba-passdb0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550079" comment="libsamba-passdb0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550080" comment="libsamba-util0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550081" comment="libsamba-util0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550082" comment="libsamdb0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550083" comment="libsamdb0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550084" comment="libsmbclient0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550085" comment="libsmbclient0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550086" comment="libsmbconf0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550087" comment="libsmbconf0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550088" comment="libsmbldap0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550089" comment="libsmbldap0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550090" comment="libtevent-util0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550091" comment="libtevent-util0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550092" comment="libwbclient0-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550093" comment="libwbclient0-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550094" comment="samba-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550095" comment="samba-client-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550096" comment="samba-client-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518532" comment="samba-doc-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550097" comment="samba-libs-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550098" comment="samba-libs-32bit-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550099" comment="samba-winbind-4.4.2-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550100" comment="samba-winbind-32bit-4.4.2-36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80012" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1019416" ref_url="https://bugzilla.suse.com/1019416" source="BUGZILLA"/>
		<reference ref_id="1024416" ref_url="https://bugzilla.suse.com/1024416" source="BUGZILLA"/>
		<reference ref_id="1027147" ref_url="https://bugzilla.suse.com/1027147" source="BUGZILLA"/>
		<reference ref_id="993692" ref_url="https://bugzilla.suse.com/993692" source="BUGZILLA"/>
		<reference ref_id="993707" ref_url="https://bugzilla.suse.com/993707" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00045.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issues fixed:
- CVE-2017-2619: Symlink race permits opening files outside share directory (bsc#1027147).

Bugfixes:
- Don't package man pages for VFS modules that aren't built (bsc#993707).
- sync_req: make async_connect_send() 'reentrant'; (bso#12105); (bsc#1024416).
- Document 'winbind: ignore domains' parameter; (bsc#1019416).
- Prevent core, make sure response-&gt;extra_data.data is always cleared out; (bsc#993692).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1019416">SUSE bug 1019416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024416">SUSE bug 1024416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993692">SUSE bug 993692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993707">SUSE bug 993707</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550101" comment="libdcerpc-atsvc0-4.2.4-28.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80013" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<description>

This update for libpng12 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-29"/>
	<updated date="2017-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550102" comment="libpng12-0-1.2.50-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547941" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80014" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027565" ref_url="https://bugzilla.suse.com/1027565" source="BUGZILLA"/>
		<reference ref_id="1028372" ref_url="https://bugzilla.suse.com/1028372" source="BUGZILLA"/>
		<reference ref_id="1030573" ref_url="https://bugzilla.suse.com/1030573" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00047.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 kernel was updated to fix the following security bugs:

- CVE-2017-7184: The Linux kernel allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via unspecified vectors, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bnc#1030573, bnc#1028372).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-03-30"/>
	<updated date="2017-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550103" comment="kernel-default-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550104" comment="kernel-default-base-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550105" comment="kernel-default-devel-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550106" comment="kernel-default-man-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518541" comment="kernel-devel-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518542" comment="kernel-macros-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518543" comment="kernel-source-4.4.49-92.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550107" comment="kernel-syms-4.4.49-92.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80015" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1018699" ref_url="https://bugzilla.suse.com/1018699" source="BUGZILLA"/>
		<reference ref_id="1018700" ref_url="https://bugzilla.suse.com/1018700" source="BUGZILLA"/>
		<reference ref_id="1018701" ref_url="https://bugzilla.suse.com/1018701" source="BUGZILLA"/>
		<reference ref_id="1018702" ref_url="https://bugzilla.suse.com/1018702" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- Fix a potential assertion failure that could have been triggered by a
  malformed response to an ANY query, thereby facilitating a denial-of-service
  attack. [CVE-2016-9131, bsc#1018700, bsc#1018699]

- Fix a potential assertion failure that could have been triggered by
  responding to a query with inconsistent DNSSEC information, thereby
  facilitating a denial-of-service attack. [CVE-2016-9147, bsc#1018701,
  bsc#1018699]

- Fix potential assertion failure that could have been triggered by DNS
  responses that contain unusually-formed DS resource records, facilitating a
  denial-of-service attack. [CVE-2016-9444, bsc#1018702, bsc#1018699]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-11"/>
	<updated date="2017-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550108" comment="bind-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550109" comment="bind-chrootenv-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532810" comment="bind-doc-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550110" comment="bind-libs-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547951" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550111" comment="bind-utils-9.9.9P1-53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80016" version="1" class="patch">
	<metadata>
		<title>Security update for audiofile (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1026978" ref_url="https://bugzilla.suse.com/1026978" source="BUGZILLA"/>
		<reference ref_id="1026979" ref_url="https://bugzilla.suse.com/1026979" source="BUGZILLA"/>
		<reference ref_id="1026980" ref_url="https://bugzilla.suse.com/1026980" source="BUGZILLA"/>
		<reference ref_id="1026981" ref_url="https://bugzilla.suse.com/1026981" source="BUGZILLA"/>
		<reference ref_id="1026982" ref_url="https://bugzilla.suse.com/1026982" source="BUGZILLA"/>
		<reference ref_id="1026983" ref_url="https://bugzilla.suse.com/1026983" source="BUGZILLA"/>
		<reference ref_id="1026984" ref_url="https://bugzilla.suse.com/1026984" source="BUGZILLA"/>
		<reference ref_id="1026985" ref_url="https://bugzilla.suse.com/1026985" source="BUGZILLA"/>
		<reference ref_id="1026986" ref_url="https://bugzilla.suse.com/1026986" source="BUGZILLA"/>
		<reference ref_id="1026987" ref_url="https://bugzilla.suse.com/1026987" source="BUGZILLA"/>
		<reference ref_id="1026988" ref_url="https://bugzilla.suse.com/1026988" source="BUGZILLA"/>
		<reference ref_id="949399" ref_url="https://bugzilla.suse.com/949399" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<description>

This audiofile update fixes the following issue:

Security issues fixed:
- CVE-2015-7747: Fixed buffer overflow issue when changing both number of channels and sample format. (bsc#949399)
- CVE-2017-6827: heap-based buffer overflow in MSADPCM::initializeCoefficients (MSADPCM.cpp) (bsc#1026979)
- CVE-2017-6828: heap-based buffer overflow in readValue (FileHandle.cpp) (bsc#1026980)
- CVE-2017-6829: global buffer overflow in decodeSample (IMA.cpp) (bsc#1026981)
- CVE-2017-6830: heap-based buffer overflow in alaw2linear_buf (G711.cpp) (bsc#1026982)
- CVE-2017-6831: heap-based buffer overflow in IMA::decodeBlockWAVE (IMA.cpp) (bsc#1026983)
- CVE-2017-6832: heap-based buffer overflow in MSADPCM::decodeBlock (MSADPCM.cpp) (bsc#1026984)
- CVE-2017-6833: divide-by-zero in BlockCodec::runPull (BlockCodec.cpp) (bsc#1026985)
- CVE-2017-6834: heap-based buffer overflow in ulaw2linear_buf (G711.cpp) (bsc#1026986)
- CVE-2017-6835: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp) (bsc#1026988)
- CVE-2017-6836: heap-based buffer overflow in Expand3To4Module::run (SimpleModule.h) (bsc#1026987)
- CVE-2017-6837, CVE-2017-6838, CVE-2017-6839: multiple ubsan crashes (bsc#1026978)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-05"/>
	<updated date="2017-04-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949399">SUSE bug 949399</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80017" version="1" class="patch">
	<metadata>
		<title>Security update for dracut (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005410" ref_url="https://bugzilla.suse.com/1005410" source="BUGZILLA"/>
		<reference ref_id="1006118" ref_url="https://bugzilla.suse.com/1006118" source="BUGZILLA"/>
		<reference ref_id="1007925" ref_url="https://bugzilla.suse.com/1007925" source="BUGZILLA"/>
		<reference ref_id="1008340" ref_url="https://bugzilla.suse.com/1008340" source="BUGZILLA"/>
		<reference ref_id="1008648" ref_url="https://bugzilla.suse.com/1008648" source="BUGZILLA"/>
		<reference ref_id="1017141" ref_url="https://bugzilla.suse.com/1017141" source="BUGZILLA"/>
		<reference ref_id="1017695" ref_url="https://bugzilla.suse.com/1017695" source="BUGZILLA"/>
		<reference ref_id="1019938" ref_url="https://bugzilla.suse.com/1019938" source="BUGZILLA"/>
		<reference ref_id="1020063" ref_url="https://bugzilla.suse.com/1020063" source="BUGZILLA"/>
		<reference ref_id="1021687" ref_url="https://bugzilla.suse.com/1021687" source="BUGZILLA"/>
		<reference ref_id="902375" ref_url="https://bugzilla.suse.com/902375" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002788.html" source="SUSE-SU"/>
		<description>

This update for dracut fixes the following issues:

Security issues fixed:

- CVE-2016-8637: When the early microcode loading was enabled during initrd creation, the initrd
  would be read-only available for all users, allowing local users to retrieve secrets stored in
  the initial ramdisk. (bsc#1008340)

Non security issues fixed:

- Remove zlib module as requirement. (bsc#1020063)
- Unlimit TaskMax for xfs_repair in emergency shell. (bsc#1019938)
- Resolve symbolic links for -i and -k parameters. (bsc#902375)
- Enhance purge-kernels script to handle kgraft patches. (bsc#1017141)
- Allow booting from degraded MD arrays with systemd. (bsc#1017695)
- Allow booting on s390x with fips=1 on the kernel command line. (bnc#1021687)
- Start multipath services before local-fs-pre.target. (bsc#1005410, bsc#1006118, bsc#1007925)
- Fix /sbin/installkernel to handle kernel packages built with 'make bin-rpmpkg'. (bsc#1008648)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005410">SUSE bug 1005410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006118">SUSE bug 1006118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007925">SUSE bug 1007925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008648">SUSE bug 1008648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017141">SUSE bug 1017141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017695">SUSE bug 1017695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019938">SUSE bug 1019938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020063">SUSE bug 1020063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021687">SUSE bug 1021687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902375">SUSE bug 902375</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550114" comment="dracut-044-108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550115" comment="dracut-fips-044-108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80018" version="1" class="patch">
	<metadata>
		<title>Security update for libpng15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017646" ref_url="https://bugzilla.suse.com/1017646" source="BUGZILLA"/>
		<reference ref_id="958791" ref_url="https://bugzilla.suse.com/958791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<description>

This update for libpng15 fixes the following issues:

Security issues fixed:
- CVE-2015-8540: read underflow in libpng (bsc#958791)
- CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550116" comment="libpng15-15-1.5.22-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80019" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015400" ref_url="https://bugzilla.suse.com/1015400" source="BUGZILLA"/>
		<reference ref_id="1018088" ref_url="https://bugzilla.suse.com/1018088" source="BUGZILLA"/>
		<reference ref_id="1020353" ref_url="https://bugzilla.suse.com/1020353" source="BUGZILLA"/>
		<reference ref_id="1021868" ref_url="https://bugzilla.suse.com/1021868" source="BUGZILLA"/>
		<reference ref_id="1029497" ref_url="https://bugzilla.suse.com/1029497" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following issues:

Security issues fixed:
- CVE-2016-9600: Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder (bsc#1018088)
- CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c) (bsc#1029497)
- CVE-2017-5498: left-shift undefined behaviour (bsc#1020353)
- CVE-2017-6850: NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868)
- CVE-2016-9583: Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-06"/>
	<updated date="2017-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550117" comment="libjasper1-1.900.14-194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547958" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80020" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024044" ref_url="https://bugzilla.suse.com/1024044" source="BUGZILLA"/>
		<reference ref_id="1024068" ref_url="https://bugzilla.suse.com/1024068" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-bad fixes the following issues:

Security issues fixed:
- CVE-2017-5843: set stream tags to NULL after unrefing (bsc#1024044).
- CVE-2017-5848: rewrite PSM parsing to add bounds checking (bsc#1024068).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024044">SUSE bug 1024044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024068">SUSE bug 1024068</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550118" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518552" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550119" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550120" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550121" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550122" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550123" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550124" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550125" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550126" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550127" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541177" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80021" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024051" ref_url="https://bugzilla.suse.com/1024051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002791.html" source="SUSE-SU"/>
		<description>

This update for gstreamer fixes the following security issues:

- A crafted AVI file could have caused an invalid memory read, possibly
  causing DoS or corruption (bsc#1024051, CVE-2017-5838)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-07"/>
	<updated date="2017-04-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550128" comment="gstreamer-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518564" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550129" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550130" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550131" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550132" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80022" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1015348" ref_url="https://bugzilla.suse.com/1015348" source="BUGZILLA"/>
		<reference ref_id="1022555" ref_url="https://bugzilla.suse.com/1022555" source="BUGZILLA"/>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1028235" ref_url="https://bugzilla.suse.com/1028235" source="BUGZILLA"/>
		<reference ref_id="1029128" ref_url="https://bugzilla.suse.com/1029128" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1030442" ref_url="https://bugzilla.suse.com/1030442" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00013.html" source="SUSE-SU"/>
		<description>

This update for xen to version 4.7.2 fixes the following issues:

These security issues were fixed:

- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).

These non-security issues were fixed:

- bsc#1015348: libvirtd didn't not start during boot
- bsc#1014136: kdump couldn't dump a kernel on SLES12-SP2 with Xen hypervisor.
- bsc#1026236: Fixed paravirtualized performance
- bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add'
- bsc#1029827: Forward port xenstored
- bsc#1029128: Make xen to really produce xen.efi with gcc48
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-11"/>
	<updated date="2017-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015348">SUSE bug 1015348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022555">SUSE bug 1022555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029128">SUSE bug 1029128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518569" comment="xen-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550133" comment="xen-doc-html-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518570" comment="xen-libs-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518571" comment="xen-libs-32bit-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550134" comment="xen-tools-4.7.2_02-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550135" comment="xen-tools-domU-4.7.2_02-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80023" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020983" ref_url="https://bugzilla.suse.com/1020983" source="BUGZILLA"/>
		<reference ref_id="1033466" ref_url="https://bugzilla.suse.com/1033466" source="BUGZILLA"/>
		<reference ref_id="1033467" ref_url="https://bugzilla.suse.com/1033467" source="BUGZILLA"/>
		<reference ref_id="1033468" ref_url="https://bugzilla.suse.com/1033468" source="BUGZILLA"/>
		<reference ref_id="987866" ref_url="https://bugzilla.suse.com/987866" source="BUGZILLA"/>
		<reference ref_id="989528" ref_url="https://bugzilla.suse.com/989528" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170/" source="CVE"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

CVE-2017-3137 (bsc#1033467):
Mistaken assumptions about the ordering of records in the answer
section of a response containing CNAME or DNAME resource records
could have been exploited to cause a denial of service of a bind
server performing recursion.

CVE-2017-3136 (bsc#1033466):
An attacker could have constructed a query that would cause a denial
of service of servers configured to use DNS64.

CVE-2017-3138 (bsc#1033468):
An attacker with access to the BIND control channel could have caused
the server to stop by triggering an assertion failure.

CVE-2016-6170 (bsc#987866):
Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response.
IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response.
Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message.

CVE-2016-2775 (bsc#989528):
When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service 
(daemon crash) via a long request that uses the lightweight resolver protocol.

One additional non-security bug was fixed:

The default umask was changed to 077. (bsc#1020983)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020983">SUSE bug 1020983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550136" comment="bind-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550137" comment="bind-chrootenv-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532836" comment="bind-doc-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550138" comment="bind-libs-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547968" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550139" comment="bind-utils-9.9.9P1-59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80024" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-0_10-plugins-base fixes the following security issues:

- A crafted AVI file could have caused a floating point exception leading to
  DoS (bsc#1024076, CVE-2017-5837, bsc#1024079, CVE-2017-5844)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550140" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550141" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550142" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80025" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024014" ref_url="https://bugzilla.suse.com/1024014" source="BUGZILLA"/>
		<reference ref_id="1024017" ref_url="https://bugzilla.suse.com/1024017" source="BUGZILLA"/>
		<reference ref_id="1024030" ref_url="https://bugzilla.suse.com/1024030" source="BUGZILLA"/>
		<reference ref_id="1024034" ref_url="https://bugzilla.suse.com/1024034" source="BUGZILLA"/>
		<reference ref_id="1024062" ref_url="https://bugzilla.suse.com/1024062" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-good fixes the following issues:

- A crafted aac audio file could have caused an invalid read and thus
  corruption or denial of service (bsc#1024014, CVE-2016-10198)
- A crafted mp4 file could have caused an invalid read and thus corruption or
  denial of service (bsc#1024017, CVE-2016-10199)
- A crafted avi file could have caused an invalid read and thus corruption or
  denial of service (bsc#1024034, CVE-2017-5840)
- A crafted AVI file with metadata tag entries (ncdt) could have caused
  invalid read access and thus corruption or denial of service (bsc#1024030,
  CVE-2017-5841)
- A crafted avi file could have caused an invalid read access resulting in
  denial of service (bsc#1024062, CVE-2017-5845)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-13"/>
	<updated date="2017-04-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024030">SUSE bug 1024030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550143" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80026" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024041" ref_url="https://bugzilla.suse.com/1024041" source="BUGZILLA"/>
		<reference ref_id="1024047" ref_url="https://bugzilla.suse.com/1024047" source="BUGZILLA"/>
		<reference ref_id="1024076" ref_url="https://bugzilla.suse.com/1024076" source="BUGZILLA"/>
		<reference ref_id="1024079" ref_url="https://bugzilla.suse.com/1024079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<description>

This update for gstreamer-plugins-base fixes the following security issues:

- A crafted AVI file could have caused a floating point exception leading to
  DoS (bsc#1024076, CVE-2017-5837, bsc#1024079, CVE-2017-5844)
- A crafted AVI file could have caused a stack overflow leading to DoS
  (bsc#1024047, CVE-2017-5839)
- A crafted SAMI subtitle file could have caused an invalid memory access
  possibly leading to DoS or corruption (bsc#1024041, CVE-2017-5842)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550144" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550145" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550146" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550147" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550148" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550149" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550150" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550151" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550152" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550153" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550154" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550155" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550156" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550157" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550158" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550159" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550160" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80027" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1033053" ref_url="https://bugzilla.suse.com/1033053" source="BUGZILLA"/>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following security issues:

- CVE-2017-7586: A stack-based buffer overflow via a specially crafted FLAC
  file was fixed (error in the 'header_read()' function) (bsc#1033053)
- CVE-2017-7585,CVE-2017-7741, CVE-2017-7742: Several stack-based buffer overflows via a specially crafted FLAC
  file (error in the 'flac_buffer_copy()' function) were fixed (bsc#1033054,bsc#1033915,bsc#1033914).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033053">SUSE bug 1033053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550161" comment="libsndfile1-1.0.25-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547992" comment="libsndfile1-32bit-1.0.25-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80028" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015332" ref_url="https://bugzilla.suse.com/1015332" source="BUGZILLA"/>
		<reference ref_id="1027712" ref_url="https://bugzilla.suse.com/1027712" source="BUGZILLA"/>
		<reference ref_id="1032309" ref_url="https://bugzilla.suse.com/1032309" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

Security issue fixed:

- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).

With this release new default ciphers are active (SUSE_DEFAULT, bsc#1027712).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027712">SUSE bug 1027712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550162" comment="curl-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550163" comment="libcurl4-7.37.0-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547995" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80029" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1031247" ref_url="https://bugzilla.suse.com/1031247" source="BUGZILLA"/>
		<reference ref_id="1031249" ref_url="https://bugzilla.suse.com/1031249" source="BUGZILLA"/>
		<reference ref_id="1031250" ref_url="https://bugzilla.suse.com/1031250" source="BUGZILLA"/>
		<reference ref_id="1031254" ref_url="https://bugzilla.suse.com/1031254" source="BUGZILLA"/>
		<reference ref_id="1031255" ref_url="https://bugzilla.suse.com/1031255" source="BUGZILLA"/>
		<reference ref_id="1031262" ref_url="https://bugzilla.suse.com/1031262" source="BUGZILLA"/>
		<reference ref_id="1031263" ref_url="https://bugzilla.suse.com/1031263" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

Security issues fixed:
- CVE-2016-10272: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to
  'WRITE of size 2048' and libtiff/tif_next.c:64:9 (bsc#1031247).
- CVE-2016-10271: tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of
  service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other
  impact via a crafted TIFF image, related to 'READ of size 1' and libtiff/tif_fax3.c:413:13
  (bsc#1031249).
- CVE-2016-10270: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to
  'READ of size 8' and libtiff/tif_read.c:523:22 (bsc#1031250).
- CVE-2016-10269: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based
  buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to
  'READ of size 512' and libtiff/tif_unix.c:340:2 (bsc#1031254).
- CVE-2016-10268: tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of
  service (integer underflow and heap-based buffer under-read) or possibly have unspecified other
  impact via a crafted TIFF image, related to 'READ of size 78490' and libtiff/tif_unix.c:115:23
  (bsc#1031255).
- CVE-2016-10267: LibTIFF 4.0.7 allows remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related to
  libtiff/tif_ojpeg.c:816:8 (bsc#1031262).
- CVE-2016-10266: LibTIFF 4.0.7 allows remote attackers to cause a denial of service
  (divide-by-zero error and application crash) via a crafted TIFF image, related to
  libtiff/tif_read.c:351:22. (bsc#1031263).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031247">SUSE bug 1031247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031249">SUSE bug 1031249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031262">SUSE bug 1031262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80030" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1014172" ref_url="https://bugzilla.suse.com/1014172" source="BUGZILLA"/>
		<reference ref_id="1030050" ref_url="https://bugzilla.suse.com/1030050" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<description>

This ntp update to version 4.2.8p10 fixes serveral issues.

This updated enables leap smearing. See
/usr/share/doc/packages/ntp/README.leapsmear for details.

Security issues fixed (bsc#1030050):

- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:

- Remove spurious log messages (bsc#1014172).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-18"/>
	<updated date="2017-04-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1014172">SUSE bug 1014172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80031" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1014863" ref_url="https://bugzilla.suse.com/1014863" source="BUGZILLA"/>
		<reference ref_id="1018808" ref_url="https://bugzilla.suse.com/1018808" source="BUGZILLA"/>
		<reference ref_id="887877" ref_url="https://bugzilla.suse.com/887877" source="BUGZILLA"/>
		<reference ref_id="909695" ref_url="https://bugzilla.suse.com/909695" source="BUGZILLA"/>
		<reference ref_id="926974" ref_url="https://bugzilla.suse.com/926974" source="BUGZILLA"/>
		<reference ref_id="936032" ref_url="https://bugzilla.suse.com/936032" source="BUGZILLA"/>
		<reference ref_id="959495" ref_url="https://bugzilla.suse.com/959495" source="BUGZILLA"/>
		<reference ref_id="986630" ref_url="https://bugzilla.suse.com/986630" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855/" source="CVE"/>
		<reference ref_id="CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900/" source="CVE"/>
		<reference ref_id="CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<description>

This ruby2.1 update to version 2.1.9 fixes the following issues:

Security issues fixed:
- CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new'initialize' (bsc#1018808)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)
- CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032)
- CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of
  hostnames (bsc#926974)
- CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877)

Bugfixes:
- SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863)
- Segmentation fault after pack &amp; ioctl &amp; unpack (bsc#909695)
- Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog:
- http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-20"/>
	<updated date="2017-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014863">SUSE bug 1014863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018808">SUSE bug 1018808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887877">SUSE bug 887877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909695">SUSE bug 909695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550168" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550169" comment="ruby2.1-2.1.9-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550170" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80032" version="1" class="patch">
	<metadata>
		<title>Security update for minicom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1033783" ref_url="https://bugzilla.suse.com/1033783" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002823.html" source="SUSE-SU"/>
		<description>

This update for minicom fixes the following issue:

This security issue was fixed:

- CVE-2017-7467: Invalid cursor coordinates and scroll regions could lead to code execution (bsc#1033783).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-21"/>
	<updated date="2017-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550171" comment="minicom-2.7-3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80033" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024929" ref_url="https://bugzilla.suse.com/1024929" source="BUGZILLA"/>
		<reference ref_id="1026833" ref_url="https://bugzilla.suse.com/1026833" source="BUGZILLA"/>
		<reference ref_id="1031045" ref_url="https://bugzilla.suse.com/1031045" source="BUGZILLA"/>
		<reference ref_id="1031875" ref_url="https://bugzilla.suse.com/1031875" source="BUGZILLA"/>
		<reference ref_id="1031877" ref_url="https://bugzilla.suse.com/1031877" source="BUGZILLA"/>
		<reference ref_id="1031879" ref_url="https://bugzilla.suse.com/1031879" source="BUGZILLA"/>
		<reference ref_id="1031886" ref_url="https://bugzilla.suse.com/1031886" source="BUGZILLA"/>
		<reference ref_id="1032272" ref_url="https://bugzilla.suse.com/1032272" source="BUGZILLA"/>
		<reference ref_id="1032880" ref_url="https://bugzilla.suse.com/1032880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392/" source="CVE"/>
		<reference ref_id="CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393/" source="CVE"/>
		<reference ref_id="CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394/" source="CVE"/>
		<reference ref_id="CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395/" source="CVE"/>
		<reference ref_id="CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<description>

This update for tigervnc provides the several fixes.

These security issues were fixed:

- CVE-2017-7392, CVE-2017-7396: Client can cause leak in VNC server (bsc#1031886)
- CVE-2017-7395: Authenticated VNC client can crash VNC server (bsc#1031877)
- CVE-2017-7394: Client can crash or block VNC server (bsc#1031879)
- CVE-2017-7393: Authenticated client can cause double free in VNC server (bsc#1031875)
- Prevent buffer overflow in VNC client, allowing for crashing the client (bnc#1032880)

These non-security issues were fixed:

- Prevent client disconnection caused by invalid cursor manipulation. (bsc#1024929, bsc#1031045)
- Readd index.vnc. (bsc#1026833)
- Crop operations to visible screen. (bnc#1032272)  
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-22"/>
	<updated date="2017-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024929">SUSE bug 1024929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026833">SUSE bug 1026833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031045">SUSE bug 1031045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031875">SUSE bug 1031875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031877">SUSE bug 1031877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032272">SUSE bug 1032272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032880">SUSE bug 1032880</bugzilla>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550172" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550173" comment="tigervnc-1.6.0-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550174" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80034" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump, libpcap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020940" ref_url="https://bugzilla.suse.com/1020940" source="BUGZILLA"/>
		<reference ref_id="1035686" ref_url="https://bugzilla.suse.com/1035686" source="BUGZILLA"/>
		<reference ref_id="905870" ref_url="https://bugzilla.suse.com/905870" source="BUGZILLA"/>
		<reference ref_id="905871" ref_url="https://bugzilla.suse.com/905871" source="BUGZILLA"/>
		<reference ref_id="905872" ref_url="https://bugzilla.suse.com/905872" source="BUGZILLA"/>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922221" ref_url="https://bugzilla.suse.com/922221" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="922223" ref_url="https://bugzilla.suse.com/922223" source="BUGZILLA"/>
		<reference ref_id="927637" ref_url="https://bugzilla.suse.com/927637" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<description>

This update for tcpdump to version 4.9.0 and libpcap to version 1.8.1 fixes the several issues.

These security issues were fixed in tcpdump:

- CVE-2016-7922: The AH parser in tcpdump had a buffer overflow in print-ah.c:ah_print() (bsc#1020940).
- CVE-2016-7923: The ARP parser in tcpdump had a buffer overflow in print-arp.c:arp_print() (bsc#1020940).
- CVE-2016-7924: The ATM parser in tcpdump had a buffer overflow in print-atm.c:oam_print() (bsc#1020940).
- CVE-2016-7925: The compressed SLIP parser in tcpdump had a buffer overflow in print-sl.c:sl_if_print() (bsc#1020940).
- CVE-2016-7926: The Ethernet parser in tcpdump had a buffer overflow in print-ether.c:ethertype_print() (bsc#1020940).
- CVE-2016-7927: The IEEE 802.11 parser in tcpdump had a buffer overflow in print-802_11.c:ieee802_11_radio_print() (bsc#1020940).
- CVE-2016-7928: The IPComp parser in tcpdump had a buffer overflow in print-ipcomp.c:ipcomp_print() (bsc#1020940).
- CVE-2016-7929: The Juniper PPPoE ATM parser in tcpdump had a buffer overflow in print-juniper.c:juniper_parse_header() (bsc#1020940).
- CVE-2016-7930: The LLC/SNAP parser in tcpdump had a buffer overflow in print-llc.c:llc_print() (bsc#1020940).
- CVE-2016-7931: The MPLS parser in tcpdump had a buffer overflow in print-mpls.c:mpls_print() (bsc#1020940).
- CVE-2016-7932: The PIM parser in tcpdump had a buffer overflow in print-pim.c:pimv2_check_checksum() (bsc#1020940).
- CVE-2016-7933: The PPP parser in tcpdump had a buffer overflow in print-ppp.c:ppp_hdlc_if_print() (bsc#1020940).
- CVE-2016-7934: The RTCP parser in tcpdump had a buffer overflow in print-udp.c:rtcp_print() (bsc#1020940).
- CVE-2016-7935: The RTP parser in tcpdump had a buffer overflow in print-udp.c:rtp_print() (bsc#1020940).
- CVE-2016-7936: The UDP parser in tcpdump had a buffer overflow in print-udp.c:udp_print() (bsc#1020940).
- CVE-2016-7937: The VAT parser in tcpdump had a buffer overflow in print-udp.c:vat_print() (bsc#1020940).
- CVE-2016-7938: The ZeroMQ parser in tcpdump had an integer overflow in print-zeromq.c:zmtp1_print_frame() (bsc#1020940).
- CVE-2016-7939: The GRE parser in tcpdump had a buffer overflow in print-gre.c, multiple functions (bsc#1020940).
- CVE-2016-7940: The STP parser in tcpdump had a buffer overflow in print-stp.c, multiple functions (bsc#1020940).
- CVE-2016-7973: The AppleTalk parser in tcpdump had a buffer overflow in print-atalk.c, multiple functions (bsc#1020940).
- CVE-2016-7974: The IP parser in tcpdump had a buffer overflow in print-ip.c, multiple functions (bsc#1020940).
- CVE-2016-7975: The TCP parser in tcpdump had a buffer overflow in print-tcp.c:tcp_print() (bsc#1020940).
- CVE-2016-7983: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2016-7984: The TFTP parser in tcpdump had a buffer overflow in print-tftp.c:tftp_print() (bsc#1020940).
- CVE-2016-7985: The CALM FAST parser in tcpdump had a buffer overflow in print-calm-fast.c:calm_fast_print() (bsc#1020940).
- CVE-2016-7986: The GeoNetworking parser in tcpdump had a buffer overflow in print-geonet.c, multiple functions (bsc#1020940).
- CVE-2016-7992: The Classical IP over ATM parser in tcpdump had a buffer overflow in print-cip.c:cip_if_print() (bsc#1020940).
- CVE-2016-7993: A bug in util-print.c:relts_print() in tcpdump could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM) (bsc#1020940).
- CVE-2016-8574: The FRF.15 parser in tcpdump had a buffer overflow in print-fr.c:frf15_print() (bsc#1020940).
- CVE-2016-8575: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482 (bsc#1020940).
- CVE-2017-5202: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2017-5203: The BOOTP parser in tcpdump had a buffer overflow in print-bootp.c:bootp_print() (bsc#1020940).
- CVE-2017-5204: The IPv6 parser in tcpdump had a buffer overflow in print-ip6.c:ip6_print() (bsc#1020940).
- CVE-2017-5205: The ISAKMP parser in tcpdump had a buffer overflow in print-isakmp.c:ikev2_e_print() (bsc#1020940).
- CVE-2017-5341: The OTV parser in tcpdump had a buffer overflow in print-otv.c:otv_print() (bsc#1020940).
- CVE-2017-5342: In tcpdump a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print() (bsc#1020940).
- CVE-2017-5482: The Q.933 parser in tcpdump had a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575 (bsc#1020940).
- CVE-2017-5483: The SNMP parser in tcpdump had a buffer overflow in print-snmp.c:asn1_parse() (bsc#1020940).
- CVE-2017-5484: The ATM parser in tcpdump had a buffer overflow in print-atm.c:sig_print() (bsc#1020940).
- CVE-2017-5485: The ISO CLNS parser in tcpdump had a buffer overflow in addrtoname.c:lookup_nsap() (bsc#1020940).
- CVE-2017-5486: The ISO CLNS parser in tcpdump had a buffer overflow in print-isoclns.c:clnp_print() (bsc#1020940).
- CVE-2015-3138: Fixed potential denial of service in print-wb.c (bsc#927637).
- CVE-2015-0261: Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value (bsc#922220).
- CVE-2015-2153: The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU) (bsc#922221).
- CVE-2015-2154: The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump allowed remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value (bsc#922222).
- CVE-2015-2155: The force printer in tcpdump allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors (bsc#922223).
- CVE-2014-8767: Integer underflow in the olsr_print function in tcpdump 3.9.6 when in verbose mode, allowed remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame (bsc#905870).
- CVE-2014-8768: Multiple Integer underflows in the geonet_print function in tcpdump when run in verbose mode, allowed remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame (bsc#905871).
- CVE-2014-8769: tcpdump might have allowed remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access (bsc#905872).

These non-security issues were fixed in tcpdump:

- PPKI to Router Protocol: Fix Segmentation Faults and other problems
- RPKI to Router Protocol: print strings with fn_printn()
- Added a short option '#', same as long option '--number'
- nflog, mobile, forces, pptp, AODV, AHCP, IPv6, OSPFv4, RPL, DHCPv6 enhancements/fixes
- M3UA decode added.
- Added bittok2str().
- A number of unaligned access faults fixed
- The -A flag does not consider CR to be printable anymore
- fx.lebail took over coverity baby sitting
- Default snapshot size increased to 256K for accomodate USB captures

These non-security issues were fixed in libpcap:

- Provide a -devel-static subpackage that contains the static
  libraries and all the extra dependencies which are not needed
  for dynamic linking.
- Fix handling of packet count in the TPACKET_V3 inner loop
- Filter out duplicate looped back CAN frames.
- Fix the handling of loopback filters for IPv6 packets.
- Add a link-layer header type for RDS (IEC 62106) groups.
- Handle all CAN captures with pcap-linux.c, in cooked mode.
- Removes the need for the 'host-endian' link-layer header type.
- Have separate DLTs for big-endian and host-endian SocketCAN headers.
- Properly check for sock_recv() errors.
- Re-impose some of Winsock's limitations on sock_recv().
- Replace sprintf() with pcap_snprintf().
- Fix signature of pcap_stats_ex_remote().
- Have rpcap_remoteact_getsock() return a SOCKET and supply an 'is active' flag.
- Clean up {DAG, Septel, Myricom SNF}-only builds.
- pcap_create_interface() needs the interface name on Linux.
- Clean up hardware time stamp support: the 'any' device does not support any time stamp types.
- Recognize 802.1ad nested VLAN tag in vlan filter.
- Support for filtering Geneve encapsulated packets.
- Fix handling of zones for BPF on Solaris
- Added bpf_filter1() with extensions
- EBUSY can now be returned by SNFv3 code.
- Don't crash on filters testing a non-existent link-layer type field.
- Fix sending in non-blocking mode on Linux with memory-mapped capture.
- Fix timestamps when reading pcap-ng files on big-endian machines.
- Fixes for byte order issues with NFLOG captures
- Handle using cooked mode for DLT_NETLINK in activate_new().
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-26"/>
	<updated date="2017-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035686">SUSE bug 1035686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927637">SUSE bug 927637</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80035" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002626" ref_url="https://bugzilla.suse.com/1002626" source="BUGZILLA"/>
		<reference ref_id="1010457" ref_url="https://bugzilla.suse.com/1010457" source="BUGZILLA"/>
		<reference ref_id="1012546" ref_url="https://bugzilla.suse.com/1012546" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002560.html" source="SUSE-SU"/>
		<description>

This update for perl-DBD-mysql fixes the following issues:

- CVE-2016-1251: A use-after-free when used with mysql_server_prepare=1 (bsc#1012546).
- CVE-2016-1246: Buffer overflow allowed context-dependent attackers to cause a denial of service (crash) via vectors related to an error message (bsc#1002626).
- CVE-2016-1249: Out-of-bounds read when using server-side prepared statement support (bsc#1010457).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550177" comment="perl-DBD-mysql-4.021-11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80036" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032114" ref_url="https://bugzilla.suse.com/1032114" source="BUGZILLA"/>
		<reference ref_id="1032120" ref_url="https://bugzilla.suse.com/1032120" source="BUGZILLA"/>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerabilities:

CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
exploited in the wild. (bsc#1036453)

CVE-2016-9601: An integer overflow in the bundled jbig2dec library could have been misused to cause
a Denial-of-Service. (bsc#1018128)

CVE-2016-10220: A NULL pointer dereference in the PDF Transparency module allowed remote attackers
to cause a Denial-of-Service. (bsc#1032120)

CVE-2017-5951: A NULL pointer dereference allowed remote attackers to cause a denial of service
via a crafted PostScript document. (bsc#1032114)

CVE-2017-7207: A NULL pointer dereference allowed remote attackers to cause a denial of service
via a crafted PostScript document. (bsc#1030263)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-04-28"/>
	<updated date="2017-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550178" comment="ghostscript-9.15-20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550179" comment="ghostscript-x11-9.15-20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80037" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1022703" ref_url="https://bugzilla.suse.com/1022703" source="BUGZILLA"/>
		<reference ref_id="1028655" ref_url="https://bugzilla.suse.com/1028655" source="BUGZILLA"/>
		<reference ref_id="1029827" ref_url="https://bugzilla.suse.com/1029827" source="BUGZILLA"/>
		<reference ref_id="1030144" ref_url="https://bugzilla.suse.com/1030144" source="BUGZILLA"/>
		<reference ref_id="1034843" ref_url="https://bugzilla.suse.com/1034843" source="BUGZILLA"/>
		<reference ref_id="1034844" ref_url="https://bugzilla.suse.com/1034844" source="BUGZILLA"/>
		<reference ref_id="1034994" ref_url="https://bugzilla.suse.com/1034994" source="BUGZILLA"/>
		<reference ref_id="1036146" ref_url="https://bugzilla.suse.com/1036146" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00003.html" source="SUSE-SU"/>
		<description>

This update for xen fixes several issues.

These security issues were fixed:

- A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
- A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
- CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
- CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

These non-security issues were fixed:

- bsc#1029827: Additional xenstore patch
- bsc#1036146: Xen VM dumped core to wrong path
- bsc#1022703: Prevent Xen HVM guest with OVMF to hang with unattached CDRom
  		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1022703">SUSE bug 1022703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029827">SUSE bug 1029827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030144">SUSE bug 1030144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034843">SUSE bug 1034843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034844">SUSE bug 1034844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036146">SUSE bug 1036146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518607" comment="xen-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550180" comment="xen-doc-html-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518608" comment="xen-libs-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518609" comment="xen-libs-32bit-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550181" comment="xen-tools-4.7.2_04-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550182" comment="xen-tools-domU-4.7.2_04-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80038" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1035204" ref_url="https://bugzilla.suse.com/1035204" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00008.html" source="SUSE-SU"/>
		<description>

This update for graphite2 fixes one issue.

This security issues was fixed:

- CVE-2017-5436: An out-of-bounds write triggered with a maliciously crafted Graphite font could lead to a crash or potentially code execution (bsc#1035204).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-02"/>
	<updated date="2017-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550183" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548017" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80039" version="1" class="patch">
	<metadata>
		<title>Security update for apparmor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000201" ref_url="https://bugzilla.suse.com/1000201" source="BUGZILLA"/>
		<reference ref_id="1016259" ref_url="https://bugzilla.suse.com/1016259" source="BUGZILLA"/>
		<reference ref_id="1022610" ref_url="https://bugzilla.suse.com/1022610" source="BUGZILLA"/>
		<reference ref_id="1029696" ref_url="https://bugzilla.suse.com/1029696" source="BUGZILLA"/>
		<reference ref_id="1031529" ref_url="https://bugzilla.suse.com/1031529" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002841.html" source="SUSE-SU"/>
		<description>

This update for apparmor provides the following fixes:

This security issue was fixed:

- CVE-2017-6507: Preserve unknown profiles when reloading apparmor.service (bsc#1029696)

These non-security issues were fixed:

- Add tunables/kernelvars abstraction. (bsc#1031529)
- Update flags of ntpd profile. (bsc#1022610)
- Force AppArmor to start after /var/lib mounts. (bsc#1016259)
- Update mlmmj profiles. (bsc#1000201)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-03"/>
	<updated date="2017-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000201">SUSE bug 1000201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016259">SUSE bug 1016259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022610">SUSE bug 1022610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029696">SUSE bug 1029696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031529">SUSE bug 1031529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550184" comment="apache2-mod_apparmor-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517324" comment="apparmor-docs-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550185" comment="apparmor-parser-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517326" comment="apparmor-profiles-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517327" comment="apparmor-utils-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550186" comment="libapparmor1-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548021" comment="libapparmor1-32bit-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550187" comment="pam_apparmor-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548023" comment="pam_apparmor-32bit-2.8.2-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550188" comment="perl-apparmor-2.8.2-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80040" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1016168" ref_url="https://bugzilla.suse.com/1016168" source="BUGZILLA"/>
		<reference ref_id="1016169" ref_url="https://bugzilla.suse.com/1016169" source="BUGZILLA"/>
		<reference ref_id="949942" ref_url="https://bugzilla.suse.com/949942" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="CVE-2016-10003" ref_url="https://www.suse.com/security/cve/CVE-2016-10003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002562.html" source="SUSE-SU"/>
		<description>

This update for squid fixes the following issues:

- CVE-2016-10003: Prevent incorrect forwarding of cached private responses when Collapsed Forwarding feature is enabled. This allowed remote attacker (proxy user) to discover private and sensitive information about another user (bsc#1016169).
- CVE-2016-10002: Fixed incorrect processing of responses to If-None-Modified HTTP conditional requests. This allowed responses containing private data to clients it should not have reached (bsc#1016168).
- CVE-2014-9749: Prevent nonce replay in Digest authentication, preventing the reuse of stale auth tokens (bsc#949942).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016169">SUSE bug 1016169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10003/">CVE-2016-10003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550189" comment="squid-3.5.21-25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80041" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007454" ref_url="https://bugzilla.suse.com/1007454" source="BUGZILLA"/>
		<reference ref_id="1008519" ref_url="https://bugzilla.suse.com/1008519" source="BUGZILLA"/>
		<reference ref_id="1009109" ref_url="https://bugzilla.suse.com/1009109" source="BUGZILLA"/>
		<reference ref_id="1013285" ref_url="https://bugzilla.suse.com/1013285" source="BUGZILLA"/>
		<reference ref_id="1013341" ref_url="https://bugzilla.suse.com/1013341" source="BUGZILLA"/>
		<reference ref_id="1013764" ref_url="https://bugzilla.suse.com/1013764" source="BUGZILLA"/>
		<reference ref_id="1013767" ref_url="https://bugzilla.suse.com/1013767" source="BUGZILLA"/>
		<reference ref_id="1014109" ref_url="https://bugzilla.suse.com/1014109" source="BUGZILLA"/>
		<reference ref_id="1014110" ref_url="https://bugzilla.suse.com/1014110" source="BUGZILLA"/>
		<reference ref_id="1014111" ref_url="https://bugzilla.suse.com/1014111" source="BUGZILLA"/>
		<reference ref_id="1014112" ref_url="https://bugzilla.suse.com/1014112" source="BUGZILLA"/>
		<reference ref_id="1014256" ref_url="https://bugzilla.suse.com/1014256" source="BUGZILLA"/>
		<reference ref_id="1014514" ref_url="https://bugzilla.suse.com/1014514" source="BUGZILLA"/>
		<reference ref_id="1016779" ref_url="https://bugzilla.suse.com/1016779" source="BUGZILLA"/>
		<reference ref_id="937125" ref_url="https://bugzilla.suse.com/937125" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<description>

qemu was updated to fix several issues.

These security issues were fixed:

- CVE-2016-9102: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number (bsc#1014256).
- CVE-2016-9103: The v9fs_xattrcreate function in hw/9pfs/9p.c in allowed local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values writing to them (bsc#1007454).
- CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109)
- CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013285).
- CVE-2016-9845: The Virtio GPU Device emulator support as vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1013767).
- CVE-2016-9846: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while updating the cursor data in update_cursor_data_virgl. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1013764).
- CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'.  A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014109).
- CVE-2016-9908: The Virtio GPU Device emulator support was vulnerable to an information leakage issue while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could have used this flaw to leak contents of the host memory (bsc#1014514).
- CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014111).
- CVE-2016-9912: The Virtio GPU Device emulator support was vulnerable to a memory leakage issue while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could have used this flaw to leak host memory bytes, resulting in DoS for the host (bsc#1014112).
- CVE-2016-9913: VirtFS was vulnerable to memory leakage issue via its '9p-handle' or '9p-proxy' backend drivers. A privileged user inside guest could have used this flaw to leak host memory, thus affecting other services on the host and/or potentially crash the Qemu process on the host (bsc#1014110).

These non-security issues were fixed:

- Fixed uint64 property parsing and add regression tests (bsc#937125)
- Added a man page for kvm_stat
- Fix crash in vte (bsc#1008519)
- Various upstream commits targeted towards stable releases (bsc#1013341)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-13"/>
	<updated date="2017-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008519">SUSE bug 1008519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013341">SUSE bug 1013341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013764">SUSE bug 1013764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013767">SUSE bug 1013767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014112">SUSE bug 1014112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014256">SUSE bug 1014256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014514">SUSE bug 1014514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016779">SUSE bug 1016779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937125">SUSE bug 937125</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80042" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1007959" ref_url="https://bugzilla.suse.com/1007959" source="BUGZILLA"/>
		<reference ref_id="1007962" ref_url="https://bugzilla.suse.com/1007962" source="BUGZILLA"/>
		<reference ref_id="1008842" ref_url="https://bugzilla.suse.com/1008842" source="BUGZILLA"/>
		<reference ref_id="1010032" ref_url="https://bugzilla.suse.com/1010032" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012910" ref_url="https://bugzilla.suse.com/1012910" source="BUGZILLA"/>
		<reference ref_id="1013994" ref_url="https://bugzilla.suse.com/1013994" source="BUGZILLA"/>
		<reference ref_id="1014136" ref_url="https://bugzilla.suse.com/1014136" source="BUGZILLA"/>
		<reference ref_id="1015609" ref_url="https://bugzilla.suse.com/1015609" source="BUGZILLA"/>
		<reference ref_id="1017461" ref_url="https://bugzilla.suse.com/1017461" source="BUGZILLA"/>
		<reference ref_id="1017641" ref_url="https://bugzilla.suse.com/1017641" source="BUGZILLA"/>
		<reference ref_id="1018263" ref_url="https://bugzilla.suse.com/1018263" source="BUGZILLA"/>
		<reference ref_id="1018419" ref_url="https://bugzilla.suse.com/1018419" source="BUGZILLA"/>
		<reference ref_id="1019163" ref_url="https://bugzilla.suse.com/1019163" source="BUGZILLA"/>
		<reference ref_id="1019614" ref_url="https://bugzilla.suse.com/1019614" source="BUGZILLA"/>
		<reference ref_id="1019618" ref_url="https://bugzilla.suse.com/1019618" source="BUGZILLA"/>
		<reference ref_id="1020048" ref_url="https://bugzilla.suse.com/1020048" source="BUGZILLA"/>
		<reference ref_id="1021762" ref_url="https://bugzilla.suse.com/1021762" source="BUGZILLA"/>
		<reference ref_id="1022340" ref_url="https://bugzilla.suse.com/1022340" source="BUGZILLA"/>
		<reference ref_id="1022785" ref_url="https://bugzilla.suse.com/1022785" source="BUGZILLA"/>
		<reference ref_id="1023866" ref_url="https://bugzilla.suse.com/1023866" source="BUGZILLA"/>
		<reference ref_id="1024015" ref_url="https://bugzilla.suse.com/1024015" source="BUGZILLA"/>
		<reference ref_id="1025683" ref_url="https://bugzilla.suse.com/1025683" source="BUGZILLA"/>
		<reference ref_id="1026024" ref_url="https://bugzilla.suse.com/1026024" source="BUGZILLA"/>
		<reference ref_id="1026405" ref_url="https://bugzilla.suse.com/1026405" source="BUGZILLA"/>
		<reference ref_id="1026462" ref_url="https://bugzilla.suse.com/1026462" source="BUGZILLA"/>
		<reference ref_id="1026505" ref_url="https://bugzilla.suse.com/1026505" source="BUGZILLA"/>
		<reference ref_id="1026509" ref_url="https://bugzilla.suse.com/1026509" source="BUGZILLA"/>
		<reference ref_id="1026692" ref_url="https://bugzilla.suse.com/1026692" source="BUGZILLA"/>
		<reference ref_id="1026722" ref_url="https://bugzilla.suse.com/1026722" source="BUGZILLA"/>
		<reference ref_id="1027054" ref_url="https://bugzilla.suse.com/1027054" source="BUGZILLA"/>
		<reference ref_id="1027066" ref_url="https://bugzilla.suse.com/1027066" source="BUGZILLA"/>
		<reference ref_id="1027153" ref_url="https://bugzilla.suse.com/1027153" source="BUGZILLA"/>
		<reference ref_id="1027179" ref_url="https://bugzilla.suse.com/1027179" source="BUGZILLA"/>
		<reference ref_id="1027189" ref_url="https://bugzilla.suse.com/1027189" source="BUGZILLA"/>
		<reference ref_id="1027190" ref_url="https://bugzilla.suse.com/1027190" source="BUGZILLA"/>
		<reference ref_id="1027195" ref_url="https://bugzilla.suse.com/1027195" source="BUGZILLA"/>
		<reference ref_id="1027273" ref_url="https://bugzilla.suse.com/1027273" source="BUGZILLA"/>
		<reference ref_id="1027616" ref_url="https://bugzilla.suse.com/1027616" source="BUGZILLA"/>
		<reference ref_id="1028017" ref_url="https://bugzilla.suse.com/1028017" source="BUGZILLA"/>
		<reference ref_id="1028027" ref_url="https://bugzilla.suse.com/1028027" source="BUGZILLA"/>
		<reference ref_id="1028041" ref_url="https://bugzilla.suse.com/1028041" source="BUGZILLA"/>
		<reference ref_id="1028158" ref_url="https://bugzilla.suse.com/1028158" source="BUGZILLA"/>
		<reference ref_id="1028217" ref_url="https://bugzilla.suse.com/1028217" source="BUGZILLA"/>
		<reference ref_id="1028325" ref_url="https://bugzilla.suse.com/1028325" source="BUGZILLA"/>
		<reference ref_id="1028415" ref_url="https://bugzilla.suse.com/1028415" source="BUGZILLA"/>
		<reference ref_id="1028819" ref_url="https://bugzilla.suse.com/1028819" source="BUGZILLA"/>
		<reference ref_id="1028895" ref_url="https://bugzilla.suse.com/1028895" source="BUGZILLA"/>
		<reference ref_id="1029220" ref_url="https://bugzilla.suse.com/1029220" source="BUGZILLA"/>
		<reference ref_id="1029514" ref_url="https://bugzilla.suse.com/1029514" source="BUGZILLA"/>
		<reference ref_id="1029634" ref_url="https://bugzilla.suse.com/1029634" source="BUGZILLA"/>
		<reference ref_id="1029986" ref_url="https://bugzilla.suse.com/1029986" source="BUGZILLA"/>
		<reference ref_id="1030118" ref_url="https://bugzilla.suse.com/1030118" source="BUGZILLA"/>
		<reference ref_id="1030213" ref_url="https://bugzilla.suse.com/1030213" source="BUGZILLA"/>
		<reference ref_id="1031003" ref_url="https://bugzilla.suse.com/1031003" source="BUGZILLA"/>
		<reference ref_id="1031052" ref_url="https://bugzilla.suse.com/1031052" source="BUGZILLA"/>
		<reference ref_id="1031200" ref_url="https://bugzilla.suse.com/1031200" source="BUGZILLA"/>
		<reference ref_id="1031206" ref_url="https://bugzilla.suse.com/1031206" source="BUGZILLA"/>
		<reference ref_id="1031208" ref_url="https://bugzilla.suse.com/1031208" source="BUGZILLA"/>
		<reference ref_id="1031440" ref_url="https://bugzilla.suse.com/1031440" source="BUGZILLA"/>
		<reference ref_id="1031481" ref_url="https://bugzilla.suse.com/1031481" source="BUGZILLA"/>
		<reference ref_id="1031579" ref_url="https://bugzilla.suse.com/1031579" source="BUGZILLA"/>
		<reference ref_id="1031660" ref_url="https://bugzilla.suse.com/1031660" source="BUGZILLA"/>
		<reference ref_id="1031662" ref_url="https://bugzilla.suse.com/1031662" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1031831" ref_url="https://bugzilla.suse.com/1031831" source="BUGZILLA"/>
		<reference ref_id="1032006" ref_url="https://bugzilla.suse.com/1032006" source="BUGZILLA"/>
		<reference ref_id="1032673" ref_url="https://bugzilla.suse.com/1032673" source="BUGZILLA"/>
		<reference ref_id="1032681" ref_url="https://bugzilla.suse.com/1032681" source="BUGZILLA"/>
		<reference ref_id="897662" ref_url="https://bugzilla.suse.com/897662" source="BUGZILLA"/>
		<reference ref_id="951844" ref_url="https://bugzilla.suse.com/951844" source="BUGZILLA"/>
		<reference ref_id="968697" ref_url="https://bugzilla.suse.com/968697" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="970083" ref_url="https://bugzilla.suse.com/970083" source="BUGZILLA"/>
		<reference ref_id="977572" ref_url="https://bugzilla.suse.com/977572" source="BUGZILLA"/>
		<reference ref_id="977860" ref_url="https://bugzilla.suse.com/977860" source="BUGZILLA"/>
		<reference ref_id="978056" ref_url="https://bugzilla.suse.com/978056" source="BUGZILLA"/>
		<reference ref_id="980892" ref_url="https://bugzilla.suse.com/980892" source="BUGZILLA"/>
		<reference ref_id="981634" ref_url="https://bugzilla.suse.com/981634" source="BUGZILLA"/>
		<reference ref_id="982783" ref_url="https://bugzilla.suse.com/982783" source="BUGZILLA"/>
		<reference ref_id="987899" ref_url="https://bugzilla.suse.com/987899" source="BUGZILLA"/>
		<reference ref_id="988281" ref_url="https://bugzilla.suse.com/988281" source="BUGZILLA"/>
		<reference ref_id="991173" ref_url="https://bugzilla.suse.com/991173" source="BUGZILLA"/>
		<reference ref_id="998106" ref_url="https://bugzilla.suse.com/998106" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191/" source="CVE"/>
		<reference ref_id="CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345/" source="CVE"/>
		<reference ref_id="CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346/" source="CVE"/>
		<reference ref_id="CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347/" source="CVE"/>
		<reference ref_id="CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<reference ref_id="CVE-2017-7374" ref_url="https://www.suse.com/security/cve/CVE-2017-7374/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.58 to receive various security and bugfixes.

Notable new/improved features:
- Improved support for Hyper-V
- Support for Matrox G200eH3
- Support for tcp_westwood

The following security bugs were fixed:

- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was  too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).
- CVE-2017-7374: Use-after-free vulnerability in fs/crypto/ in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely (bnc#1032006).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).
- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).
- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189).
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).
- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).
- CVE-2017-6347: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel had incorrect expectations about skb data layout, which allowed local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (bnc#1027179).
- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842).
- CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel improperly emulated the VMXON instruction, which allowed KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references (bnc#1022785).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024).

The following non-security bugs were fixed:

- ACPI, ioapic: Clear on-stack resource before using it (bsc#1028819).
- ACPI: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819).
- ACPI: Remove platform devices from a bus on removal (bsc#1028819).
- HID: usbhid: Quirk a AMI virtual mouse and keyboard with ALWAYS_POLL (bsc#1022340).
- NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041).
- NFS: flush out dirty data on file fput() (bsc#1021762).
- PCI: hv: Fix wslot_to_devfn() to fix warnings on device removal (bug#1028217).
- PCI: hv: Use device serial number as PCI domain (bug#1028217).
- RAID1: a new I/O barrier implementation to remove resync window (bsc#998106,bsc#1020048,bsc#982783).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#998106,bsc#1020048,bsc#982783).
- Revert 'RDMA/core: Fix incorrect structure packing for booleans' (kabi).
- Revert 'give up on gcc ilog2() constant optimizations' (kabi).
- Revert 'net/mlx4_en: Avoid unregister_netdev at shutdown flow' (bsc#1028017).
- Revert 'net: introduce device min_header_len' (kabi).
- Revert 'nfit, libnvdimm: fix interleave set cookie calculation' (kabi).
- Revert 'target: Fix NULL dereference during LUN lookup + active I/O shutdown' (kabi).
- acpi, nfit: fix acpi_nfit_flush_probe() crash (bsc#1031717).
- acpi, nfit: fix extended status translations for ACPI DSMs (bsc#1031717).
- arm64: Use full path in KBUILD_IMAGE definition (bsc#1010032).
- arm64: hugetlb: fix the wrong address for several functions (bsc#1032681).
- arm64: hugetlb: fix the wrong return value for huge_ptep_set_access_flags (bsc#1032681).
- arm64: hugetlb: remove the wrong pmd check in find_num_contig() (bsc#1032681).
- arm: Use full path in KBUILD_IMAGE definition (bsc#1010032).
- bnx2x: allow adding VLANs while interface is down (bsc#1027273).
- bonding: fix 802.3ad aggregator reselection (bsc#1029514).
- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1019614).
- btrfs: allow unlink to exceed subvolume quota (bsc#1019614).
- btrfs: backref: Fix soft lockup in __merge_refs function (bsc#1017641).
- btrfs: incremental send, do not delay rename when parent inode is new (bsc#1028325).
- btrfs: incremental send, do not issue invalid rmdir operations (bsc#1028325).
- btrfs: qgroup: Move half of the qgroup accounting time out of commit trans (bsc#1017461).
- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1019614).
- btrfs: send, fix failure to rename top level inode due to name collision (bsc#1028325).
- btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844 bsc#1024015)
- cgroup/pids: remove spurious suspicious RCU usage warning (bnc#1031831).
- crypto: algif_hash - avoid zero-sized array (bnc#1007962).
- cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692).
- device-dax: fix private mapping restriction, permit read-only (bsc#1031717).
- drm/i915: Add intel_uncore_suspend / resume functions (bsc#1011913).
- drm/i915: Fix crash after S3 resume with DP MST mode change (bsc#1029634).
- drm/i915: Listen for PMIC bus access notifications (bsc#1011913).
- drm/i915: Only enable hotplug interrupts if the display interrupts are enabled (bsc#1031717).
- drm/mgag200: Added support for the new device G200eH3 (bsc#1007959)
- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
- futex: Add missing error handling to FUTEX_REQUEUE_PI (bsc#969755).
- futex: Fix potential use-after-free in FUTEX_REQUEUE_PI (bsc#969755).
- hv: export current Hyper-V clocksource (bsc#1031206).
- hv: util: do not forget to init host_ts.lock (bsc#1031206).
- hv: vmbus: Prevent sending data on a rescinded channel (bug#1028217).
- hv_utils: implement Hyper-V PTP source (bsc#1031206).
- i2c-designware: increase timeout (bsc#1011913).
- i2c: designware-baytrail: Acquire P-Unit access on bus acquire (bsc#1011913).
- i2c: designware-baytrail: Call pmic_bus_access_notifier_chain (bsc#1011913).
- i2c: designware-baytrail: Fix race when resetting the semaphore (bsc#1011913).
- i2c: designware-baytrail: Only check iosf_mbi_available() for shared hosts (bsc#1011913).
- i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM method (bsc#1011913).
- i2c: designware: Never suspend i2c-busses used for accessing the system PMIC (bsc#1011913).
- i2c: designware: Rename accessor_flags to flags (bsc#1011913).
- iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off (bsc#1031208).
- kABI: protect struct iscsi_conn (kabi).
- kABI: protect struct se_node_acl (kabi).
- kABI: restore can_rx_register parameters (kabi).
- kgr/module: make a taint flag module-specific
- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
- kgr: remove all arch-specific kgraft header files
- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).
- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).
- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).
- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
- l2tp: lock socket before checking flags in connect() (bsc#1028415).
- libnvdimm, pfn: fix memmap reservation size versus 4K alignment (bsc#1031717).
- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
- md/raid1: Refactor raid1_make_request (bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: add rcu protection to rdev in fix_read_error (References: bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: handle flush request correctly (bsc#998106,bsc#1020048,bsc#982783).
- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
- mm/memblock.c: fix memblock_next_valid_pfn() (bnc#1031200).
- mm/page_alloc: Remove useless parameter of __free_pages_boot_core (bnc#1027195).
- mm: fix set pageblock migratetype in deferred struct page init (bnc#1027195).
- mm: page_alloc: skip over regions of invalid pfns where possible (bnc#1031200).
- module: move add_taint_module() to a header file
- net/ena: change condition for host attribute configuration (bsc#1026509).
- net/ena: change driver's default timeouts (bsc#1026509).
- net/ena: fix NULL dereference when removing the driver after device reset failed (bsc#1026509).
- net/ena: fix RSS default hash configuration (bsc#1026509).
- net/ena: fix ethtool RSS flow configuration (bsc#1026509).
- net/ena: fix potential access to freed memory during device reset (bsc#1026509).
- net/ena: fix queues number calculation (bsc#1026509).
- net/ena: reduce the severity of ena printouts (bsc#1026509).
- net/ena: refactor ena_get_stats64 to be atomic context safe (bsc#1026509).
- net/ena: remove ntuple filter support from device feature list (bsc#1026509).
- net/ena: update driver version to 1.1.2 (bsc#1026509).
- net/ena: use READ_ONCE to access completion descriptors (bsc#1026509).
- net/mlx4_core: Avoid command timeouts during VF driver device shutdown (bsc#1028017).
- net/mlx4_core: Avoid delays during VF driver device shutdown (bsc#1028017).
- net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#1028017).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#1028017).
- net/mlx4_en: Fix bad WQE issue (bsc#1028017).
- net: ena: Fix error return code in ena_device_init() (bsc#1026509).
- net: ena: Remove unnecessary pci_set_drvdata() (bsc#1026509).
- net: ena: change the return type of ena_set_push_mode() to be void (bsc#1026509).
- net: ena: remove superfluous check in ena_remove() (bsc#1026509).
- net: ena: use setup_timer() and mod_timer() (bsc#1026509).
- netfilter: allow logging from non-init namespaces (bsc#970083).
- nvme: Do not suspend admin queue that wasn't created (bsc#1026505).
- nvme: Suspend all queues before deletion (bsc#1026505).
- ping: implement proper locking (bsc#1031003).
- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
- rtlwifi: rtl_usb: Fix missing entry in USB driver's private data (bsc#1026462).
- s390/kmsg: add missing kmsg descriptions (bnc#1025683).
- s390/mm: fix zone calculation in arch_add_memory() (bnc#1025683).
- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#1027054).
- scsi_dh_alua: Do not modify the interval value for retries (bsc#1012910).
- softirq: Let ksoftirqd do its job (bsc#1019618).
- x86, mm: fix gup_pte_range() vs DAX mappings (bsc#1026405).
- x86/apic/uv: Silence a shift wrapping warning (bsc#1023866).
- x86/ioapic: Change prototype of acpi_ioapic_add() (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix IOAPIC failing to request resource (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix incorrect pointers in ioapic_setup_resources() (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix lost IOAPIC resource after hot-removal and hotadd (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix setup_res() failing to get resource (bsc#1027153, bsc#1027616).
- x86/ioapic: Ignore root bridges without a companion ACPI device (bsc#1027153, bsc#1027616).
- x86/ioapic: Simplify ioapic_setup_resources() (bsc#1027153, bsc#1027616).
- x86/ioapic: Support hot-removal of IOAPICs present during boot (bsc#1027153, bsc#1027616).
- x86/ioapic: fix kABI (hide added include) (bsc#1027153, bsc#1027616).
- x86/mce: Do not print MCEs when mcelog is active (bsc#1013994).
- x86/mce: Fix copy/paste error in exception table entries
- x86/mm/gup: Simplify get_user_pages() PTE bit handling (bsc#1026405).
- x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866).
- x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866).
- x86/platform/UV: Add basic CPU NMI health check (bsc#1023866).
- x86/platform/UV: Clean up the NMI code to match current coding style (bsc#1023866).
- x86/platform/UV: Clean up the UV APIC code (bsc#1023866).
- x86/platform/UV: Ensure uv_system_init is called when necessary (bsc#1023866).
- x86/platform/UV: Fix 2 socket config problem (bsc#1023866).
- x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866).
- x86/platform/UV: Initialize PCH GPP_D_0 NMI Pin to be NMI source (bsc#1023866).
- x86/platform/UV: Verify NMI action is valid, default is standard (bsc#1023866).
- x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier (bsc#1011913).
- x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913).
- x86/platform: Remove warning message for duplicate NMI handlers (bsc#1029220).
- x86/ras/therm_throt: Do not log a fake MCE for thermal events (bsc#1028027).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xen/blkfront: Fix crash if backend does not follow the right states.
- xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163).
- xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163).
- xen: Use machine addresses in /sys/kernel/vmcoreinfo when PV (bsc#1014136)
- xfs: do not take the IOLOCK exclusive for direct I/O page invalidation (bsc#1015609).
- xgene_enet: remove bogus forward declarations (bsc#1032673).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-05"/>
	<updated date="2017-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1007959">SUSE bug 1007959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007962">SUSE bug 1007962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008842">SUSE bug 1008842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010032">SUSE bug 1010032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012910">SUSE bug 1012910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013994">SUSE bug 1013994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014136">SUSE bug 1014136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015609">SUSE bug 1015609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017461">SUSE bug 1017461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017641">SUSE bug 1017641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018263">SUSE bug 1018263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018419">SUSE bug 1018419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019163">SUSE bug 1019163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019614">SUSE bug 1019614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019618">SUSE bug 1019618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020048">SUSE bug 1020048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021762">SUSE bug 1021762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022340">SUSE bug 1022340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022785">SUSE bug 1022785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023866">SUSE bug 1023866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024015">SUSE bug 1024015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025683">SUSE bug 1025683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026405">SUSE bug 1026405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026462">SUSE bug 1026462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026505">SUSE bug 1026505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026509">SUSE bug 1026509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026692">SUSE bug 1026692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027054">SUSE bug 1027054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027153">SUSE bug 1027153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027189">SUSE bug 1027189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027190">SUSE bug 1027190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027195">SUSE bug 1027195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027273">SUSE bug 1027273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027616">SUSE bug 1027616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028017">SUSE bug 1028017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028027">SUSE bug 1028027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028041">SUSE bug 1028041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028158">SUSE bug 1028158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028217">SUSE bug 1028217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028325">SUSE bug 1028325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028819">SUSE bug 1028819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028895">SUSE bug 1028895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029220">SUSE bug 1029220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029514">SUSE bug 1029514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029634">SUSE bug 1029634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029986">SUSE bug 1029986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031200">SUSE bug 1031200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031206">SUSE bug 1031206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031208">SUSE bug 1031208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031662">SUSE bug 1031662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031831">SUSE bug 1031831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032006">SUSE bug 1032006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032673">SUSE bug 1032673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032681">SUSE bug 1032681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897662">SUSE bug 897662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951844">SUSE bug 951844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970083">SUSE bug 970083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977572">SUSE bug 977572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977860">SUSE bug 977860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978056">SUSE bug 978056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980892">SUSE bug 980892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981634">SUSE bug 981634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982783">SUSE bug 982783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987899">SUSE bug 987899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988281">SUSE bug 988281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991173">SUSE bug 991173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998106">SUSE bug 998106</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7374/">CVE-2017-7374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80043" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015119" ref_url="https://bugzilla.suse.com/1015119" source="BUGZILLA"/>
		<reference ref_id="1033447" ref_url="https://bugzilla.suse.com/1033447" source="BUGZILLA"/>
		<reference ref_id="1033448" ref_url="https://bugzilla.suse.com/1033448" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00019.html" source="SUSE-SU"/>
		<description>

This update for tomcat fixes the following issues:

   - CVE-2017-5647 Pipelined requests could lead to information disclosure (bsc#1033448)
   - CVE-2017-5648 Untrusted application could retain listener leading to information disclosure (bsc#1033447)
   - CVE-2016-8745 shared Processor on Connector code could lead to information disclosure (bsc#1015119)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-10"/>
	<updated date="2017-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033447">SUSE bug 1033447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532890" comment="tomcat-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532891" comment="tomcat-admin-webapps-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532892" comment="tomcat-docs-webapp-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532893" comment="tomcat-el-3_0-api-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532894" comment="tomcat-javadoc-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532895" comment="tomcat-jsp-2_3-api-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532896" comment="tomcat-lib-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532897" comment="tomcat-servlet-3_1-api-8.0.43-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532898" comment="tomcat-webapps-8.0.43-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80044" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1032248" ref_url="https://bugzilla.suse.com/1032248" source="BUGZILLA"/>
		<reference ref_id="854512" ref_url="https://bugzilla.suse.com/854512" source="BUGZILLA"/>
		<reference ref_id="932386" ref_url="https://bugzilla.suse.com/932386" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2669" ref_url="https://www.suse.com/security/cve/CVE-2017-2669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002859.html" source="SUSE-SU"/>
		<description>

This update for dovecot22 to version 2.2.29.1 fixes the following issues:

This security issue was fixed:

- CVE-2017-2669: Don't double-expand %variables in keys. If dict was used as the authentication passdb, using specially crafted %variables in the username could be used to cause DoS (bsc#1032248)

Additionally stronger SSL default ciphers are now used.

This non-security issue was fixed:

- Remove all references /etc/ssl/certs/. It should not be used anymore (bsc#932386)

More changes are available in the changelog. Please make sure you read
README.SUSE after installing this update.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-11"/>
	<updated date="2017-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032248">SUSE bug 1032248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854512">SUSE bug 854512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932386">SUSE bug 932386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2669/">CVE-2017-2669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532899" comment="dovecot-2.2-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550205" comment="dovecot22-2.2.29.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550206" comment="dovecot22-backend-mysql-2.2.29.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550207" comment="dovecot22-backend-pgsql-2.2.29.1-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550208" comment="dovecot22-backend-sqlite-2.2.29.1-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80045" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss, mozilla-nspr, java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015499" ref_url="https://bugzilla.suse.com/1015499" source="BUGZILLA"/>
		<reference ref_id="1015547" ref_url="https://bugzilla.suse.com/1015547" source="BUGZILLA"/>
		<reference ref_id="1021636" ref_url="https://bugzilla.suse.com/1021636" source="BUGZILLA"/>
		<reference ref_id="1026102" ref_url="https://bugzilla.suse.com/1026102" source="BUGZILLA"/>
		<reference ref_id="1030071" ref_url="https://bugzilla.suse.com/1030071" source="BUGZILLA"/>
		<reference ref_id="1035082" ref_url="https://bugzilla.suse.com/1035082" source="BUGZILLA"/>
		<reference ref_id="983639" ref_url="https://bugzilla.suse.com/983639" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<reference ref_id="CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to the Firefox ESR release 45.9.

Mozilla NSS was updated to support TLS 1.3 (close to release draft) and various new 
ciphers, PRFs, Diffie Hellman key agreement and support for more hashes.

Security issues fixed in Firefox (bsc#1035082)

- MFSA 2017-11/CVE-2017-5469: Potential Buffer overflow in flex-generated code
- MFSA 2017-11/CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1
- MFSA 2017-11/CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
- MFSA 2017-11/CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
- MFSA 2017-11/CVE-2017-5437: Vulnerabilities in Libevent library
- MFSA 2017-11/CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
- MFSA 2017-11/CVE-2017-5435: Use-after-free during transaction processing in the editor
- MFSA 2017-11/CVE-2017-5434: Use-after-free during focus handling
- MFSA 2017-11/CVE-2017-5433: Use-after-free in SMIL animation functions
- MFSA 2017-11/CVE-2017-5432: Use-after-free in text input selection
- MFSA 2017-11/CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
- MFSA 2017-11/CVE-2017-5465: Out-of-bounds read in ConvolvePixel
- MFSA 2017-11/CVE-2017-5460: Use-after-free in frame selection
- MFSA 2017-11/CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
- MFSA 2017-11/CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data
- MFSA 2017-11/CVE-2017-5447: Out-of-bounds read during glyph processing
- MFSA 2017-11/CVE-2017-5444: Buffer overflow while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content
- MFSA 2017-11/CVE-2017-5442: Use-after-free during style changes
- MFSA 2017-11/CVE-2017-5443: Out-of-bounds write during BinHex decoding
- MFSA 2017-11/CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing
- MFSA 2017-11/CVE-2017-5441: Use-after-free with selection during scroll events
- MFSA 2017-11/CVE-2017-5459: Buffer overflow in WebGL

Mozilla NSS was updated to 3.29.5, bringing new features and fixing bugs:

- Update to NSS 3.29.5:
  * MFSA 2017-11/CVE-2017-5461: Rare crashes in the base 64 decoder and encoder were fixed.
  * MFSA 2017-11/CVE-2017-5462: A carry over bug in the RNG was fixed.
  * CVE-2016-9574: Remote DoS during session handshake when using SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
  * requires NSPR &gt;= 4.13.1

- Update to NSS 3.29.3

  * enables TLS 1.3 by default

- Fixed a bug in hash computation (and build with
  GCC 7 which complains about shifts of boolean values).
  (bsc#1030071, bmo#1348767)

- Update to NSS 3.28.3

  This is a patch release to fix binary compatibility issues.

- Update to NSS 3.28.1

  This is a patch release to update the list of root CA certificates.

  * The following CA certificates were Removed

    CN = Buypass Class 2 CA 1
    CN = Root CA Generalitat Valenciana
    OU = RSA Security 2048 V3

  * The following CA certificates were Added

    OU = AC RAIZ FNMT-RCM
    CN = Amazon Root CA 1
    CN = Amazon Root CA 2
    CN = Amazon Root CA 3
    CN = Amazon Root CA 4
    CN = LuxTrust Global Root 2
    CN = Symantec Class 1 Public Primary Certification Authority - G4
    CN = Symantec Class 1 Public Primary Certification Authority - G6
    CN = Symantec Class 2 Public Primary Certification Authority - G4
    CN = Symantec Class 2 Public Primary Certification Authority - G6

  * The version number of the updated root CA list has been set to 2.11

- Update to NSS 3.28

  New functionality:

  * NSS includes support for TLS 1.3 draft -18. This includes a number
    of improvements to TLS 1.3:

    - The signed certificate timestamp, used in certificate
      transparency, is supported in TLS 1.3.
    - Key exporters for TLS 1.3 are supported. This includes the early
      key exporter, which can be used if 0-RTT is enabled. Note that
      there is a difference between TLS 1.3 and key exporters in older
      versions of TLS. TLS 1.3 does not distinguish between an empty
      context and no context.
    - The TLS 1.3 (draft) protocol can be enabled, by defining
      NSS_ENABLE_TLS_1_3=1 when building NSS.
    - NSS includes support for the X25519 key exchange algorithm,
      which is supported and enabled by default in all versions of TLS.

  Notable Changes:

  * NSS can no longer be compiled with support for additional elliptic curves.
    This was previously possible by replacing certain NSS source files.
  * NSS will now detect the presence of tokens that support additional
    elliptic curves and enable those curves for use in TLS.
    Note that this detection has a one-off performance cost, which can be
    avoided by using the SSL_NamedGroupConfig function to limit supported
    groups to those that NSS provides.
  * PKCS#11 bypass for TLS is no longer supported and has been removed.
  * Support for 'export' grade SSL/TLS cipher suites has been removed.
  * NSS now uses the signature schemes definition in TLS 1.3.
    This also affects TLS 1.2. NSS will now only generate signatures with the
    combinations of hash and signature scheme that are defined in TLS 1.3,
    even when negotiating TLS 1.2.

    - This means that SHA-256 will only be used with P-256 ECDSA certificates,
      SHA-384 with P-384 certificates, and SHA-512 with P-521 certificates.
      SHA-1 is permitted (in TLS 1.2 only) with any certificate for backward
      compatibility reasons.
    - NSS will now no longer assume that default signature schemes are
      supported by a peer if there was no commonly supported signature scheme.

  * NSS will now check if RSA-PSS signing is supported by the token that holds
    the private key prior to using it for TLS.
  * The certificate validation code contains checks to no longer trust
    certificates that are issued by old WoSign and StartCom CAs after
    October 21, 2016. This is equivalent to the behavior that Mozilla will
    release with Firefox 51.

- Update to NSS 3.27.2
  * Fixed SSL_SetTrustAnchors leaks (bmo#1318561)

  - raised the minimum softokn/freebl version to 3.28 as reported in (boo#1021636)

- Update to NSS 3.26.2

  New Functionality:

  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library

  Notable Changes:

  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test

  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.

- Update to NSS 3.25

  New functionality:

  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.

  Notable changes:

  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3

- Update to NSS 3.24

  New functionality:

  * NSS softoken has been updated with the latest National Institute
    of Standards and Technology (NIST) guidance (as of 2015):
    - Software integrity checks and POST functions are executed on
      shared library load. These checks have been disabled by default,
      as they can cause a performance regression. To enable these
      checks, you must define symbol NSS_FORCE_FIPS when building NSS.
    - Counter mode and Galois/Counter Mode (GCM) have checks to
      prevent counter overflow.
    - Additional CSPs are zeroed in the code.
    - NSS softoken uses new guidance for how many Rabin-Miller tests
      are needed to verify a prime based on prime size.
  * NSS softoken has also been updated to allow NSS to run in FIPS
    Level 1 (no password). This mode is triggered by setting the
    database password to the empty string. In FIPS mode, you may move
    from Level 1 to Level 2 (by setting an appropriate password),
    but not the reverse.
  * A SSL_ConfigServerCert function has been added for configuring
    SSL/TLS server sockets with a certificate and private key. Use
    this new function in place of SSL_ConfigSecureServer,
    SSL_ConfigSecureServerWithCertChain, SSL_SetStapledOCSPResponses,
    and SSL_SetSignedCertTimestamps. SSL_ConfigServerCert automatically
    determines the certificate type from the certificate and private key.
    The caller is no longer required to use SSLKEAType explicitly to
    select a 'slot' into which the certificate is configured (which
    incorrectly identifies a key agreement type rather than a certificate).
    Separate functions for configuring Online Certificate Status Protocol
    (OCSP) responses or Signed Certificate Timestamps are not needed,
    since these can be added to the optional SSLExtraServerCertData struct
    provided to SSL_ConfigServerCert.  Also, partial support for RSA
    Probabilistic Signature Scheme (RSA-PSS) certificates has been added.
    Although these certificates can be configured, they will not be
    used by NSS in this version.
  * Deprecate the member attribute authAlgorithm of type SSLCipherSuiteInfo.
    Instead, applications should use the newly added attribute authType.
  * Add a shared library (libfreeblpriv3) on Linux platforms that
    define FREEBL_LOWHASH.
  * Remove most code related to SSL v2, including the ability to actively
    send a SSLv2-compatible client hello. However, the server-side
    implementation of the SSL/TLS protocol still supports processing
    of received v2-compatible client hello messages.
  * Disable (by default) NSS support in optimized builds for logging SSL/TLS
    key material to a logfile if the SSLKEYLOGFILE environment variable
    is set. To enable the functionality in optimized builds, you must define
    the symbol NSS_ALLOW_SSLKEYLOGFILE when building NSS.
  * Update NSS to protect it against the Cachebleed attack.
  * Disable support for DTLS compression.
  * Improve support for TLS 1.3. This includes support for DTLS 1.3.
    Note that TLS 1.3 support is experimental and not suitable for
    production use.

- Update to NSS 3.23

  New functionality:

  * ChaCha20/Poly1305 cipher and TLS cipher suites now supported
  * Experimental-only support TLS 1.3 1-RTT mode (draft-11).
    This code is not ready for production use.

  Notable changes:

  * The list of TLS extensions sent in the TLS handshake has been
    reordered to increase compatibility of the Extended Master Secret
    with with servers
  * The build time environment variable NSS_ENABLE_ZLIB has been
    renamed to NSS_SSL_ENABLE_ZLIB
  * The build time environment variable NSS_DISABLE_CHACHAPOLY was
    added, which can be used to prevent compilation of the
    ChaCha20/Poly1305 code.
  * The following CA certificates were Removed

    - Staat der Nederlanden Root CA
    - NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado
    - NetLock Kozjegyzoi (Class A) Tanusitvanykiado
    - NetLock Uzleti (Class B) Tanusitvanykiado
    - NetLock Expressz (Class C) Tanusitvanykiado
    - VeriSign Class 1 Public PCA - G2
    - VeriSign Class 3 Public PCA
    - VeriSign Class 3 Public PCA - G2
    - CA Disig

  * The following CA certificates were Added

    + SZAFIR ROOT CA2
    + Certum Trusted Network CA 2

  * The following CA certificate had the Email trust bit turned on

    + Actalis Authentication Root CA

  Security fixes:
  * CVE-2016-2834: Memory safety bugs (boo#983639)
    MFSA-2016-61 bmo#1206283 bmo#1221620 bmo#1241034 bmo#1241037

- Update to NSS 3.22.3
  * Increase compatibility of TLS extended master secret,
    don't send an empty TLS extension last in the handshake
    (bmo#1243641)
  * Fixed a heap-based buffer overflow related to the parsing of
    certain ASN.1 structures. An attacker could create a specially-crafted
    certificate which, when parsed by NSS, would cause a crash or
    execution of arbitrary code with the permissions of the user.
    (CVE-2016-1950, bmo#1245528)

- Update to NSS 3.22.2

  New functionality:

  * RSA-PSS signatures are now supported (bmo#1215295)
  * Pseudorandom functions based on hashes other than SHA-1 are now supported
  * Enforce an External Policy on NSS from a config file (bmo#1009429)

- CVE-2016-8635: Fix for DH small subgroup confinement attack (bsc#1015547)

Mozilla NSPR was updated to version 4.13.1:

  The previously released version 4.13 had changed pipes to be
  nonblocking by default, and as a consequence, PollEvent was
  changed to not block on clear.
  The NSPR development team received reports that these changes
  caused regressions in some applications that use NSPR, and it
  has been decided to revert the changes made in NSPR 4.13.
  NSPR 4.13.1 restores the traditional behavior of pipes and
  PollEvent.

Mozilla NSPR update to version 4.13 had these changes:

- PL_strcmp (and others) were fixed to return consistent results
    when one of the arguments is NULL.
- PollEvent was fixed to not block on clear.
- Pipes are always nonblocking.
- PR_GetNameForIdentity: added thread safety lock and bound checks.
- Removed the PLArena freelist.
- Avoid some integer overflows.
- fixed several comments.

This update also contains java-1_8_0-openjdk that needed to be rebuilt against the new
mozilla-nss version.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-11"/>
	<updated date="2017-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021636">SUSE bug 1021636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026102">SUSE bug 1026102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030071">SUSE bug 1030071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550209" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550210" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80046" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005591" ref_url="https://bugzilla.suse.com/1005591" source="BUGZILLA"/>
		<reference ref_id="1035905" ref_url="https://bugzilla.suse.com/1035905" source="BUGZILLA"/>
		<reference ref_id="934119" ref_url="https://bugzilla.suse.com/934119" source="BUGZILLA"/>
		<reference ref_id="952474" ref_url="https://bugzilla.suse.com/952474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<description>

 This update for libxslt fixes the following issues:
 

- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check 
for integer overflow during a size calculation, which allowed a remote attacker 
to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator 
could cause a heap overread. This can be exploited to leak a couple of bytes after 
the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a 
type confusion leading to DoS. (bsc#952474)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550224" comment="libxslt-tools-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550225" comment="libxslt1-1.1.28-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548046" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80047" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1010845" ref_url="https://bugzilla.suse.com/1010845" source="BUGZILLA"/>
		<reference ref_id="1035371" ref_url="https://bugzilla.suse.com/1035371" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002891.html" source="SUSE-SU"/>
		<description>

This update for bash fixes an issue that could lead to syntax errors when parsing
scripts that use expr(1) inside loops.

Additionally, the popd build-in now ensures that the normalized stack offset is
within bounds before trying to free that stack entry. This fixes a segmentation
fault.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035371">SUSE bug 1035371</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550226" comment="bash-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518627" comment="bash-doc-4.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550227" comment="libreadline6-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550228" comment="libreadline6-32bit-6.3-82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518631" comment="readline-doc-6.3-82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80048" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020868" ref_url="https://bugzilla.suse.com/1020868" source="BUGZILLA"/>
		<reference ref_id="1020890" ref_url="https://bugzilla.suse.com/1020890" source="BUGZILLA"/>
		<reference ref_id="1020976" ref_url="https://bugzilla.suse.com/1020976" source="BUGZILLA"/>
		<reference ref_id="1022428" ref_url="https://bugzilla.suse.com/1022428" source="BUGZILLA"/>
		<reference ref_id="1034911" ref_url="https://bugzilla.suse.com/1034911" source="BUGZILLA"/>
		<reference ref_id="996821" ref_url="https://bugzilla.suse.com/996821" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<description>

This update for mariadb fixes the following issues:

- update to MariaDB 10.0.30 GA
  * notable changes:
    * XtraDB updated to 5.6.35-80.0
    * TokuDB updated to 5.6.35-80.0
    * PCRE updated to 8.40
    * MDEV-11027: better InnoDB crash recovery progress reporting
    * MDEV-11520: improvements to how InnoDB data files are extended
    * Improvements to InnoDB startup/shutdown to make it more robust
    * MDEV-11233: fix for FULLTEXT index crash
    * MDEV-6143: MariaDB Linux binary tarballs will now always untar
      to directories that match their filename
  * release notes and changelog:
     * https://kb.askmonty.org/en/mariadb-10030-release-notes
     * https://kb.askmonty.org/en/mariadb-10030-changelog
  * fixes the following CVEs:
    CVE-2017-3313: unspecified vulnerability affecting the MyISAM  component [bsc#1020890]
    CVE-2017-3302: Use after free in libmysqlclient.so [bsc#1022428] 
- set the default umask to 077 in mysql-systemd-helper [bsc#1020976]
- [bsc#1034911] - tracker bug

  * fixes also [bsc#1020868]		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020976">SUSE bug 1020976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996821">SUSE bug 996821</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550229" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548048" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550230" comment="mariadb-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550231" comment="mariadb-client-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550232" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550233" comment="mariadb-tools-10.0.30-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80049" version="1" class="patch">
	<metadata>
		<title>Security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00050.html" source="SUSE-SU"/>
		<description>

This update for libtirpc fixes the following issues:

-  CVE-2017-8779: crafted UDP packaged could lead  rpcbind to denial-of-service  (bsc#1037559)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-16"/>
	<updated date="2017-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550234" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550235" comment="libtirpc3-1.0.1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550236" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80050" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1037559" ref_url="https://bugzilla.suse.com/1037559" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00054.html" source="SUSE-SU"/>
		<description>

This update for rpcbind fixes the following issues:

  - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550237" comment="rpcbind-0.2.3-23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80051" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1036244" ref_url="https://bugzilla.suse.com/1036244" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00055.html" source="SUSE-SU"/>
		<description>

This update for kdelibs4 fixes the following issues:

- CVE-2017-8422: This update fixes problem in the DBUS authentication of the kauth framework
  that could be used to escalate privileges depending on bugs or misimplemented dbus
  services. (boo#1036244)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-18"/>
	<updated date="2017-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036244">SUSE bug 1036244</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550238" comment="libkde4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548055" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550239" comment="libkdecore4-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548057" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550240" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548059" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80052" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038395" ref_url="https://bugzilla.suse.com/1038395" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002902.html" source="SUSE-SU"/>
		<description>

This update for git fixes the following issues:

- git 2.12.3:
 * CVE-2017-8386: Fix git-shell not to escape with the starting dash name
   (bsc#1038395)
 * Fix for potential segv introduced in v2.11.0 and later
 * Misc fixes and cleanups.
- git 2.12.2:
  * CLI output fixes
  * 'Dump http' transport fixes
  * various fixes for internal code paths   
  * Trailer 'Cc:' RFC fix
- git 2.12.1:
  * Reduce authentication round-trip over HTTP when the server
    supports just a single authentication method.
  * 'git add -i' patch subcommand fixed to have a path selection
  * various path verification fixes
  * fix 'git log -L...' buffer overrun
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-19"/>
	<updated date="2017-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1038395">SUSE bug 1038395</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541230" comment="git-core-2.12.3-26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532935" comment="git-doc-2.12.3-26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80053" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1033054" ref_url="https://bugzilla.suse.com/1033054" source="BUGZILLA"/>
		<reference ref_id="1033914" ref_url="https://bugzilla.suse.com/1033914" source="BUGZILLA"/>
		<reference ref_id="1033915" ref_url="https://bugzilla.suse.com/1033915" source="BUGZILLA"/>
		<reference ref_id="1036943" ref_url="https://bugzilla.suse.com/1036943" source="BUGZILLA"/>
		<reference ref_id="1036944" ref_url="https://bugzilla.suse.com/1036944" source="BUGZILLA"/>
		<reference ref_id="1036945" ref_url="https://bugzilla.suse.com/1036945" source="BUGZILLA"/>
		<reference ref_id="1036946" ref_url="https://bugzilla.suse.com/1036946" source="BUGZILLA"/>
		<reference ref_id="1038856" ref_url="https://bugzilla.suse.com/1038856" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741/" source="CVE"/>
		<reference ref_id="CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<description>

This update for libsndfile fixes the following issues:

- CVE-2017-8361: Global buffer overflow in flac_buffer_copy. (bsc#1036946)
- CVE-2017-8362: Invalid memory read in flac_buffer_copy. (bsc#1036943)
- CVE-2017-8363: Heap-based buffer overflow in flac_buffer_copy. (bsc#1036945)
- CVE-2017-7585, CVE-2017-7741, CVE-2017-7742: Stack-based buffer overflows via specially
  crafted FLAC files. (bsc#1033054)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-22"/>
	<updated date="2017-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038856">SUSE bug 1038856</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80054" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-ibm fixes the following issues:

Version update bsc#1038505:

- CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
- CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
- CVE-2016-9842: zlib: Undefined left shift of negative number
- CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
- CVE-2017-3544: OpenJDK: newline injection in the SMTP client
- CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
- CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
- CVE-2017-3533: OpenJDK: newline injection in the FTP client 
- CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
- CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data


		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80055" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038505" ref_url="https://bugzilla.suse.com/1038505" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_1-ibm fixes the following issues:

- Version update to 7.1-4.5 bsc#1038505

  - CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in inftrees.c
  - CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in inffast.c
  - CVE-2016-9842: zlib: Undefined left shift of negative number
  - CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
  - CVE-2017-1289: IBM JDK: XML External Entity Injection (XXE) error when processing XML data
  - CVE-2017-3509: OpenJDK: improper re-use of NTLM authenticated connections 
  - CVE-2017-3511: OpenJDK: untrusted extension directories search path in Launcher 
  - CVE-2017-3539: OpenJDK: MD5 allowed for jar verification 
  - CVE-2017-3533: OpenJDK: newline injection in the FTP client
  - CVE-2017-3544: OpenJDK: newline injection in the SMTP client

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80056" version="1" class="patch">
	<metadata>
		<title>Security update for libplist (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1019531" ref_url="https://bugzilla.suse.com/1019531" source="BUGZILLA"/>
		<reference ref_id="1021610" ref_url="https://bugzilla.suse.com/1021610" source="BUGZILLA"/>
		<reference ref_id="1023807" ref_url="https://bugzilla.suse.com/1023807" source="BUGZILLA"/>
		<reference ref_id="1023822" ref_url="https://bugzilla.suse.com/1023822" source="BUGZILLA"/>
		<reference ref_id="1023848" ref_url="https://bugzilla.suse.com/1023848" source="BUGZILLA"/>
		<reference ref_id="1029631" ref_url="https://bugzilla.suse.com/1029631" source="BUGZILLA"/>
		<reference ref_id="1035312" ref_url="https://bugzilla.suse.com/1035312" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<description>

This update for libplist fixes the following issues:
 
- CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data (bsc#1019531).
- CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. (bsc#1021610).
- CVE-2017-5836: A type inconsistency in bplist.c was fixed. (bsc#1023807)
- CVE-2017-5835: A memory allocation error leading to DoS was fixed. (bsc#1023822)
- CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. (bsc#1023848)
- CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms.  (bsc#1029631)
- CVE-2017-7982: Add some safety checks, backported from upstream (bsc#1035312). 
- CVE-2017-5836: A maliciously crafted file could cause the application to crash. (bsc#1023807).
- CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory 
and consume lots of CPU (bsc#1023822) 
- CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault (bsc#1023848)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-23"/>
	<updated date="2017-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1019531">SUSE bug 1019531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023807">SUSE bug 1023807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023822">SUSE bug 1023822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029631">SUSE bug 1029631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035312">SUSE bug 1035312</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80057" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00065.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550243" comment="libdcerpc-binding0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550244" comment="libdcerpc-binding0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550245" comment="libdcerpc0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550246" comment="libdcerpc0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550247" comment="libndr-krb5pac0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550248" comment="libndr-krb5pac0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550249" comment="libndr-nbt0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550250" comment="libndr-nbt0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550251" comment="libndr-standard0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550252" comment="libndr-standard0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550253" comment="libndr0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550254" comment="libndr0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550255" comment="libnetapi0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550256" comment="libnetapi0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550257" comment="libsamba-credentials0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550258" comment="libsamba-credentials0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550259" comment="libsamba-errors0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550260" comment="libsamba-errors0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550261" comment="libsamba-hostconfig0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550262" comment="libsamba-hostconfig0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550263" comment="libsamba-passdb0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550264" comment="libsamba-passdb0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550265" comment="libsamba-util0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550266" comment="libsamba-util0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550267" comment="libsamdb0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550268" comment="libsamdb0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550269" comment="libsmbclient0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550270" comment="libsmbclient0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550271" comment="libsmbconf0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550272" comment="libsmbconf0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550273" comment="libsmbldap0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550274" comment="libsmbldap0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550275" comment="libtevent-util0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550276" comment="libtevent-util0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550277" comment="libwbclient0-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550278" comment="libwbclient0-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550279" comment="samba-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550280" comment="samba-client-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550281" comment="samba-client-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518677" comment="samba-doc-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550282" comment="samba-libs-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550283" comment="samba-libs-32bit-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550284" comment="samba-winbind-4.4.2-38.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550285" comment="samba-winbind-32bit-4.4.2-38.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80058" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038231" ref_url="https://bugzilla.suse.com/1038231" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00066.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issue:

- An unprivileged user with access to the samba server could cause smbd to load
  a specially crafted shared library, which then had the ability to execute
  arbitrary code on the server as 'root'. [CVE-2017-7494, bso#12780, bsc#1038231]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550286" comment="libdcerpc-atsvc0-4.2.4-28.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80059" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1034849" ref_url="https://bugzilla.suse.com/1034849" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<description>

This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.10 - OpenJDK 7u141 (bsc#1034849)
* Security fixes
    - S8163520, CVE-2017-3509: Reuse cache entries
    - S8163528, CVE-2017-3511: Better library loading
    - S8165626, CVE-2017-3512: Improved window framing
    - S8167110, CVE-2017-3514: Windows peering issue
    - S8169011, CVE-2017-3526: Resizing XML parse trees
    - S8170222, CVE-2017-3533: Better transfers of files
    - S8171121, CVE-2017-3539: Enhancing jar checking
    - S8171533, CVE-2017-3544: Better email transfer
    - S8172299: Improve class processing
  * New features
    - PR3347: jstack.stp should support AArch64
  * Import of OpenJDK 7 u141 build 0
    - S4717864: setFont() does not update Fonts of Menus already on
      screen
    - S6474807: (smartcardio) CardTerminal.connect() throws
      CardException instead of CardNotPresentException
    - S6518907: cleanup IA64 specific code in Hotspot
    - S6869327: Add new C2 flag to keep safepoints in counted loops.
    - S7112912: Message 'Error occurred during initialization of
      VM' on boxes with lots of RAM
    - S7124213: [macosx] pack() does ignore size of a component;
      doesn't on the other platforms
    - S7124219: [macosx] Unable to draw images to fullscreen
    - S7124552: [macosx] NullPointerException in getBufferStrategy()
    - S7148275: [macosx] setIconImages() not working correctly
      (distorted icon when minimized)
    - S7154841: [macosx] Popups appear behind taskbar
    - S7155957:
      closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java
      hangs on win 64 bit with jdk8
    - S7160627: [macosx] TextArea has wrong initial size
    - S7167293: FtpURLConnection connection leak on
      FileNotFoundException
    - S7168851: [macosx] Netbeans crashes in
      CImage.nativeCreateNSImageFromArray
    - S7197203: sun/misc/URLClassPath/ClassnameCharTest.sh failed,
      compile error
    - S8005255: [macosx] Cleanup warnings in sun.lwawt
    - S8006088: Incompatible heap size flags accepted by VM
    - S8007295: Reduce number of warnings in awt classes
    - S8010722: assert: failed: heap size is too big for compressed
      oops
    - S8011059: [macosx] Support automatic @2x images loading on
      Mac OS X
    - S8014058: Regression tests for 8006088
    - S8014489:
      tests/gc/arguments/Test(Serial|CMS|Parallel|G1)HeapSizeFlags
      jtreg tests invoke wrong class
    - S8016302: Change type of the number of GC workers to unsigned
      int (2)
    - S8024662: gc/arguments/TestUseCompressedOopsErgo.java does
      not compile.
    - S8024669: Native OOME when allocating after changes to
      maximum heap supporting Coops sizing on sparcv9
    - S8024926: [macosx] AquaIcon HiDPI support
    - S8025974: l10n for policytool
    - S8027025: [macosx] getLocationOnScreen returns 0 if parent
      invisible
    - S8028212: Custom cursor HiDPI support
    - S8028471: PPC64 (part 215): opto: Extend ImplicitNullCheck
      optimization.
    - S8031573: [macosx] Checkmarks of JCheckBoxMenuItems aren't
      rendered in high resolution on Retina
    - S8033534: [macosx] Get MultiResolution image from native
      system
    - S8033786: White flashing when opening Dialogs and Menus using
      Nimbus with dark background
    - S8035568: [macosx] Cursor management unification
    - S8041734: JFrame in full screen mode leaves empty workspace
      after close
    - S8059803: Update use of GetVersionEx to get correct Windows
      version in hs_err files
    - S8066504: GetVersionEx in
      java.base/windows/native/libjava/java_props_md.c might not
      get correct Windows version 0
    - S8079595: Resizing dialog which is JWindow parent makes JVM
      crash
    - S8080729: [macosx] java 7 and 8 JDialogs on multiscreen jump
      to parent frame on focus
    - S8130769: The new menu can't be shown on the menubar after
      clicking the 'Add' button.
    - S8133357: 8u65 l10n resource file translation update
    - S8146602:
      jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test
      fails with NullPointerException
    - S8147842: IME Composition Window is displayed at incorrect
      location
    - S8147910: Cache initial active_processor_count
    - S8150490: Update OS detection code to recognize Windows
      Server 2016
    - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is
      enabled
    - S8161195: Regression:
      closed/javax/swing/text/FlowView/LayoutTest.java
    - S8161993: G1 crashes if active_processor_count changes during
      startup
    - S8162603: Unrecognized VM option 'UseCountedLoopSafepoints'
    - S8162876: [TEST_BUG]
      sun/net/www/protocol/http/HttpInputStream.java fails
      intermittently
    - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java
      failed with 'Error while cleaning up threads after test'
    - S8167179: Make XSL generated namespace prefixes local to
      transformation process
    - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections
    - S8169589: [macosx] Activating a JDialog puts to back another
      dialog
    - S8170307: Stack size option -Xss is ignored
    - S8170316: (tz) Support tzdata2016j
    - S8170814: Reuse cache entries (part II)
    - S8171388: Update JNDI Thread contexts
    - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with
      error: The bitwise mask Frame.ICONIFIED is not setwhen the
       frame is in ICONIFIED state
    - S8171952: [macosx]
      AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog
      test fails as DummyButton on Dialog did not gain focus when
      clicked.
    - S8173931: 8u131 L10n resource file update
    - S8174844: Incorrect GPL header causes RE script to miss swap
      to commercial header for licensee source bundle
    - S8175087: [bsd] Fix build after '8024900: PPC64: Enable new
      build on AIX (jdk part)'
    - S8175163: [bsd] Fix build after '8005629: javac warnings
      compiling java.awt.EventDispatchThread...'
    - S8176044: (tz) Support tzdata2017a
  * Import of OpenJDK 7 u141 build 1
    - S8043723: max_heap_for_compressed_oops() declared with
      size_t, but defined with uintx
  * Import of OpenJDK 7 u141 build 2
    - S8011123: serialVersionUID of
      java.awt.dnd.InvalidDnDOperationException changed in JDK8-b82
  * Backports
    - S6515172, PR3362: Runtime.availableProcessors() ignores Linux
      taskset command
    - S8022284, PR3209: Hide internal data structure in PhaseCFG
    - S8023003, PR3209: Cleanup the public interface to PhaseCFG
    - S8023691, PR3209: Create interface for nodes in class Block
    - S8023988, PR3209: Move local scheduling of nodes to the CFG
      creation and code motion phase (PhaseCFG)
    - S8043780, PR3369: Use open(O_CLOEXEC) instead of
      fcntl(FD_CLOEXEC)
    - S8157306, PR3209: Random infrequent null pointer exceptions
      in javac
    - S8173783, PR3329: IllegalArgumentException:
      jdk.tls.namedGroups
    - S8173941, PR3330: SA does not work if executable is DSO
    - S8174729, PR3361: Race Condition in
      java.lang.reflect.WeakCache
  * Bug fixes
    - PR3349: Architectures unsupported by SystemTap tapsets throw
      a parse error
    - PR3370: Disable ARM32 JIT by default in jdk_generic_profile.sh
    - PR3379: Perl should be mandatory
    - PR3390: javac.in and javah.in should use @PERL@ rather than a
      hardcoded path
  * CACAO
    - PR2732: Raise javadoc memory limits for CACAO again!
  * AArch64 port
    - S8177661, PR3367: Correct ad rule output register types from
      iRegX to iRegXNoSp

- Get ecj.jar path from gcj, use the gcc variant that provides Java
  to build C code to make sure jni.h is available.

    - S8167104, CVE-2017-3289: Additional class construction
    - S6253144: Long narrowing conversion should describe the
    - S6328537: Improve javadocs for Socket class by adding
    - S6978886: javadoc shows stacktrace after print error
    - S6995421: Eliminate the static dependency to
    - S7027045: (doc) java/awt/Window.java has several typos in
    - S7054969: Null-check-in-finally pattern in java/security
    - S7072353: JNDI libraries do not build with javac -Xlint:all
    - S7092447: Clarify the default locale used in each locale
    - S7103570: AtomicIntegerFieldUpdater does not work when
    - S7187144: JavaDoc for ScriptEngineFactory.getProgram()
    - S8000418: javadoc should used a standard 'generated by
    - S8000666: javadoc should write directly to Writer instead of
    - S8000970: break out auxiliary classes that will prevent
    - S8001669: javadoc internal DocletAbortException should set
    - S8011402: Move blacklisting certificate logic from hard code
    - S8011547: Update XML Signature implementation to Apache
    - S8012288: XML DSig API allows wrong tag names and extra
    - S8017325: Cleanup of the javadoc &lt;code&gt; tag in
    - S8017326: Cleanup of the javadoc &lt;code&gt; tag in
    - S8019772: Fix doclint issues in javax.crypto and
    - S8020688: Broken links in documentation at
    - S8021108: Clean up doclint warnings and errors in java.text
    - S8022120: JCK test
      api/javax_xml/crypto/dsig/TransformService/index_ParamMethods
    - S8025409: Fix javadoc comments errors and warning reported by
    - S8026021: more fix of javadoc errors and warnings reported by
    - S8037099: [macosx] Remove all references to GC from native
    - S8038184: XMLSignature throws StringIndexOutOfBoundsException
    - S8038349: Signing XML with DSA throws Exception when key is
    - S8049244: XML Signature performance issue caused by
    - S8050893: (smartcardio) Invert reset argument in tests in
    - S8059212: Modify sun/security/smartcardio manual regression
    - S8068279: (typo in the spec)
    - S8068491: Update the protocol for references of
    - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs
    - S8076369: Introduce the jdk.tls.client.protocols system
    - S8139565: Restrict certificates with DSA keys less than 1024
    - S8140422: Add mechanism to allow non default root CAs to be
    - S8140587: Atomic*FieldUpdaters should use Class.isInstance
    - S8149029: Secure validation of XML based digital signature
    - S8151893: Add security property to configure XML Signature
    - S8161228: URL objects with custom protocol handlers have port
    - S8163304: jarsigner -verbose -verify should print the
    - S8164908: ReflectionFactory support for IIOP and custom
    - S8165230: RMIConnection addNotificationListeners failing with
    - S8166393: disabledAlgorithms property should not be strictly
    - S8166591: [macos 10.12] Trackpad scrolling of text on OS X
    - S8166739: Improve extensibility of ObjectInputFilter
    - S8167356: Follow up fix for jdk8 backport of 8164143. Changes
    - S8167459: Add debug output for indicating if a chosen
    - S8168861: AnchorCertificates uses hardcoded password for
    - S8169688: Backout (remove) MD5 from
    - S8169911: Enhanced tests for jarsigner -verbose -verify after
    - S8170131: Certificates not being blocked by
    - S8173854: [TEST] Update DHEKeySizing test case following
    - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on
    - S8000351, PR3316, RH1390708: Tenuring threshold should be
    - S8153711, PR3315, RH1284948: [REDO] JDWP: Memory Leak:
    - S8170888, PR3316, RH1390708: [linux] Experimental support for
    - PR3318: Replace 'infinality' with 'improved font rendering'
    - PR3324: Fix NSS_LIBDIR substitution in
    - S8165673, PR3320: AArch64: Fix JNI floating point argument
    + S6604109, PR3162:
- Add -fno-delete-null-pointer-checks -fno-lifetime-dse to try to
      directory to be specified
      versions of IcedTea
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80060" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015565" ref_url="https://bugzilla.suse.com/1015565" source="BUGZILLA"/>
		<reference ref_id="1037824" ref_url="https://bugzilla.suse.com/1037824" source="BUGZILLA"/>
		<reference ref_id="934920" ref_url="https://bugzilla.suse.com/934920" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<description>

This update for pam fixes the following issues:
 

- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- log a hint to syslog if /etc/nologin is present, but empty (bsc#1015565).
- If /etc/nologin is present, but empty, log a hint to syslog. (bsc#1015565)
- Added support for libowcrypt.so, if present, to configure support for BLOWFISH (bsc#1037824)

 		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015565">SUSE bug 1015565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037824">SUSE bug 1037824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550291" comment="pam-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548138" comment="pam-32bit-1.1.8-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009517451" comment="pam-doc-1.1.8-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80061" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1018128" ref_url="https://bugzilla.suse.com/1018128" source="BUGZILLA"/>
		<reference ref_id="1030263" ref_url="https://bugzilla.suse.com/1030263" source="BUGZILLA"/>
		<reference ref_id="1032114" ref_url="https://bugzilla.suse.com/1032114" source="BUGZILLA"/>
		<reference ref_id="1032120" ref_url="https://bugzilla.suse.com/1032120" source="BUGZILLA"/>
		<reference ref_id="1036453" ref_url="https://bugzilla.suse.com/1036453" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<description>

This update for ghostscript fixes the following security vulnerabilities:

- CVE-2017-8291: A remote command execution and a -dSAFER bypass via a crafted .eps document were
  exploited in the wild. (bsc#1036453)
- CVE-2016-9601: An integer overflow in the bundled jbig2dec library could have been misused to cause
  a Denial-of-Service. (bsc#1018128)
- CVE-2016-10220: A NULL pointer dereference in the PDF Transparency module allowed remote attackers
  to cause a Denial-of-Service. (bsc#1032120)
- CVE-2017-5951: A NULL pointer dereference allowed remote attackers to cause a denial of service
  via a crafted PostScript document. (bsc#1032114)
- CVE-2017-7207: A NULL pointer dereference allowed remote attackers to cause a denial of service
  via a crafted PostScript document. (bsc#1030263)

This is a reissue of the previous update to also include SUSE Linux Enterprise 12 GA LTSS packages.

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-24"/>
	<updated date="2017-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550292" comment="ghostscript-9.15-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550293" comment="ghostscript-x11-9.15-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80062" version="1" class="patch">
	<metadata>
		<title>Security update for squidGuard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="985612" ref_url="https://bugzilla.suse.com/985612" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002922.html" source="SUSE-SU"/>
		<description>
squidGuard was updated to fix one security issue:

- CVE-2015-8936: Reflected cross site scripting vulnerability because of insufficient escaping (bsc#985612).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-25"/>
	<updated date="2017-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550294" comment="squidGuard-1.4-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550295" comment="squidGuard-doc-1.4-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80063" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1000118" ref_url="https://bugzilla.suse.com/1000118" source="BUGZILLA"/>
		<reference ref_id="1000189" ref_url="https://bugzilla.suse.com/1000189" source="BUGZILLA"/>
		<reference ref_id="1000287" ref_url="https://bugzilla.suse.com/1000287" source="BUGZILLA"/>
		<reference ref_id="1000304" ref_url="https://bugzilla.suse.com/1000304" source="BUGZILLA"/>
		<reference ref_id="1000433" ref_url="https://bugzilla.suse.com/1000433" source="BUGZILLA"/>
		<reference ref_id="1000776" ref_url="https://bugzilla.suse.com/1000776" source="BUGZILLA"/>
		<reference ref_id="1001169" ref_url="https://bugzilla.suse.com/1001169" source="BUGZILLA"/>
		<reference ref_id="1001171" ref_url="https://bugzilla.suse.com/1001171" source="BUGZILLA"/>
		<reference ref_id="1001310" ref_url="https://bugzilla.suse.com/1001310" source="BUGZILLA"/>
		<reference ref_id="1001462" ref_url="https://bugzilla.suse.com/1001462" source="BUGZILLA"/>
		<reference ref_id="1001486" ref_url="https://bugzilla.suse.com/1001486" source="BUGZILLA"/>
		<reference ref_id="1001888" ref_url="https://bugzilla.suse.com/1001888" source="BUGZILLA"/>
		<reference ref_id="1002322" ref_url="https://bugzilla.suse.com/1002322" source="BUGZILLA"/>
		<reference ref_id="1002770" ref_url="https://bugzilla.suse.com/1002770" source="BUGZILLA"/>
		<reference ref_id="1002786" ref_url="https://bugzilla.suse.com/1002786" source="BUGZILLA"/>
		<reference ref_id="1003068" ref_url="https://bugzilla.suse.com/1003068" source="BUGZILLA"/>
		<reference ref_id="1003566" ref_url="https://bugzilla.suse.com/1003566" source="BUGZILLA"/>
		<reference ref_id="1003581" ref_url="https://bugzilla.suse.com/1003581" source="BUGZILLA"/>
		<reference ref_id="1003606" ref_url="https://bugzilla.suse.com/1003606" source="BUGZILLA"/>
		<reference ref_id="1003813" ref_url="https://bugzilla.suse.com/1003813" source="BUGZILLA"/>
		<reference ref_id="1003866" ref_url="https://bugzilla.suse.com/1003866" source="BUGZILLA"/>
		<reference ref_id="1003964" ref_url="https://bugzilla.suse.com/1003964" source="BUGZILLA"/>
		<reference ref_id="1004048" ref_url="https://bugzilla.suse.com/1004048" source="BUGZILLA"/>
		<reference ref_id="1004052" ref_url="https://bugzilla.suse.com/1004052" source="BUGZILLA"/>
		<reference ref_id="1004252" ref_url="https://bugzilla.suse.com/1004252" source="BUGZILLA"/>
		<reference ref_id="1004365" ref_url="https://bugzilla.suse.com/1004365" source="BUGZILLA"/>
		<reference ref_id="1004517" ref_url="https://bugzilla.suse.com/1004517" source="BUGZILLA"/>
		<reference ref_id="1005169" ref_url="https://bugzilla.suse.com/1005169" source="BUGZILLA"/>
		<reference ref_id="1005327" ref_url="https://bugzilla.suse.com/1005327" source="BUGZILLA"/>
		<reference ref_id="1005545" ref_url="https://bugzilla.suse.com/1005545" source="BUGZILLA"/>
		<reference ref_id="1005666" ref_url="https://bugzilla.suse.com/1005666" source="BUGZILLA"/>
		<reference ref_id="1005745" ref_url="https://bugzilla.suse.com/1005745" source="BUGZILLA"/>
		<reference ref_id="1005895" ref_url="https://bugzilla.suse.com/1005895" source="BUGZILLA"/>
		<reference ref_id="1005917" ref_url="https://bugzilla.suse.com/1005917" source="BUGZILLA"/>
		<reference ref_id="1005921" ref_url="https://bugzilla.suse.com/1005921" source="BUGZILLA"/>
		<reference ref_id="1005923" ref_url="https://bugzilla.suse.com/1005923" source="BUGZILLA"/>
		<reference ref_id="1005925" ref_url="https://bugzilla.suse.com/1005925" source="BUGZILLA"/>
		<reference ref_id="1005929" ref_url="https://bugzilla.suse.com/1005929" source="BUGZILLA"/>
		<reference ref_id="1006103" ref_url="https://bugzilla.suse.com/1006103" source="BUGZILLA"/>
		<reference ref_id="1006175" ref_url="https://bugzilla.suse.com/1006175" source="BUGZILLA"/>
		<reference ref_id="1006267" ref_url="https://bugzilla.suse.com/1006267" source="BUGZILLA"/>
		<reference ref_id="1006528" ref_url="https://bugzilla.suse.com/1006528" source="BUGZILLA"/>
		<reference ref_id="1006576" ref_url="https://bugzilla.suse.com/1006576" source="BUGZILLA"/>
		<reference ref_id="1006804" ref_url="https://bugzilla.suse.com/1006804" source="BUGZILLA"/>
		<reference ref_id="1006809" ref_url="https://bugzilla.suse.com/1006809" source="BUGZILLA"/>
		<reference ref_id="1006827" ref_url="https://bugzilla.suse.com/1006827" source="BUGZILLA"/>
		<reference ref_id="1006915" ref_url="https://bugzilla.suse.com/1006915" source="BUGZILLA"/>
		<reference ref_id="1006918" ref_url="https://bugzilla.suse.com/1006918" source="BUGZILLA"/>
		<reference ref_id="1007197" ref_url="https://bugzilla.suse.com/1007197" source="BUGZILLA"/>
		<reference ref_id="1007615" ref_url="https://bugzilla.suse.com/1007615" source="BUGZILLA"/>
		<reference ref_id="1007653" ref_url="https://bugzilla.suse.com/1007653" source="BUGZILLA"/>
		<reference ref_id="1007955" ref_url="https://bugzilla.suse.com/1007955" source="BUGZILLA"/>
		<reference ref_id="1008557" ref_url="https://bugzilla.suse.com/1008557" source="BUGZILLA"/>
		<reference ref_id="1008979" ref_url="https://bugzilla.suse.com/1008979" source="BUGZILLA"/>
		<reference ref_id="1009062" ref_url="https://bugzilla.suse.com/1009062" source="BUGZILLA"/>
		<reference ref_id="1009969" ref_url="https://bugzilla.suse.com/1009969" source="BUGZILLA"/>
		<reference ref_id="1010040" ref_url="https://bugzilla.suse.com/1010040" source="BUGZILLA"/>
		<reference ref_id="1010158" ref_url="https://bugzilla.suse.com/1010158" source="BUGZILLA"/>
		<reference ref_id="1010444" ref_url="https://bugzilla.suse.com/1010444" source="BUGZILLA"/>
		<reference ref_id="1010478" ref_url="https://bugzilla.suse.com/1010478" source="BUGZILLA"/>
		<reference ref_id="1010507" ref_url="https://bugzilla.suse.com/1010507" source="BUGZILLA"/>
		<reference ref_id="1010665" ref_url="https://bugzilla.suse.com/1010665" source="BUGZILLA"/>
		<reference ref_id="1010690" ref_url="https://bugzilla.suse.com/1010690" source="BUGZILLA"/>
		<reference ref_id="1010970" ref_url="https://bugzilla.suse.com/1010970" source="BUGZILLA"/>
		<reference ref_id="1011176" ref_url="https://bugzilla.suse.com/1011176" source="BUGZILLA"/>
		<reference ref_id="1011250" ref_url="https://bugzilla.suse.com/1011250" source="BUGZILLA"/>
		<reference ref_id="1011913" ref_url="https://bugzilla.suse.com/1011913" source="BUGZILLA"/>
		<reference ref_id="1012060" ref_url="https://bugzilla.suse.com/1012060" source="BUGZILLA"/>
		<reference ref_id="1012094" ref_url="https://bugzilla.suse.com/1012094" source="BUGZILLA"/>
		<reference ref_id="1012452" ref_url="https://bugzilla.suse.com/1012452" source="BUGZILLA"/>
		<reference ref_id="1012767" ref_url="https://bugzilla.suse.com/1012767" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1012992" ref_url="https://bugzilla.suse.com/1012992" source="BUGZILLA"/>
		<reference ref_id="1013001" ref_url="https://bugzilla.suse.com/1013001" source="BUGZILLA"/>
		<reference ref_id="1013479" ref_url="https://bugzilla.suse.com/1013479" source="BUGZILLA"/>
		<reference ref_id="1013531" ref_url="https://bugzilla.suse.com/1013531" source="BUGZILLA"/>
		<reference ref_id="1013700" ref_url="https://bugzilla.suse.com/1013700" source="BUGZILLA"/>
		<reference ref_id="1014120" ref_url="https://bugzilla.suse.com/1014120" source="BUGZILLA"/>
		<reference ref_id="1014392" ref_url="https://bugzilla.suse.com/1014392" source="BUGZILLA"/>
		<reference ref_id="1014701" ref_url="https://bugzilla.suse.com/1014701" source="BUGZILLA"/>
		<reference ref_id="1014710" ref_url="https://bugzilla.suse.com/1014710" source="BUGZILLA"/>
		<reference ref_id="1015212" ref_url="https://bugzilla.suse.com/1015212" source="BUGZILLA"/>
		<reference ref_id="1015359" ref_url="https://bugzilla.suse.com/1015359" source="BUGZILLA"/>
		<reference ref_id="1015367" ref_url="https://bugzilla.suse.com/1015367" source="BUGZILLA"/>
		<reference ref_id="1015416" ref_url="https://bugzilla.suse.com/1015416" source="BUGZILLA"/>
		<reference ref_id="799133" ref_url="https://bugzilla.suse.com/799133" source="BUGZILLA"/>
		<reference ref_id="914939" ref_url="https://bugzilla.suse.com/914939" source="BUGZILLA"/>
		<reference ref_id="922634" ref_url="https://bugzilla.suse.com/922634" source="BUGZILLA"/>
		<reference ref_id="963609" ref_url="https://bugzilla.suse.com/963609" source="BUGZILLA"/>
		<reference ref_id="963655" ref_url="https://bugzilla.suse.com/963655" source="BUGZILLA"/>
		<reference ref_id="963904" ref_url="https://bugzilla.suse.com/963904" source="BUGZILLA"/>
		<reference ref_id="964462" ref_url="https://bugzilla.suse.com/964462" source="BUGZILLA"/>
		<reference ref_id="966170" ref_url="https://bugzilla.suse.com/966170" source="BUGZILLA"/>
		<reference ref_id="966172" ref_url="https://bugzilla.suse.com/966172" source="BUGZILLA"/>
		<reference ref_id="966186" ref_url="https://bugzilla.suse.com/966186" source="BUGZILLA"/>
		<reference ref_id="966191" ref_url="https://bugzilla.suse.com/966191" source="BUGZILLA"/>
		<reference ref_id="966316" ref_url="https://bugzilla.suse.com/966316" source="BUGZILLA"/>
		<reference ref_id="966318" ref_url="https://bugzilla.suse.com/966318" source="BUGZILLA"/>
		<reference ref_id="966325" ref_url="https://bugzilla.suse.com/966325" source="BUGZILLA"/>
		<reference ref_id="966471" ref_url="https://bugzilla.suse.com/966471" source="BUGZILLA"/>
		<reference ref_id="969474" ref_url="https://bugzilla.suse.com/969474" source="BUGZILLA"/>
		<reference ref_id="969475" ref_url="https://bugzilla.suse.com/969475" source="BUGZILLA"/>
		<reference ref_id="969476" ref_url="https://bugzilla.suse.com/969476" source="BUGZILLA"/>
		<reference ref_id="969477" ref_url="https://bugzilla.suse.com/969477" source="BUGZILLA"/>
		<reference ref_id="969756" ref_url="https://bugzilla.suse.com/969756" source="BUGZILLA"/>
		<reference ref_id="971975" ref_url="https://bugzilla.suse.com/971975" source="BUGZILLA"/>
		<reference ref_id="971989" ref_url="https://bugzilla.suse.com/971989" source="BUGZILLA"/>
		<reference ref_id="972993" ref_url="https://bugzilla.suse.com/972993" source="BUGZILLA"/>
		<reference ref_id="974313" ref_url="https://bugzilla.suse.com/974313" source="BUGZILLA"/>
		<reference ref_id="974842" ref_url="https://bugzilla.suse.com/974842" source="BUGZILLA"/>
		<reference ref_id="974843" ref_url="https://bugzilla.suse.com/974843" source="BUGZILLA"/>
		<reference ref_id="978907" ref_url="https://bugzilla.suse.com/978907" source="BUGZILLA"/>
		<reference ref_id="979378" ref_url="https://bugzilla.suse.com/979378" source="BUGZILLA"/>
		<reference ref_id="979681" ref_url="https://bugzilla.suse.com/979681" source="BUGZILLA"/>
		<reference ref_id="981825" ref_url="https://bugzilla.suse.com/981825" source="BUGZILLA"/>
		<reference ref_id="983087" ref_url="https://bugzilla.suse.com/983087" source="BUGZILLA"/>
		<reference ref_id="983152" ref_url="https://bugzilla.suse.com/983152" source="BUGZILLA"/>
		<reference ref_id="983318" ref_url="https://bugzilla.suse.com/983318" source="BUGZILLA"/>
		<reference ref_id="985850" ref_url="https://bugzilla.suse.com/985850" source="BUGZILLA"/>
		<reference ref_id="986255" ref_url="https://bugzilla.suse.com/986255" source="BUGZILLA"/>
		<reference ref_id="986987" ref_url="https://bugzilla.suse.com/986987" source="BUGZILLA"/>
		<reference ref_id="987641" ref_url="https://bugzilla.suse.com/987641" source="BUGZILLA"/>
		<reference ref_id="987703" ref_url="https://bugzilla.suse.com/987703" source="BUGZILLA"/>
		<reference ref_id="987805" ref_url="https://bugzilla.suse.com/987805" source="BUGZILLA"/>
		<reference ref_id="988524" ref_url="https://bugzilla.suse.com/988524" source="BUGZILLA"/>
		<reference ref_id="988715" ref_url="https://bugzilla.suse.com/988715" source="BUGZILLA"/>
		<reference ref_id="990384" ref_url="https://bugzilla.suse.com/990384" source="BUGZILLA"/>
		<reference ref_id="992555" ref_url="https://bugzilla.suse.com/992555" source="BUGZILLA"/>
		<reference ref_id="993739" ref_url="https://bugzilla.suse.com/993739" source="BUGZILLA"/>
		<reference ref_id="993841" ref_url="https://bugzilla.suse.com/993841" source="BUGZILLA"/>
		<reference ref_id="993891" ref_url="https://bugzilla.suse.com/993891" source="BUGZILLA"/>
		<reference ref_id="994881" ref_url="https://bugzilla.suse.com/994881" source="BUGZILLA"/>
		<reference ref_id="995278" ref_url="https://bugzilla.suse.com/995278" source="BUGZILLA"/>
		<reference ref_id="997059" ref_url="https://bugzilla.suse.com/997059" source="BUGZILLA"/>
		<reference ref_id="997639" ref_url="https://bugzilla.suse.com/997639" source="BUGZILLA"/>
		<reference ref_id="997807" ref_url="https://bugzilla.suse.com/997807" source="BUGZILLA"/>
		<reference ref_id="998054" ref_url="https://bugzilla.suse.com/998054" source="BUGZILLA"/>
		<reference ref_id="998689" ref_url="https://bugzilla.suse.com/998689" source="BUGZILLA"/>
		<reference ref_id="999907" ref_url="https://bugzilla.suse.com/999907" source="BUGZILLA"/>
		<reference ref_id="999932" ref_url="https://bugzilla.suse.com/999932" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350/" source="CVE"/>
		<reference ref_id="CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964/" source="CVE"/>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-7917" ref_url="https://www.suse.com/security/cve/CVE-2016-7917/" source="CVE"/>
		<reference ref_id="CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645/" source="CVE"/>
		<reference ref_id="CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666/" source="CVE"/>
		<reference ref_id="CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083/" source="CVE"/>
		<reference ref_id="CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2016-9919" ref_url="https://www.suse.com/security/cve/CVE-2016-9919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.38 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7039: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666 (bnc#1001486).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7917: The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel did not check whether a batch message's length field is large enough, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability (bnc#1010444).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bnc#1003964).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misuses the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-9793: A bug in SO_{SND|RCV}BUFFORCE setsockopt() implementation was fixed, which allowed CAP_NET_ADMIN users to cause memory corruption. (bsc#1013531).
- CVE-2016-9919: The icmp6_send function in net/ipv6/icmp.c in the Linux kernel omits a certain check of the dst data structure, which allowed remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet (bnc#1014701).

The following non-security bugs were fixed:

- 8250_pci: Fix potential use-after-free in error path (bsc#1013001).
- acpi / PAD: do not register acpi_pad driver if running as Xen dom0 (bnc#995278).
- Add mainline tags to various hyperv patches
- alsa: fm801: detect FM-only card earlier (bsc#1005917).
- alsa: fm801: explicitly free IRQ line (bsc#1005917).
- alsa: fm801: propagate TUNER_ONLY bit when autodetected (bsc#1005917).
- alsa: hda - Bind with i915 only when Intel graphics is present (bsc#1012767).
- alsa: hda - Clear the leftover component assignment at snd_hdac_i915_exit() (bsc#1012767).
- alsa: hda - Degrade i915 binding failure message (bsc#1012767).
- alsa: hda - Fix yet another i915 pointer leftover in error path (bsc#1012767).
- alsa: hda - Gate the mic jack on HP Z1 Gen3 AiO (bsc#1004365).
- alsa: hda - Turn off loopback mixing as default (bsc#1001462).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Call numa_store_cpu_info() earlier.
- arm64/efi: Enable runtime call flag checking (bsc#1005745).
- arm64/efi: Move to generic {__,}efi_call_virt() (bsc#1005745).
- arm64: Refuse to install 4k kernel on 64k system
- arm64: Update config files. Disable CONFIG_IPMI_SI_PROBE_DEFAULTS (bsc#1006576)
- arm: bcm2835: add CPU node for ARM core (boo#1012094).
- arm: bcm2835: Split the DT for peripherals from the DT for the CPU (boo#1012094).
- asoc: cht_bsw_rt5645: Enable jack detection (bsc#1010690).
- asoc: cht_bsw_rt5645: Fix writing to string literal (bsc#1010690).
- asoc: cht_bsw_rt5672: Use HID translation unit (bsc#1010690).
- asoc: fsl_ssi: mark SACNT register volatile (bsc#1005917).
- asoc: imx-spdif: Fix crash on suspend (bsc#1005917).
- asoc: intel: add function stub when ACPI is not enabled (bsc#1010690).
- asoc: Intel: add fw name to common dsp context (bsc#1010690).
- asoc: Intel: Add missing 10EC5672 ACPI ID matching for Cherry Trail (bsc#1010690).
- asoc: Intel: Add module tags for common match module (bsc#1010690).
- asoc: Intel: add NULL test (bsc#1010690).
- AsoC: Intel: Add quirks for MinnowBoard MAX (bsc#1010690).
- asoc: Intel: Add surface3 entry in CHT-RT5645 machine (bsc#1010690).
- asoc: Intel: Atom: add 24-bit support for media playback and capture (bsc#1010690).
- ASoc: Intel: Atom: add deep buffer definitions for atom platforms (bsc#1010690).
- asoc: Intel: Atom: add definitions for modem/SSP0 interface (bsc#1010690).
- asoc: Intel: Atom: Add quirk for Surface 3 (bsc#1010690).
- asoc: Intel: Atom: add support for CHT w/ RT5640 (bsc#1010690).
- asoc: Intel: Atom: Add support for HP ElitePad 1000 G2 (bsc#1010690).
- asoc: Intel: Atom: add support for RT5642 (bsc#1010690).
- asoc: Intel: Atom: add terminate entry for dmi_system_id tables (bsc#1010690).
- asoc: Intel: Atom: auto-detection of Baytrail-CR (bsc#1010690).
- asoc: Intel: Atom: clean-up compressed DAI definition (bsc#1010690).
- asoc: Intel: atom: enable configuration of SSP0 (bsc#1010690).
- asoc: Intel: atom: fix 0-day warnings (bsc#1010690).
- asoc: Intel: Atom: fix boot warning (bsc#1010690).
- asoc: Intel: Atom: Fix message handling during drop stream (bsc#1010690).
- asoc: Intel: atom: fix missing breaks that would cause the wrong operation to execute (bsc#1010690).
- asoc: Intel: Atom: fix regression on compress DAI (bsc#1010690).
- asoc: Intel: Atom: flip logic for gain Switch (bsc#1010690).
- asoc: Intel: atom: Make some messages to debug level (bsc#1010690).
- asoc: Intel: Atom: move atom driver to common acpi match (bsc#1010690).
- asoc: Intel: atom: statify cht_quirk (bsc#1010690).
- asoc: Intel: boards: add DEEP_BUFFER support for BYT/CHT/BSW (bsc#1010690).
- asoc: Intel: boards: align pin names between byt-rt5640 drivers (bsc#1010690).
- asoc: Intel: boards: merge DMI-based quirks in bytcr-rt5640 driver (bsc#1010690).
- asoc: Intel: boards: start merging byt-rt5640 drivers (bsc#1010690).
- asoc: Intel: bytcr_rt56040: additional routing quirks (bsc#1010690).
- asoc: Intel: bytcr-rt5640: add Asus T100TAF quirks (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add IN3 map (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add MCLK support (bsc#1010690).
- asoc: Intel: bytcr_rt5640: Add quirk for Teclast X98 Air 3G tablet (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add SSP2_AIF2 routing (bsc#1010690).
- asoc: Intel: bytcr_rt5640: change quirk position (bsc#1010690).
- asoc: Intel: bytcr_rt5640: default routing and quirks on Baytrail-CR (bsc#1010690).
- asoc: Intel: bytcr-rt5640: enable ASRC (bsc#1010690).
- asoc: Intel: bytcr_rt5640: enable differential mic quirk (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fallback mechanism if MCLK is not enabled (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fix dai/clock setup for SSP0 routing (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fixup DAI codec_name with HID (bsc#1010690).
- asoc: Intel: bytcr_rt5640: log quirks (bsc#1010690).
- asoc: Intel: bytcr_rt5640: quirk for Acer Aspire SWS-012 (bsc#1010690).
- asoc: Intel: bytcr_rt5640: quirk for mono speaker (bsc#1010690).
- asoc: Intel: bytcr_rt5640: set SSP to I2S mode 2ch (bsc#1010690).
- asoc: Intel: bytcr_rt5640: use HID translation util (bsc#1010690).
- asoc: Intel: cht: fix uninit variable warning (bsc#1010690).
- asoc: Intel: common: add translation from HID to codec-name (bsc#1010690).
- asoc: Intel: common: filter ACPI devices with _STA return value (bsc#1010690).
- asoc: Intel: common: increase the loglevel of 'FW Poll Status' (bsc#1010690).
- asoc: Intel: Create independent acpi match module (bsc#1010690).
- asoc: intel: Fix sst-dsp dependency on dw stuff (bsc#1010690).
- asoc: Intel: Keep building old baytrail machine drivers (bsc#1010690).
- asoc: Intel: Load the atom DPCM driver only (bsc#1010690).
- asoc: intel: make function stub static (bsc#1010690).
- asoc: Intel: Move apci find machine routines (bsc#1010690).
- asoc: Intel: pass correct parameter in sst_alloc_stream_mrfld() (bsc#1005917).
- asoc: intel: Replace kthread with work (bsc#1010690).
- asoc: Intel: Skylake: Always acquire runtime pm ref on unload (bsc#1005917).
- asoc: Intel: sst: fix sst_memcpy32 wrong with non-4x bytes issue (bsc#1010690).
- asoc: rt5640: add ASRC support (bsc#1010690).
- asoc: rt5640: add internal clock source support (bsc#1010690).
- asoc: rt5640: add master clock handling for rt5640 (bsc#1010690).
- asoc: rt5640: add supplys for dac power (bsc#1010690).
- asoc: rt5640: remove unused variable (bsc#1010690).
- asoc: rt5640: Set PLL src according to source (bsc#1010690).
- asoc: rt5645: add DAC1 soft volume func control (bsc#1010690).
- asoc: rt5645: Add dmi_system_id 'Google Setzer' (bsc#1010690).
- asoc: rt5645: extend delay time for headphone pop noise (bsc#1010690).
- asoc: rt5645: fix reg-2f default value (bsc#1010690).
- asoc: rt5645: improve headphone pop when system resumes from S3 (bsc#1010690).
- asoc: rt5645: improve IRQ reaction time for HS button (bsc#1010690).
- asoc: rt5645: merge DMI tables of google projects (bsc#1010690).
- asoc: rt5645: patch reg-0x8a (bsc#1010690).
- asoc: rt5645: polling jd status in all conditions (bsc#1010690).
- asoc: rt5645: Separate regmap for rt5645 and rt5650 (bsc#1010690).
- asoc: rt5645: set RT5645_PRIV_INDEX as volatile (bsc#1010690).
- asoc: rt5645: use polling to support HS button (bsc#1010690).
- asoc: rt5645: Use the mod_delayed_work instead of the queue_delayed_work and cancel_delayed_work_sync (bsc#1010690).
- asoc: rt5670: Add missing 10EC5072 ACPI ID (bsc#1010690).
- asoc: rt5670: Enable Braswell platform workaround for Dell Wyse 3040 (bsc#1010690).
- asoc: rt5670: fix HP Playback Volume control (bsc#1010690).
- asoc: rt5670: patch reg-0x8a (bsc#1010690).
- asoc: simple-card: do not fail if sysclk setting is not supported (bsc#1005917).
- asoc: tegra_alc5632: check return value (bsc#1005917).
- asoc: wm8960: Fix WM8960_SYSCLK_PLL mode (bsc#1005917).
- autofs: fix multiple races (bsc#997639).
- autofs: use dentry flags to block walks during expire (bsc#997639).
- blacklist.conf: Add dup / unapplicable commits (bsc#1005545).
- blacklist.conf: Add i915 stable commits that can be ignored (bsc#1015367)
- blacklist.conf: add inapplicable / duped commits (bsc#1005917)
- blacklist.conf: ignore commit bfe6c8a89e03 ('arm64: Fix NUMA build error when !CONFIG_ACPI')
- blacklist.conf: Remove intel_pstate potential patch that SLE 12 SP2 The code layout upstream that motivated this patch is completely different to what is in SLE 12 SP2 as schedutil was not backported.
- block_dev: do not test bdev-&gt;bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- btrfs: allocate root item at snapshot ioctl time (bsc#1012452).
- btrfs: better packing of btrfs_delayed_extent_op (bsc#1012452).
- btrfs: Check metadata redundancy on balance (bsc#1012452).
- btrfs: clean up an error code in btrfs_init_space_info() (bsc#1012452).
- btrfs: cleanup, stop casting for extent_map-&gt;lookup everywhere (bsc#1012452).
- btrfs: cleanup, use enum values for btrfs_path reada (bsc#1012452).
- btrfs: deal with duplicates during extent_map insertion in btrfs_get_extent (bsc#1001171).
- btrfs: deal with existing encompassing extent map in btrfs_get_extent() (bsc#1001171).
- btrfs: do an allocation earlier during snapshot creation (bsc#1012452).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: do not leave dangling dentry if symlink creation failed (bsc#1012452).
- btrfs: do not use slab cache for struct btrfs_delalloc_work (bsc#1012452).
- btrfs: drop duplicate prefix from scrub workqueues (bsc#1012452).
- btrfs: drop unused parameter from lock_extent_bits (bsc#1012452).
- btrfs: Enhance chunk validation check (bsc#1012452).
- btrfs: Enhance super validation check (bsc#1012452).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666).
- btrfs: Expoert and move leaf/subtree qgroup helpers to qgroup.c (bsc983087, bsc986255).
- btrfs: fix endless loop in balancing block groups (bsc#1006804).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix locking bugs when defragging leaves (bsc#1012452).
- btrfs: fix memory leaks after transaction is aborted (bsc#1012452).
- btrfs: fix output of compression message in btrfs_parse_options() (bsc#1012452).
- btrfs: fix race between free space endio workers and space cache writeout (bsc#1012452).
- btrfs: fix races on root_log_ctx lists (bsc#1007653).
- btrfs: fix race when finishing dev replace leading to transaction abort (bsc#1012452).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: fix typo in log message when starting a balance (bsc#1012452).
- btrfs: fix unprotected list operations at btrfs_write_dirty_block_groups (bsc#1012452).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: make btrfs_close_one_device static (bsc#1012452).
- btrfs: make clear_extent_bit helpers static inline (bsc#1012452).
- btrfs: make clear_extent_buffer_uptodate return void (bsc#1012452).
- btrfs: make end_extent_writepage return void (bsc#1012452).
- btrfs: make extent_clear_unlock_delalloc return void (bsc#1012452).
- btrfs: make extent_range_clear_dirty_for_io return void (bsc#1012452).
- btrfs: make extent_range_redirty_for_io return void (bsc#1012452).
- btrfs: make lock_extent static inline (bsc#1012452).
- btrfs: make set_extent_bit helpers static inline (bsc#1012452).
- btrfs: make set_extent_buffer_uptodate return void (bsc#1012452).
- btrfs: make set_range_writeback return void (bsc#1012452).
- btrfs: preallocate path for snapshot creation at ioctl time (bsc#1012452).
- btrfs: put delayed item hook into inode (bsc#1012452).
- btrfs: qgroup: Add comments explaining how btrfs qgroup works (bsc983087, bsc986255).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc983087, bsc986255).
- btrfs: qgroup: Rename functions to make it follow reserve, trace, account steps (bsc983087, bsc986255).
- btrfs: remove a trivial helper btrfs_set_buffer_uptodate (bsc#1012452).
- btrfs: remove root_log_ctx from ctx list before btrfs_sync_log returns (bsc#1007653).
- btrfs: remove unused inode argument from uncompress_inline() (bsc#1012452).
- btrfs: remove wait from struct btrfs_delalloc_work (bsc#1012452).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- btrfs: sink parameter wait to btrfs_alloc_delalloc_work (bsc#1012452).
- btrfs: Support convert to -d dup for btrfs-convert (bsc#1012452).
- btrfs: use GFP_KERNEL for allocations in ioctl handlers (bsc#1012452).
- btrfs: use GFP_KERNEL for allocations of workqueues (bsc#1012452).
- btrfs: use GFP_KERNEL for xattr and acl allocations (bsc#1012452).
- btrfs: use smaller type for btrfs_path locks (bsc#1012452).
- btrfs: use smaller type for btrfs_path lowest_level (bsc#1012452).
- btrfs: use smaller type for btrfs_path reada (bsc#1012452).
- btrfs: verbose error when we find an unexpected item in sys_array (bsc#1012452).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgbi: fix uninitialized flowi6 (bsc#963904 FATE#320115).
- Delete patches.fixes/apparmor-initialize-common_audit_data.patch (bsc#1000304) It'll be fixed in the upcoming apparmor fix series from upstream.
- dell-laptop: Fixate rfkill work on CPU#0 (bsc#1004052).
- dell-wmi: Check if Dell WMI descriptor structure is valid (bsc#1004052).
- dell-wmi: Clean up hotkey table size check (bsc#1004052).
- dell-wmi: Ignore WMI event code 0xe045 (bsc#1004052).
- dell-wmi: Improve unknown hotkey handling (bsc#1004052).
- dell-wmi: Process only one event on devices with interface version 0 (bsc#1004052).
- dell-wmi: Stop storing pointers to DMI tables (bsc#1004052).
- dell-wmi: Support new hotkeys on the XPS 13 9350 (Skylake) (bsc#1004052).
- dell_wmi: Use a C99-style array for bios_to_linux_keycode (bsc#1004052).
- Drivers: hv: utils: fix a race on userspace daemons registration (bnc#1014392).
- drm/amdgpu: Do not leak runtime pm ref on driver load (bsc#1005545).
- drm/amdgpu: Do not leak runtime pm ref on driver unload (bsc#1005545).
- drm/i915: Acquire audio powerwell for HD-Audio registers (bsc#1005545).
- drm/i915: add helpers for platform specific revision id range checks (bsc#1015367).
- drm/i915: Add missing ring_mask to Pineview (bsc#1005917).
- drm/i915: Apply broader WaRsDisableCoarsePowerGating for guc also (bsc#1015367).
- drm/i915/bxt: add revision id for A1 stepping and use it (bsc#1015367).
- drm/i915: Calculate watermark related members in the crtc_state, v4 (bsc#1011176).
- drm/i915: Call intel_dp_mst_resume() before resuming displays (bsc#1015359).
- drm/i915: call kunmap_px on pt_vaddr (bsc#1005545).
- drm/i915: Cleaning up DDI translation tables (bsc#1014392).
- drm/i915: Clean up L3 SQC register field definitions (bsc#1014392).
- drm/i915/dsi: fix CHV dsi encoder hardware state readout on port C (bsc#1015367).
- drm/i915: Enable polling when we do not have hpd (bsc#1014120).
- drm/i915: Exit cherryview_irq_handler() after one pass (bsc#1015367).
- drm/i915: Fix iboost setting for SKL Y/U DP DDI buffer translation entry 2 (bsc#1014392).
- drm/i915: Fix system resume if PCI device remained enabled (bsc#1015367).
- drm/i915: fix the SDE irq dmesg warnings properly (bsc#1005545).
- drm/i915: Fix VBT backlight Hz to PWM conversion for PNV (bsc#1005545).
- drm/i915: Fix vbt PWM max setup for CTG (bsc#1005545).
- drm/i915: Force ringbuffers to not be at offset 0 (bsc#1015367).
- drm/i915/gen9: Add WaInPlaceDecompressionHang (bsc#1014392).
- drm/i915/ivb: Move WaCxSRDisabledForSpriteScaling w/a to atomic check (bsc#1011176).
- drm/i915: Kill intel_runtime_pm_disable() (bsc#1005545).
- drm/i915: Make plane fb tracking work correctly, v2 (bsc#1004048).
- drm/i915: Make prepare_plane_fb fully interruptible (bsc#1004048).
- drm/i915: Move disable_cxsr to the crtc_state (bsc#1011176).
- drm/i915: On fb alloc failure, unref gem object where it gets refed (bsc#1005545).
- drm/i915: Only call commit_planes when there are things to commit (bsc#1004048).
- drm/i915: Only commit active planes when updating planes during reset (bsc#1004048).
- drm/i915: Only run commit when crtc is active, v2 (bsc#1004048).
- drm/i915: remove parens around revision ids (bsc#1015367).
- drm/i915: Set crtc_state-&gt;lane_count for HDMI (bsc#1005545).
- drm/i915/skl: Add WaDisableGafsUnitClkGating (bsc#1014392).
- drm/i915/skl: Fix rc6 based gpu/system hang (bsc#1015367).
- drm/i915/skl: Fix spurious gpu hang with gt3/gt4 revs (bsc#1015367).
- drm/i915/skl: Update DDI translation tables for SKL (bsc#1014392).
- drm/i915/skl: Update watermarks before the crtc is disabled (bsc#1015367).
- drm/i915: suppress spurious !wm_changed warning (bsc#1006267).
- drm/i915: Unconditionally flush any chipset buffers before execbuf (bsc#1005545).
- drm/i915: Update legacy primary state outside the commit hook, v2 (bsc#1004048).
- drm/i915: Update Skylake DDI translation table for DP (bsc#1014392).
- drm/i915: Update Skylake DDI translation table for HDMI (bsc#1014392).
- drm/i915/userptr: Hold mmref whilst calling get-user-pages (bsc#1015367).
- drm/i915/vlv: Disable HPD in valleyview_crt_detect_hotplug() (bsc#1014120).
- drm/i915/vlv: Make intel_crt_reset() per-encoder (bsc#1014120).
- drm/i915/vlv: Reset the ADPA in vlv_display_power_well_init() (bsc#1014120).
- drm/i915: Wait for power cycle delay after turning off DSI panel power (bsc#1005545).
- drm/i915: Wait up to 3ms for the pcu to ack the cdclk change request on SKL (bsc#1005545).
- drm/layerscape: reduce excessive stack usage (bsc#1005545).
- drm/mgag200: fix error return code in mgag200fb_create() (bsc#1005917).
- drm/nouveau: Do not leak runtime pm ref on driver unload (bsc#1005545).
- drm/radeon: Also call cursor_move_locked when the cursor size changes (bsc#1000433).
- drm/radeon: Always store CRTC relative radeon_crtc-&gt;cursor_x/y values (bsc#1000433).
- drm/radeon/ci add comment to document intentionally unreachable code (bsc#1005545).
- drm/radeon: Do not leak runtime pm ref on driver load (bsc#1005545).
- drm/radeon: Do not leak runtime pm ref on driver unload (bsc#1005545).
- drm/radeon: Ensure vblank interrupt is enabled on DPMS transition to on (bsc#998054)
- drm/radeon: Hide the HW cursor while it's out of bounds (bsc#1000433).
- drm/radeon: Switch to drm_vblank_on/off (bsc#998054).
- drm/rockchip: fix a couple off by one bugs (bsc#1005545).
- drm/tegra: checking for IS_ERR() instead of NULL (bsc#1005545).
- edac/mce_amd: Add missing SMCA error descriptions (fate#320474, bsc#1013700).
- edac/mce_amd: Use SMCA prefix for error descriptions arrays (fate#320474, bsc#1013700).
- efi/arm64: Do not apply MEMBLOCK_NOMAP to UEFI memory map mapping (bsc#986987).
- efi: ARM: avoid warning about phys_addr_t cast.
- efi/runtime-wrappers: Add {__,}efi_call_virt() templates (bsc#1005745).
- efi/runtime-wrappers: Detect firmware IRQ flag corruption (bsc#1005745).
- efi/runtime-wrappers: Remove redundant #ifdefs (bsc#1005745).
- ext4: fix data exposure after a crash (bsc#1012829).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- Fixup UNMAP calculation (bsc#1005327)
- fs, block: force direct-I/O for dax-enabled block devices (bsc#1012992).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- genirq: Add untracked irq handler (bsc#1006827).
- genirq: Use a common macro to go through the actions list (bsc#1006827).
- gpio: generic: make bgpio_pdata always visible.
- gpio: Restore indentation of parent device setup.
- gre: Disable segmentation offloads w/ CSUM and we are encapsulated via FOU (bsc#1001486).
- gro: Allow tunnel stacking in the case of FOU/GUE (bsc#1001486).
- gro_cells: mark napi struct as not busy poll candidates (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- group-source-files.pl: mark arch/*/scripts as devel make[2]: /usr/src/linux-4.6.4-2/arch/powerpc/scripts/gcc-check-mprofile-kernel.sh: Command not found
- hpsa: fallback to use legacy REPORT PHYS command (bsc#1006175).
- hpsa: use bus '3' for legacy HBA devices (bsc#1010665).
- hpsa: use correct DID_NO_CONNECT hostbyte (bsc#1010665).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006918).
- i2c: designware-baytrail: Add support for cherrytrail (bsc#1011913).
- i2c: designware-baytrail: Pass dw_i2c_dev into helper functions (bsc#1011913).
- i2c: designware-baytrail: Work around Cherry Trail semaphore errors (bsc#1011913).
- i2c: designware: Prevent runtime suspend during adapter registration (bsc#1011913).
- i2c: designware: retry transfer on transient failure (bsc#1011913).
- i2c: designware: Use transfer timeout from ioctl I2C_TIMEOUT (bsc#1011913).
- i2c: Enable CONFIG_I2C_DESIGNWARE_PLATFORM and *_BAYTRAIL (bsc#1010690) Realtek codecs on CHT platform require this i2c bus driver.
- i2c: xgene: Avoid dma_buffer overrun (bsc#1006576).
- i40e: fix an uninitialized variable bug (bsc#969476 FATE#319648).
- i40e: fix broken i40e_config_rss_aq function (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40e: Remove redundant memset (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- i40iw: Add missing check for interface already open (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Add missing NULL check for MPA private data (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Avoid writing to freed memory (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Change mem_resources pointer to a u8 (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Do not set self-referencing pointer to NULL after kfree (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Fix double free of allocated_buffer (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Protect req_resource_num update (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Receive notification events correctly (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Send last streaming mode message for loopback connections (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- i40iw: Update hw_iwarp_state (bsc#974842 FATE#319831 bsc#974843 FATE#319832).
- ib/core: Fix possible memory leak in cma_resolve_iboe_route() (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx5: Fix iteration overrun in GSI qps (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix steering resource leak (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Set source mac address in FTE (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: convert to use simple_open() (bsc#1015416).
- ibmvnic: Driver Version 1.0.1 (bsc#1015416).
- ibmvnic: drop duplicate header seq_file.h (bsc#1015416).
- ibmvnic: fix error return code in ibmvnic_probe() (bsc#1015416).
- ibmvnic: Fix GFP_KERNEL allocation in interrupt context (bsc#1015416).
- ibmvnic: Fix missing brackets in init_sub_crq_irqs (bsc#1015416).
- ibmvnic: Fix releasing of sub-CRQ IRQs in interrupt context (bsc#1015416).
- ibmvnic: Fix size of debugfs name buffer (bsc#1015416).
- ibmvnic: Handle backing device failover and reinitialization (bsc#1015416).
- ibmvnic: Start completion queue negotiation at server-provided optimum values (bsc#1015416).
- ibmvnic: Unmap ibmvnic_statistics structure (bsc#1015416).
- ibmvnic: Update MTU after device initialization (bsc#1015416).
- input: ALPS - add touchstick support for SS5 hardware (bsc#987703).
- input: ALPS - allow touchsticks to report pressure (bsc#987703).
- input: ALPS - handle 0-pressure 1F events (bsc#987703).
- input: ALPS - set DualPoint flag for 74 03 28 devices (bsc#987703).
- iommu/arm-smmu: Add support for 16 bit VMID (fate#319978).
- iommu/arm-smmu: Workaround for ThunderX erratum #27704 (fate#319978).
- ipc/sem.c: add cond_resched in exit_sme (bsc#979378).
- ipmi_si: create hardware-independent softdep for ipmi_devintf (bsc#1009062).
- ixgbe: Do not clear RAR entry when clearing VMDq for SAN MAC (bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- ixgbe: Force VLNCTRL.VFE to be set in all VMDq paths (bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- kABI: protect struct dw_mci.
- kABI: protect struct mmc_packed (kabi).
- kABI: reintroduce iov_iter_fault_in_multipages_readable.
- kABI: reintroduce sk_filter (kabi).
- kABI: reintroduce strtobool (kabi).
- kABI: restore ip_cmsg_recv_offset parameters (kabi).
- kabi/severities: Ignore kABI for asoc Intel SST drivers (bsc#1010690) These drivers are self-contained, not for 3rd party drivers.
- kabi/severities: Whitelist libceph and rbd (bsc#988715). Like SLE12-SP1.
- kernel-module-subpackage: Properly quote flavor in expressions That fixes a parse error if the flavor starts with a digit or contains other non-alphabetic characters.
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- kvm: arm/arm64: Fix occasional warning from the timer work function (bsc#988524).
- kvm: x86: correctly reset dest_map-&gt;vector when restoring LAPIC state (bsc#966471).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc-&gt;req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- lib/mpi: avoid assembler warning (bsc#1003581).
- lib/mpi: mpi_read_buffer(): fix buffer overflow (bsc#1003581).
- lib/mpi: mpi_read_buffer(): optimize skipping of leading zero limbs (bsc#1003581).
- lib/mpi: mpi_read_buffer(): replace open coded endian conversion (bsc#1003581).
- lib/mpi: mpi_write_sgl(): fix out-of-bounds stack access (bsc#1003581).
- lib/mpi: mpi_write_sgl(): fix style issue with lzero decrement (bsc#1003581).
- lib/mpi: mpi_write_sgl(): purge redundant pointer arithmetic (bsc#1003581).
- lib/mpi: mpi_write_sgl(): replace open coded endian conversion (bsc#1003581).
- lib/mpi: use 'static inline' instead of 'extern inline' (bsc#1003581).
- locking/pv-qspinlock: Use cmpxchg_release() in __pv_queued_spin_unlock() (bsc#969756).
- locking/rtmutex: Prevent dequeue vs. unlock race (bsc#1015212).
- locking/rtmutex: Use READ_ONCE() in rt_mutex_owner() (bsc#1015212).
- mailbox/xgene-slimpro: Checking for IS_ERR instead of NULL.
- md/raid1: fix: IO can block resync indefinitely (bsc#1001310).
- mlx4: Do not BUG_ON() if device reset failed (bsc#1001888).
- mm: do not use radix tree writeback tags for pages in swap cache (bnc#971975 VM performance -- swap).
- mm: filemap: do not plant shadow entries without radix tree node (bnc#1005929).
- mm: filemap: fix mapping-&gt;nrpages double accounting in fuse (bnc#1005929).
- mm/filemap: generic_file_read_iter(): check for zero reads unconditionally (bnc#1007955).
- mm/mprotect.c: do not touch single threaded PTEs which are on the right node (bnc#971975 VM performance -- numa balancing).
- mm: workingset: fix crash in shadow node shrinker caused by replace_page_cache_page() (bnc#1005929).
- mm/zswap: use workqueue to destroy pool (VM Functionality, bsc#1005923).
- net: icmp6_send should use dst dev to determine L3 domain (bsc#1014701).
- net: ipv6: tcp reset, icmp need to consider L3 domain (bsc#1014701).
- net/mlx4_en: Fix panic on xmit while port is down (bsc#966191 FATE#320230).
- net/mlx5: Add ConnectX-5 PCIe 4.0 to list of supported devices (bsc#1006809).
- net/mlx5: Add error prints when validate ETS failed (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Avoid setting unused var when modifying vport node GUID (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Use correct flow dissector key on flower offloading (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix autogroups groups num not decreasing (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Fix teardown errors that happen in pci error handler (bsc#1001169).
- net/mlx5: Keep autogroups list ordered (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net_sched: fix a typo in tc_for_each_action() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net: sctp, forbid negative length (bnc#1005921).
- netvsc: fix incorrect receive checksum offloading (bnc#1006915).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- oom: print nodemask in the oom report (bnc#1003866).
- overlayfs: allow writing on read-only btrfs subvolumes (bsc#1010158)
- pci/acpi: Allow all PCIe services on non-ACPI host bridges (bsc#1006827).
- pci: Allow additional bus numbers for hotplug bridges (bsc#1006827).
- pci: correctly cast mem_base in pci_read_bridge_mmio_pref() (bsc#1001888).
- pci: Do not set RCB bit in LNKCTL if the upstream bridge hasn't (bsc#1001888).
- pci: Fix BUG on device attach failure (bnc#987641).
- pci: pciehp: Allow exclusive userspace control of indicators (bsc#1006827).
- pci: Remove return values from pcie_port_platform_notify() and relatives (bsc#1006827).
- perf/x86: Add perf support for AMD family-17h processors (fate#320473).
- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- pm / sleep: declare __tracedata symbols as char rather than char (bnc#1005895).
- powercap/intel_rapl: Add support for Kabylake (bsc#1003566).
- powercap / RAPL: add support for Denverton (bsc#1003566).
- powercap / RAPL: Add support for Ivy Bridge server (bsc#1003566).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc/xmon: Add xmon command to dump process/task similar to ps(1) (fate#322020).
- proc: much faster /proc/vmstat (bnc#971975 VM performance -- vmstat).
- qede: Correctly map aggregation replacement pages (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- qed: FLR of active VFs might lead to FW assert (bsc#966318 FATE#320158 bsc#966316 FATE#320159).
- qgroup: Prevent qgroup-&gt;reserved from going subzero (bsc#993841).
- qla2xxx: Fix NULL pointer deref in QLA interrupt (bsc#1003068).
- qla2xxx: setup data needed in ISR before setting up the ISR (bsc#1006528).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'ACPI / LPSS: allow to use specific PM domain during -&gt;probe()' (bsc#1005917).
- Revert 'can: dev: fix deadlock reported after bus-off'.
- Revert 'fix minor infoleak in get_user_ex()' (p.k.o).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- Revert 'x86/mm: Expand the exception table logic to allow new handling options' (p.k.o).
- rpm/config.sh: Build against SP2 in the OBS as well
- rpm/constraints.in: increase disk for kernel-syzkaller The kernel-syzkaller build now consumes around 30G. This causes headache in factory where the package rebuilds over and over. Require 35G disk size to successfully build the flavor.
- rpm/kernel-binary.spec.in: Build the -base package unconditionally (bsc#1000118)
- rpm/kernel-binary.spec.in: Do not create KMPs with CONFIG_MODULES=n
- rpm/kernel-binary.spec.in: Only build -base and -extra with CONFIG_MODULES (bsc#1000118)
- rpm/kernel-binary.spec.in: Simplify debug info switch Any CONFIG_DEBUG_INFO sub-options are answered in the configs nowadays.
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rpm/package-descriptions: Add 64kb kernel flavor description
- rpm/package-descriptions: add kernel-syzkaller
- rpm/package-descriptions: pv has been merged into -default (fate#315712)
- rpm/package-descriptions: the flavor is 64kb, not 64k
- s390/mm: fix gmap tlb flush issues (bnc#1005925).
- sched/core: Optimize __schedule() (bnc#978907 Scheduler performance -- context switch).
- sched/fair: Fix incorrect task group -&gt;load_avg (bsc#981825).
- sched/fair: Optimize find_idlest_cpu() when there is no choice (bnc#978907 Scheduler performance -- idle search).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013001).
- serial: 8250_port: fix runtime PM use in __do_stop_tx_rs485() (bsc#983152).
- sunrpc: fix refcounting problems with auth_gss messages (boo#1011250).
- supported.conf: add hid-logitech-hidpp (bsc#1002322 bsc#1002786)
- supported.conf: Add overlay.ko to -base (fate#321903) Also, delete the stale entry for the old overlayfs.
- supported.conf: Mark vmx-crypto as supported (fate#319564)
- supported.conf: xen-netfront should be in base packages, just        like its non-pvops predecessor. (bsc#1002770)
- target: fix tcm_rbd_gen_it_nexus for emulated XCOPY state (bsc#1003606).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#963609 FATE#320143).
- time: Avoid undefined behaviour in ktime_add_safe() (bnc#1006103).
- Update config files: select new CONFIG_SND_SOC_INTEL_SST_* helpers
- Update patches.suse/btrfs-8401-fix-qgroup-accounting-when-creating-snap.patch (bsc#972993).
- usb: gadget: composite: Clear reserved fields of SSP Dev Cap (FATE#319959).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- Using BUG_ON() as an assert() is _never_ acceptable (bnc#1005929).
- vmxnet3: Wake queue from reset work (bsc#999907).
- Whitelist KVM KABI changes resulting from adding a hcall.  caused by 5246adec59458b5d325b8e1462ea9ef3ead7f6ae  powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected as result of changing KVM KABI so whitelisting for now. If we get some additional input from IBM we can back out the patch.
- writeback: initialize inode members that track writeback history (bsc#1012829).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq() (bsc#1013479).
- x86/efi: Enable runtime call flag checking (bsc#1005745).
- x86/efi: Move to generic {__,}efi_call_virt() (bsc#1005745).
- x86/hpet: Reduce HPET counter read contention (bsc#1014710).
- x86/mce/AMD, EDAC/mce_amd: Define and use tables for known SMCA IP types (fate#320474, bsc#1013700). Exclude removed symbols from kABI check. They're AMD Zen relevant only and completely useless to other modules - only edac_mce_amd.ko.
- x86/mce/AMD: Increase size of the bank_map type (fate#320474, bsc#1013700).
- x86/mce/AMD: Read MSRs on the CPU allocating the threshold blocks (fate#320474, bsc#1013700).
- x86/mce/AMD: Update sysfs bank names for SMCA systems (fate#320474, bsc#1013700).
- x86/mce/AMD: Use msr_ops.misc() in allocate_threshold_blocks() (fate#320474, bsc#1013700).
- x86/pci: VMD: Attach VMD resources to parent domain's resource tree (bsc#1006827).
- x86/pci: VMD: Document code for maintainability (bsc#1006827).
- x86/pci: VMD: Fix infinite loop executing irq's (bsc#1006827).
- x86/pci: VMD: Initialize list item in IRQ disable (bsc#1006827).
- x86/pci: VMD: Request userspace control of PCIe hotplug indicators (bsc#1006827).
- x86/pci: VMD: Select device dma ops to override (bsc#1006827).
- x86/pci: VMD: Separate MSI and MSI-X vector sharing (bsc#1006827).
- x86/pci: VMD: Set bus resource start to 0 (bsc#1006827).
- x86/pci: VMD: Synchronize with RCU freeing MSI IRQ descs (bsc#1006827).
- x86/pci: VMD: Use lock save/restore in interrupt enable path (bsc#1006827).
- x86/pci/VMD: Use untracked irq handler (bsc#1006827).
- x86/pci: VMD: Use x86_vector_domain as parent domain (bsc#1006827).
- x86, powercap, rapl: Add Skylake Server model number (bsc#1003566).
- x86, powercap, rapl: Reorder CPU detection table (bsc#1003566).
- x86, powercap, rapl: Use Intel model macros intead of open-coding (bsc#1003566).
- xen/gntdev: Use VM_MIXEDMAP instead of VM_IO to avoid NUMA balancing (bnc#1005169).
- zram: Fix unbalanced idr management at hot removal (bsc#1010970).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-17"/>
	<updated date="2017-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1000118">SUSE bug 1000118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000189">SUSE bug 1000189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000287">SUSE bug 1000287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000304">SUSE bug 1000304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000433">SUSE bug 1000433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000776">SUSE bug 1000776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001169">SUSE bug 1001169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001171">SUSE bug 1001171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001310">SUSE bug 1001310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001462">SUSE bug 1001462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001888">SUSE bug 1001888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002322">SUSE bug 1002322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002770">SUSE bug 1002770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002786">SUSE bug 1002786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003068">SUSE bug 1003068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003566">SUSE bug 1003566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003581">SUSE bug 1003581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003606">SUSE bug 1003606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003813">SUSE bug 1003813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003866">SUSE bug 1003866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004048">SUSE bug 1004048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004052">SUSE bug 1004052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004252">SUSE bug 1004252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004365">SUSE bug 1004365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005169">SUSE bug 1005169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005327">SUSE bug 1005327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005545">SUSE bug 1005545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005666">SUSE bug 1005666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005745">SUSE bug 1005745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005895">SUSE bug 1005895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005917">SUSE bug 1005917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005921">SUSE bug 1005921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005923">SUSE bug 1005923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005925">SUSE bug 1005925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005929">SUSE bug 1005929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006103">SUSE bug 1006103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006175">SUSE bug 1006175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006267">SUSE bug 1006267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006528">SUSE bug 1006528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006576">SUSE bug 1006576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006804">SUSE bug 1006804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006809">SUSE bug 1006809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006827">SUSE bug 1006827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006915">SUSE bug 1006915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006918">SUSE bug 1006918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007615">SUSE bug 1007615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007653">SUSE bug 1007653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007955">SUSE bug 1007955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008557">SUSE bug 1008557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008979">SUSE bug 1008979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009062">SUSE bug 1009062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010040">SUSE bug 1010040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010158">SUSE bug 1010158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010444">SUSE bug 1010444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010665">SUSE bug 1010665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010690">SUSE bug 1010690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010970">SUSE bug 1010970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011176">SUSE bug 1011176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011250">SUSE bug 1011250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011913">SUSE bug 1011913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012060">SUSE bug 1012060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012094">SUSE bug 1012094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012452">SUSE bug 1012452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012767">SUSE bug 1012767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012992">SUSE bug 1012992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013001">SUSE bug 1013001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013479">SUSE bug 1013479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013700">SUSE bug 1013700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014120">SUSE bug 1014120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014392">SUSE bug 1014392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014701">SUSE bug 1014701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014710">SUSE bug 1014710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015212">SUSE bug 1015212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015359">SUSE bug 1015359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015367">SUSE bug 1015367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015416">SUSE bug 1015416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799133">SUSE bug 799133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922634">SUSE bug 922634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963609">SUSE bug 963609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963655">SUSE bug 963655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963904">SUSE bug 963904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964462">SUSE bug 964462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966170">SUSE bug 966170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966172">SUSE bug 966172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966186">SUSE bug 966186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966191">SUSE bug 966191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966316">SUSE bug 966316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966318">SUSE bug 966318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966325">SUSE bug 966325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966471">SUSE bug 966471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969474">SUSE bug 969474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969475">SUSE bug 969475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969476">SUSE bug 969476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969477">SUSE bug 969477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969756">SUSE bug 969756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971975">SUSE bug 971975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971989">SUSE bug 971989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972993">SUSE bug 972993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974313">SUSE bug 974313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974842">SUSE bug 974842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974843">SUSE bug 974843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978907">SUSE bug 978907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979378">SUSE bug 979378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979681">SUSE bug 979681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981825">SUSE bug 981825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983087">SUSE bug 983087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983152">SUSE bug 983152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983318">SUSE bug 983318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985850">SUSE bug 985850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986255">SUSE bug 986255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986987">SUSE bug 986987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987641">SUSE bug 987641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987703">SUSE bug 987703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987805">SUSE bug 987805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988524">SUSE bug 988524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988715">SUSE bug 988715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990384">SUSE bug 990384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992555">SUSE bug 992555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993739">SUSE bug 993739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993841">SUSE bug 993841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993891">SUSE bug 993891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994881">SUSE bug 994881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995278">SUSE bug 995278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997059">SUSE bug 997059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997639">SUSE bug 997639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997807">SUSE bug 997807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998054">SUSE bug 998054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999907">SUSE bug 999907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7917/">CVE-2016-7917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9919/">CVE-2016-9919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80064" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1034849" ref_url="https://bugzilla.suse.com/1034849" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<description>

This update for java-1_8_0-openjdk fixes the following issues:

- Upgrade to version jdk8u131 (icedtea 3.4.0) - bsc#1034849
  * Security fixes
    - S8163520, CVE-2017-3509: Reuse cache entries
    - S8163528, CVE-2017-3511: Better library loading
    - S8165626, CVE-2017-3512: Improved window framing
    - S8167110, CVE-2017-3514: Windows peering issue
    - S8168699: Validate special case invocations
    - S8169011, CVE-2017-3526: Resizing XML parse trees
    - S8170222, CVE-2017-3533: Better transfers of files
    - S8171121, CVE-2017-3539: Enhancing jar checking
    - S8171533, CVE-2017-3544: Better email transfer
    - S8172299: Improve class processing
  * New features
    - PR1969: Add AArch32 JIT port
    - PR3297: Allow Shenandoah to be used on AArch64
    - PR3340: jstack.stp should support AArch64
  * Import of OpenJDK 8 u131 build 11
    - S6474807: (smartcardio) CardTerminal.connect() throws
      CardException instead of CardNotPresentException
    - S6515172, PR3346: Runtime.availableProcessors() ignores Linux
      taskset command
    - S7155957:
      closed/java/awt/MenuBar/MenuBarStress1/MenuBarStress1.java
      hangs on win 64 bit with jdk8
    - S7167293: FtpURLConnection connection leak on
      FileNotFoundException
    - S8035568: [macosx] Cursor management unification
    - S8079595: Resizing dialog which is JWindow parent makes JVM
      crash
    - S8130769: The new menu can't be shown on the menubar after
      clicking the 'Add' button.
    - S8146602:
      jdk/test/sun/misc/URLClassPath/ClassnameCharTest.java test
      fails with NullPointerException
    - S8147842: IME Composition Window is displayed at incorrect
      location
    - S8147910, PR3346: Cache initial active_processor_count
    - S8150490: Update OS detection code to recognize Windows
      Server 2016
    - S8160951: [TEST_BUG]
      javax/xml/bind/marshal/8134111/UnmarshalTest.java should be
      added into :needs_jre group
    - S8160958: [TEST_BUG]
      java/net/SetFactoryPermission/SetFactoryPermission.java
      should be added into :needs_compact2 group
    - S8161147: jvm crashes when -XX:+UseCountedLoopSafepoints is
      enabled
    - S8161195: Regression:
      closed/javax/swing/text/FlowView/LayoutTest.java
    - S8161993, PR3346: G1 crashes if active_processor_count
      changes during startup
    - S8162876: [TEST_BUG]
      sun/net/www/protocol/http/HttpInputStream.java fails
      intermittently
    - S8162916: Test sun/security/krb5/auto/UnboundSSL.java fails
    - S8164533: sun/security/ssl/SSLSocketImpl/CloseSocket.java
      failed with 'Error while cleaning up threads after test'
    - S8167179: Make XSL generated namespace prefixes local to
      transformation process
    - S8168774: Polymorhic signature method check crashes javac
    - S8169465: Deadlock in com.sun.jndi.ldap.pool.Connections
    - S8169589: [macosx] Activating a JDialog puts to back another
      dialog
    - S8170307: Stack size option -Xss is ignored
    - S8170316: (tz) Support tzdata2016j
    - S8170814: Reuse cache entries (part II)
    - S8170888, PR3314, RH1284948: [linux] Experimental support for
      cgroup memory limits in container (ie Docker) environments
    - S8171388: Update JNDI Thread contexts
    - S8171949: [macosx] AWT_ZoomFrame Automated tests fail with
      error: The bitwise mask Frame.ICONIFIED is not setwhen the
      frame is in ICONIFIED state
    - S8171952: [macosx]
      AWT_Modality/Automated/ModalExclusion/NoExclusion/ModelessDialog
      test fails as DummyButton on Dialog did not gain focus when
	  clicked.
    - S8173030: Temporary backout fix #8035568 from 8u131-b03
    - S8173031: Temporary backout fix #8171952 from 8u131-b03
    - S8173783, PR3328: IllegalArgumentException:
      jdk.tls.namedGroups
    - S8173931: 8u131 L10n resource file update
    - S8174844: Incorrect GPL header causes RE script to miss swap
      to commercial header for licensee source bundle
    - S8174985: NTLM authentication doesn't work with IIS if NTLM
      cache is disabled
    - S8176044: (tz) Support tzdata2017a
  * Backports
    - S6457406, PR3335: javadoc doesn't handle &lt;a
      href='http://...'&gt; properly in producing index pages
    - S8030245, PR3335: Update langtools to use try-with-resources
      and multi-catch
    - S8030253, PR3335: Update langtools to use strings-in-switch
    - S8030262, PR3335: Update langtools to use foreach loops
    - S8031113, PR3337: TEST_BUG:
      java/nio/channels/AsynchronousChannelGroup/Basic.java fails
      intermittently
    - S8031625, PR3335: javadoc problems referencing inner class
      constructors
    - S8031649, PR3335: Clean up javadoc tests
    - S8031670, PR3335: Remove unneeded -source options in javadoc
      tests
    - S8032066, PR3335: Serialized form has broken links to non
      private inner classes of package private
    - S8034174, PR2290: Remove use of JVM_* functions from java.net
      code
    - S8034182, PR2290: Misc. warnings in java.net code
    - S8035876, PR2290: AIX build issues after '8034174: Remove use
      of JVM_* functions from java.net code'
    - S8038730, PR3335: Clean up the way JavadocTester is invoked,
      and checks for errors.
    - S8040903, PR3335: Clean up use of BUG_ID in javadoc tests
    - S8040904, PR3335: Ensure javadoc tests do not overwrite
      results within tests
    - S8040908, PR3335: javadoc test TestDocEncoding should use
      -notimestamp
    - S8041150, PR3335: Avoid silly use of static methods in
      JavadocTester
    - S8041253, PR3335: Avoid redundant synonyms of NO_TEST
    - S8043780, PR3368: Use open(O_CLOEXEC) instead of
      fcntl(FD_CLOEXEC)
    - S8061305, PR3335: Javadoc crashes when method name ends with
      'Property'
    - S8072452, PR3337: Support DHE sizes up to 8192-bits and DSA
      sizes up to 3072-bits
    - S8075565, PR3337: Define @intermittent jtreg keyword and mark
      intermittently failing jdk tests
    - S8075670, PR3337: Remove intermittent keyword from some tests
    - S8078334, PR3337: Mark regression tests using randomness
    - S8078880, PR3337: Mark a few more intermittently failuring
      security-libs
    - S8133318, PR3337: Exclude intermittent failing PKCS11 tests
      on Solaris SPARC 11.1 and earlier
    - S8144539, PR3337: Update PKCS11 tests to run with security
      manager
    - S8144566, PR3352: Custom HostnameVerifier disables SNI
      extension
    - S8153711, PR3313, RH1284948: [REDO] JDWP: Memory Leak:
      GlobalRefs never deleted when processing invokeMethod command
    - S8155049, PR3352: New tests from 8144566 fail with 'No
      expected Server Name Indication'
    - S8173941, PR3326: SA does not work if executable is DSO
    - S8174164, PR3334, RH1417266: SafePointNode::_replaced_nodes
      breaks with irreducible loops
    - S8174729, PR3336, RH1420518: Race Condition in
      java.lang.reflect.WeakCache
    - S8175097, PR3334, RH1417266: [TESTBUG] 8174164 fix missed the
      test
  * Bug fixes
    - PR3348: Architectures unsupported by SystemTap tapsets throw
      a parse error
    - PR3378: Perl should be mandatory
    - PR3389: javac.in and javah.in should use @PERL@ rather than a
      hardcoded path
  * AArch64 port
    - S8168699, PR3372: Validate special case invocations [AArch64
      support]
    - S8170100, PR3372: AArch64: Crash in C1-compiled code
      accessing References
    - S8172881, PR3372: AArch64: assertion failure: the int
      pressure is incorrect
    - S8173472, PR3372: AArch64: C1 comparisons with null only use
      32-bit instructions
    - S8177661, PR3372: Correct ad rule output register types from
      iRegX to iRegXNoSp
  * AArch32 port
    - PR3380: Zero should not be enabled by default on arm with the
      AArch32 HotSpot build
    - PR3384, S8139303, S8167584: Add support for AArch32
      architecture to configure and jdk makefiles
    - PR3385: aarch32 does not support -Xshare:dump
    - PR3386, S8164652: AArch32 jvm.cfg wrong for C1 build
    - PR3387: Installation fails on arm with AArch32 port as
      INSTALL_ARCH_DIR is arm, not aarch32
    - PR3388: Wrong path for jvm.cfg being used on arm with AArch32
      build
  * Shenandoah
    - Fix Shenandoah argument checking on 32bit builds.
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u101-b14-shenandoah-merge-2016-07-25
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-02-20
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-06
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-09
    - Import from Shenandoah tag
      aarch64-shenandoah-jdk8u121-b14-shenandoah-merge-2017-03-23
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80065" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1002981" ref_url="https://bugzilla.suse.com/1002981" source="BUGZILLA"/>
		<reference ref_id="1010735" ref_url="https://bugzilla.suse.com/1010735" source="BUGZILLA"/>
		<reference ref_id="1010740" ref_url="https://bugzilla.suse.com/1010740" source="BUGZILLA"/>
		<reference ref_id="1010752" ref_url="https://bugzilla.suse.com/1010752" source="BUGZILLA"/>
		<reference ref_id="1010754" ref_url="https://bugzilla.suse.com/1010754" source="BUGZILLA"/>
		<reference ref_id="1010911" ref_url="https://bugzilla.suse.com/1010911" source="BUGZILLA"/>
		<reference ref_id="1021739" ref_url="https://bugzilla.suse.com/1021739" source="BUGZILLA"/>
		<reference ref_id="1025913" ref_url="https://bugzilla.suse.com/1025913" source="BUGZILLA"/>
		<reference ref_id="1026507" ref_url="https://bugzilla.suse.com/1026507" source="BUGZILLA"/>
		<reference ref_id="1027692" ref_url="https://bugzilla.suse.com/1027692" source="BUGZILLA"/>
		<reference ref_id="1027998" ref_url="https://bugzilla.suse.com/1027998" source="BUGZILLA"/>
		<reference ref_id="1033936" ref_url="https://bugzilla.suse.com/1033936" source="BUGZILLA"/>
		<reference ref_id="1033937" ref_url="https://bugzilla.suse.com/1033937" source="BUGZILLA"/>
		<reference ref_id="1033938" ref_url="https://bugzilla.suse.com/1033938" source="BUGZILLA"/>
		<reference ref_id="1033939" ref_url="https://bugzilla.suse.com/1033939" source="BUGZILLA"/>
		<reference ref_id="1033940" ref_url="https://bugzilla.suse.com/1033940" source="BUGZILLA"/>
		<reference ref_id="1033941" ref_url="https://bugzilla.suse.com/1033941" source="BUGZILLA"/>
		<reference ref_id="1033942" ref_url="https://bugzilla.suse.com/1033942" source="BUGZILLA"/>
		<reference ref_id="1033943" ref_url="https://bugzilla.suse.com/1033943" source="BUGZILLA"/>
		<reference ref_id="1033944" ref_url="https://bugzilla.suse.com/1033944" source="BUGZILLA"/>
		<reference ref_id="1033945" ref_url="https://bugzilla.suse.com/1033945" source="BUGZILLA"/>
		<reference ref_id="990856" ref_url="https://bugzilla.suse.com/990856" source="BUGZILLA"/>
		<reference ref_id="998761" ref_url="https://bugzilla.suse.com/998761" source="BUGZILLA"/>
		<reference ref_id="998762" ref_url="https://bugzilla.suse.com/998762" source="BUGZILLA"/>
		<reference ref_id="998763" ref_url="https://bugzilla.suse.com/998763" source="BUGZILLA"/>
		<reference ref_id="998800" ref_url="https://bugzilla.suse.com/998800" source="BUGZILLA"/>
		<reference ref_id="998963" ref_url="https://bugzilla.suse.com/998963" source="BUGZILLA"/>
		<reference ref_id="998964" ref_url="https://bugzilla.suse.com/998964" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<description>

Wireshark was updated to version 2.2.6, which brings several new features, enhancements
and bug fixes.

Thses security issues were fixed:

- CVE-2017-7700: In Wireshark the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size (bsc#1033936)
- CVE-2017-7701: In Wireshark the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type (bsc#1033937)
- CVE-2017-7702: In Wireshark the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation (bsc#1033938)
- CVE-2017-7703: In Wireshark the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly (bsc#1033939)
- CVE-2017-7704: In Wireshark the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value (bsc#1033940)
- CVE-2017-7705: In Wireshark the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset (bsc#1033941)
- CVE-2017-7745: In Wireshark the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check (bsc#1033942)
- CVE-2017-7746: In Wireshark the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length (bsc#1033943)
- CVE-2017-7747: In Wireshark the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree (bsc#1033944)
- CVE-2017-7748: In Wireshark the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check (bsc#1033945)
- CVE-2017-6014: In Wireshark a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory (bsc#1025913)
- CVE-2017-5596: In Wireshark the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow (bsc#1021739)
- CVE-2017-5597: In Wireshark the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow (bsc#1021739)
- CVE-2016-9376: In Wireshark the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large (bsc#1010735)
- CVE-2016-9375: In Wireshark the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful (bsc#1010740)
- CVE-2016-9374: In Wireshark the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable (bsc#1010752)
- CVE-2016-9373: In Wireshark the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings (bsc#1010754)
- CVE-2016-7180: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark did not properly consider whether a string is constant, which allowed remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet (bsc#998800)
- CVE-2016-7179: Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark allowed remote attackers to cause a denial of service (application crash) via a crafted packet (bsc#998963)
- CVE-2016-7178: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark did not ensure that memory is allocated for certain data structures, which allowed remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet (bsc#998964)
- CVE-2016-7177: epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark did not restrict the number of channels, which allowed remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet (bsc#998763)
- CVE-2016-7176: epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark called snprintf with one of its input buffers as the output buffer, which allowed remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet (bsc#998762)
- CVE-2016-7175: epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark mishandled MAC address data, which allowed remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet (bsc#998761)
- CVE-2016-6354: Heap-based buffer overflow in the yy_get_next_buffer function in Flex might have allowed context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read (bsc#990856).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1002981">SUSE bug 1002981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026507">SUSE bug 1026507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027692">SUSE bug 1027692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027998">SUSE bug 1027998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80066" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1015351" ref_url="https://bugzilla.suse.com/1015351" source="BUGZILLA"/>
		<reference ref_id="1024145" ref_url="https://bugzilla.suse.com/1024145" source="BUGZILLA"/>
		<reference ref_id="1039361" ref_url="https://bugzilla.suse.com/1039361" source="BUGZILLA"/>
		<reference ref_id="981124" ref_url="https://bugzilla.suse.com/981124" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html" source="SUSE-SU"/>
		<description>

This update for sudo fixes the following issues:

CVE-2017-1000367:
- Due to incorrect assumptions in /proc/[pid]/stat parsing,
  a local attacker can pretend that his tty is any file on the filesystem,
  thus gaining arbitrary file write access on SELinux-enabled systems. [bsc#1039361]
- Fix FQDN for hostname. [bsc#1024145]
- Filter netgroups, they aren't handled by SSSD. [bsc#1015351]
- Fix problems related to 'krb5_ccname' option [bsc#981124]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1015351">SUSE bug 1015351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024145">SUSE bug 1024145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981124">SUSE bug 981124</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550311" comment="sudo-1.8.10p3-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80067" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="981114" ref_url="https://bugzilla.suse.com/981114" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following issues:

- CVE-2017-9047, CVE-2017-9048: The function xmlSnprintfElementContent in valid.c was vulnerable to a stack buffer overflow (bsc#1039063, bsc#1039064)
- CVE-2017-9049: The function xmlDictComputeFastKey in dict.c was vulnerable to a heap-based buffer over-read. (bsc#1039066)
- CVE-2017-9050: The function xmlDictAddString was vulnerable to a heap-based buffer over-read (bsc#1039661)
- CVE-2016-1839: heap-based buffer overflow (xmlDictAddString func) (bnc#1039069)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-05-30"/>
	<updated date="2017-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550312" comment="libxml2-2-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550313" comment="libxml2-2-32bit-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532986" comment="libxml2-doc-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550314" comment="libxml2-tools-2.9.4-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550315" comment="python-libxml2-2.9.4-36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80068" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1039514" ref_url="https://bugzilla.suse.com/1039514" source="BUGZILLA"/>
		<reference ref_id="1039515" ref_url="https://bugzilla.suse.com/1039515" source="BUGZILLA"/>
		<reference ref_id="985012" ref_url="https://bugzilla.suse.com/985012" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002934.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514)
- CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service  (bsc#1039515)
- IKEv1 protocol is vulnerable to DoS amplification attack (bsc#985012)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-01"/>
	<updated date="2017-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985012">SUSE bug 985012</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550316" comment="strongswan-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518698" comment="strongswan-doc-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550317" comment="strongswan-hmac-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550318" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550319" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80069" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="991464" ref_url="https://bugzilla.suse.com/991464" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002936.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

-  CVE-2016-6489:
  * Reject invalid RSA keys with even modulo.
  * Check for invalid keys, with even p, in dsa_sign().
  * Use function mpz_powm_sec() instead of mpz_powm() (bsc#991464).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-02"/>
	<updated date="2017-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/991464">SUSE bug 991464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550320" comment="libhogweed2-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550321" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550322" comment="libnettle4-2.7.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550323" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80070" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1028075" ref_url="https://bugzilla.suse.com/1028075" source="BUGZILLA"/>
		<reference ref_id="1033091" ref_url="https://bugzilla.suse.com/1033091" source="BUGZILLA"/>
		<reference ref_id="1034870" ref_url="https://bugzilla.suse.com/1034870" source="BUGZILLA"/>
		<reference ref_id="1034872" ref_url="https://bugzilla.suse.com/1034872" source="BUGZILLA"/>
		<reference ref_id="1034876" ref_url="https://bugzilla.suse.com/1034876" source="BUGZILLA"/>
		<reference ref_id="1036976" ref_url="https://bugzilla.suse.com/1036976" source="BUGZILLA"/>
		<reference ref_id="1036977" ref_url="https://bugzilla.suse.com/1036977" source="BUGZILLA"/>
		<reference ref_id="1036978" ref_url="https://bugzilla.suse.com/1036978" source="BUGZILLA"/>
		<reference ref_id="1036980" ref_url="https://bugzilla.suse.com/1036980" source="BUGZILLA"/>
		<reference ref_id="1036981" ref_url="https://bugzilla.suse.com/1036981" source="BUGZILLA"/>
		<reference ref_id="1036982" ref_url="https://bugzilla.suse.com/1036982" source="BUGZILLA"/>
		<reference ref_id="1036983" ref_url="https://bugzilla.suse.com/1036983" source="BUGZILLA"/>
		<reference ref_id="1036984" ref_url="https://bugzilla.suse.com/1036984" source="BUGZILLA"/>
		<reference ref_id="1036985" ref_url="https://bugzilla.suse.com/1036985" source="BUGZILLA"/>
		<reference ref_id="1036986" ref_url="https://bugzilla.suse.com/1036986" source="BUGZILLA"/>
		<reference ref_id="1036987" ref_url="https://bugzilla.suse.com/1036987" source="BUGZILLA"/>
		<reference ref_id="1036988" ref_url="https://bugzilla.suse.com/1036988" source="BUGZILLA"/>
		<reference ref_id="1036989" ref_url="https://bugzilla.suse.com/1036989" source="BUGZILLA"/>
		<reference ref_id="1036990" ref_url="https://bugzilla.suse.com/1036990" source="BUGZILLA"/>
		<reference ref_id="1036991" ref_url="https://bugzilla.suse.com/1036991" source="BUGZILLA"/>
		<reference ref_id="1037527" ref_url="https://bugzilla.suse.com/1037527" source="BUGZILLA"/>
		<reference ref_id="1038000" ref_url="https://bugzilla.suse.com/1038000" source="BUGZILLA"/>
		<reference ref_id="1040025" ref_url="https://bugzilla.suse.com/1040025" source="BUGZILLA"/>
		<reference ref_id="1040303" ref_url="https://bugzilla.suse.com/1040303" source="BUGZILLA"/>
		<reference ref_id="1040304" ref_url="https://bugzilla.suse.com/1040304" source="BUGZILLA"/>
		<reference ref_id="1040306" ref_url="https://bugzilla.suse.com/1040306" source="BUGZILLA"/>
		<reference ref_id="1040332" ref_url="https://bugzilla.suse.com/1040332" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502/" source="CVE"/>
		<reference ref_id="CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606/" source="CVE"/>
		<reference ref_id="CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941/" source="CVE"/>
		<reference ref_id="CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942/" source="CVE"/>
		<reference ref_id="CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943/" source="CVE"/>
		<reference ref_id="CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343/" source="CVE"/>
		<reference ref_id="CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344/" source="CVE"/>
		<reference ref_id="CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345/" source="CVE"/>
		<reference ref_id="CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346/" source="CVE"/>
		<reference ref_id="CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347/" source="CVE"/>
		<reference ref_id="CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348/" source="CVE"/>
		<reference ref_id="CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349/" source="CVE"/>
		<reference ref_id="CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350/" source="CVE"/>
		<reference ref_id="CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351/" source="CVE"/>
		<reference ref_id="CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352/" source="CVE"/>
		<reference ref_id="CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353/" source="CVE"/>
		<reference ref_id="CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354/" source="CVE"/>
		<reference ref_id="CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355/" source="CVE"/>
		<reference ref_id="CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356/" source="CVE"/>
		<reference ref_id="CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357/" source="CVE"/>
		<reference ref_id="CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765/" source="CVE"/>
		<reference ref_id="CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830/" source="CVE"/>
		<reference ref_id="CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098/" source="CVE"/>
		<reference ref_id="CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141/" source="CVE"/>
		<reference ref_id="CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142/" source="CVE"/>
		<reference ref_id="CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143/" source="CVE"/>
		<reference ref_id="CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<description>

This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-6502: Possible file-descriptor leak in libmagickcore that could be triggered via a
  specially crafted webp file (bsc#1028075).
- CVE-2017-7943: The ReadSVGImage function in svg.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034870). Note that this only impacts the
  built-in SVG implementation. As we use the librsgv implementation, we are not affected.
- CVE-2017-7942: The ReadAVSImage function in avs.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034872).
- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8347: denial of service (memory leak) via a crafted file (ReadEXRImage func in
  exr.c) (bsc#1036982)
- CVE-2017-8348: denial of service (memory leak) via a crafted file (ReadMATImage func in
  mat.c) (bsc#1036983)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8354: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c) (bsc#1036989)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8356: denial of service (memory leak) via a crafted file (ReadSUNImage function in
  sun.c) (bsc#1036991)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-8343: denial of service (memory leak) via a crafted file (ReadAAIImage func in
  aai.c) (bsc#1036977)
- CVE-2017-8357: denial of service (memory leak) via a crafted file (ReadEPTImage func in
  ept.c) (bsc#1036976)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-06"/>
	<updated date="2017-06-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028075">SUSE bug 1028075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036977">SUSE bug 1036977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036982">SUSE bug 1036982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036991">SUSE bug 1036991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80071" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1039063" ref_url="https://bugzilla.suse.com/1039063" source="BUGZILLA"/>
		<reference ref_id="1039064" ref_url="https://bugzilla.suse.com/1039064" source="BUGZILLA"/>
		<reference ref_id="1039066" ref_url="https://bugzilla.suse.com/1039066" source="BUGZILLA"/>
		<reference ref_id="1039069" ref_url="https://bugzilla.suse.com/1039069" source="BUGZILLA"/>
		<reference ref_id="1039661" ref_url="https://bugzilla.suse.com/1039661" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following security issues:

* CVE-2017-9050: A heap-based buffer over-read in xmlDictAddString (bsc#1039069, bsc#1039661)
* CVE-2017-9049: A heap-based buffer overflow in xmlDictComputeFastKey (bsc#1039066)
* CVE-2017-9048: A stack overflow vulnerability in xmlSnprintfElementContent (bsc#1039063)
* CVE-2017-9047: A stack overflow vulnerability in xmlSnprintfElementContent (bsc#1039064)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-12"/>
	<updated date="2017-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550326" comment="libxml2-2-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550327" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532998" comment="libxml2-doc-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550328" comment="libxml2-tools-2.9.4-39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550329" comment="python-libxml2-2.9.4-39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80072" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1009470" ref_url="https://bugzilla.suse.com/1009470" source="BUGZILLA"/>
		<reference ref_id="1037396" ref_url="https://bugzilla.suse.com/1037396" source="BUGZILLA"/>
		<reference ref_id="1041764" ref_url="https://bugzilla.suse.com/1041764" source="BUGZILLA"/>
		<reference ref_id="972331" ref_url="https://bugzilla.suse.com/972331" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002942.html" source="SUSE-SU"/>
		<description>

This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2017-9287: A double free vulnerability in the mdb backend during search with page size 0 was fixed (bsc#1041764)

Non security bugs fixed:

- Let OpenLDAP read system-wide certificates by default and don't hide the error if
  the user-specified CA location cannot be read. (bsc#1009470)
- Fix an uninitialised variable that causes startup failure (bsc#1037396)
- Fix an issue with transaction management that can cause server crash (bsc#972331)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-14"/>
	<updated date="2017-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1009470">SUSE bug 1009470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037396">SUSE bug 1037396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041764">SUSE bug 1041764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972331">SUSE bug 972331</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550330" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550331" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550332" comment="openldap2-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550333" comment="openldap2-back-meta-2.4.41-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550334" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80073" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="920813" ref_url="https://bugzilla.suse.com/920813" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00008.html" source="SUSE-SU"/>
		<description>
This update for jakarta-taglibs-standard fixes the following issues:

- CVE-2015-0254: Apache Standard Taglibs allowed remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) x:parse or (2) x:transform JSTL XML tag. (bsc#920813)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-14"/>
	<updated date="2017-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533005" comment="jakarta-taglibs-standard-1.1.1-255.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533006" comment="jakarta-taglibs-standard-javadoc-1.1.1-255.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80074" version="1" class="patch">
	<metadata>
		<title>Security update for libmicrohttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1041216" ref_url="https://bugzilla.suse.com/1041216" source="BUGZILLA"/>
		<reference ref_id="854443" ref_url="https://bugzilla.suse.com/854443" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<reference ref_id="CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002945.html" source="SUSE-SU"/>
		<description>

This update for libmicrohttpd fixes the following issues:

- CVE-2013-7038: The MHD_http_unescape function in libmicrohttpd might
  have allowed remote attackers to obtain sensitive information or cause
  a denial of service (crash) via unspecified vectors that trigger an
  out-of-bounds read. (bsc#854443)
- CVE-2013-7039: Stack-based buffer overflow in the MHD_digest_auth_check
  function in libmicrohttpd, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is
  set to a large value, allowed remote attackers to cause a denial of
  service (crash) or possibly execute arbitrary code via a long URI in an
  authentication header. (bsc#854443)

- Fixed various bugs found during a 2017 audit, which are more hardening
  measures and not security issues. (bsc#1041216)

		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1041216">SUSE bug 1041216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854443">SUSE bug 854443</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550335" comment="libmicrohttpd10-0.9.30-5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80075" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase, libqt5-qtdeclarative (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013095" ref_url="https://bugzilla.suse.com/1013095" source="BUGZILLA"/>
		<reference ref_id="1034005" ref_url="https://bugzilla.suse.com/1034005" source="BUGZILLA"/>
		<reference ref_id="1034402" ref_url="https://bugzilla.suse.com/1034402" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2017:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002946.html" source="SUSE-SU"/>
		<description>

This update for libqt5-qtbase and libqt5-qtdeclarative fixes the following issues:

This security issue was fixed:

- Prevent potential information leak due to race condition in QSaveFile (bsc#1034005).

These non-security issues were fixed:

- Fixed crash in QPlainTextEdit
- Fixed Burmese rendering issue
- Fixed reuse of C++-owned QObjects by different QML engines that could lead to crashes in kwin (bsc#1034402)
- Make libqt5-qtquickcontrols available in SUSE Linux Enterprise.
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-16"/>
	<updated date="2017-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013095">SUSE bug 1013095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034005">SUSE bug 1034005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034402">SUSE bug 1034402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550336" comment="libQt5Concurrent5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550337" comment="libQt5Core5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550338" comment="libQt5DBus5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550339" comment="libQt5Gui5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550340" comment="libQt5Network5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550341" comment="libQt5OpenGL5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550342" comment="libQt5PrintSupport5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550343" comment="libQt5Sql5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550344" comment="libQt5Sql5-mysql-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550345" comment="libQt5Sql5-postgresql-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550346" comment="libQt5Sql5-sqlite-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550347" comment="libQt5Sql5-unixODBC-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550348" comment="libQt5Test5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550349" comment="libQt5Widgets5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550350" comment="libQt5Xml5-5.6.1-17.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550351" comment="libQtQuick5-5.6.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80076" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1024287" ref_url="https://bugzilla.suse.com/1024287" source="BUGZILLA"/>
		<reference ref_id="1024292" ref_url="https://bugzilla.suse.com/1024292" source="BUGZILLA"/>
		<reference ref_id="1024294" ref_url="https://bugzilla.suse.com/1024294" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581/" source="CVE"/>
		<reference ref_id="CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586/" source="CVE"/>
		<reference ref_id="CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

Security bugs:
* CVE-2017-2586: A NULL pointer dereference in stringToUint function could lead to a denial of service (abort) problem when processing malformed images. [bsc#1024292]
* CVE-2017-2581: A out-of-bounds write in writeRasterPbm() could be used by attackers to crash the decoder or potentially execute code. [bsc#1024287]
* CVE-2017-2587: A insufficient size check of memory allocation in createCanvas() function could be used for a denial of service attack (memory exhaustion) [bsc#1024294]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024292">SUSE bug 1024292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024294">SUSE bug 1024294</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550352" comment="libnetpbm11-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550353" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550354" comment="netpbm-10.66.3-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80077" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042326" ref_url="https://bugzilla.suse.com/1042326" source="BUGZILLA"/>
		<reference ref_id="931932" ref_url="https://bugzilla.suse.com/931932" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9526" ref_url="https://www.suse.com/security/cve/CVE-2017-9526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002955.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2017-9526: Store the session key in secure memory to ensure that constant
  time point operations are used in the MPI library.  (bsc#1042326)

- Don't require secure memory for the fips selftests, this prevents the
  'Oops, secure memory pool already initialized' warning. (bsc#931932)
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042326">SUSE bug 1042326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931932">SUSE bug 931932</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-9526/">CVE-2017-9526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550355" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550356" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550357" comment="libgcrypt20-hmac-1.6.1-16.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550358" comment="libgcrypt20-hmac-32bit-1.6.1-16.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80078" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013648" ref_url="https://bugzilla.suse.com/1013648" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002567.html" source="SUSE-SU"/>
		<description>

This update for apache2 fixes the following issues:

- CVE-2016-8740 Server memory can be exhausted and service denied when HTTP/2 is used [bsc#1013648]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-01-19"/>
	<updated date="2017-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013648">SUSE bug 1013648</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550359" comment="apache2-2.4.23-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533029" comment="apache2-doc-2.4.23-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550360" comment="apache2-example-pages-2.4.23-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550361" comment="apache2-prefork-2.4.23-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550362" comment="apache2-utils-2.4.23-16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550363" comment="apache2-worker-2.4.23-16.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80079" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1039357" ref_url="https://bugzilla.suse.com/1039357" source="BUGZILLA"/>
		<reference ref_id="1040043" ref_url="https://bugzilla.suse.com/1040043" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00016.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
  allowed unprivileged system users to manipulate the stack of setuid binaries
  to gain special privileges. [bsc#1039357]

- A bug in glibc that could result in deadlocks between malloc() and fork() has
  been fixed. [bsc#1040043]
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040043">SUSE bug 1040043</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550364" comment="glibc-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550365" comment="glibc-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550366" comment="glibc-devel-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550367" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533036" comment="glibc-html-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518742" comment="glibc-i18ndata-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533037" comment="glibc-info-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550368" comment="glibc-locale-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550369" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550370" comment="glibc-profile-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550371" comment="glibc-profile-32bit-2.22-61.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550372" comment="nscd-2.22-61.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80080" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1037384" ref_url="https://bugzilla.suse.com/1037384" source="BUGZILLA"/>
		<reference ref_id="1039348" ref_url="https://bugzilla.suse.com/1039348" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002960.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using 
  more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page
  to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a 
  hardening measure against this kind of userland attack.(bsc#1039348)

The following non-security bugs were fixed:

- There was a load failure in the sha-mb encryption implementation (bsc#1037384).
		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-19"/>
	<updated date="2017-06-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1037384">SUSE bug 1037384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550373" comment="kernel-default-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550374" comment="kernel-default-base-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550375" comment="kernel-default-devel-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550376" comment="kernel-default-man-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518749" comment="kernel-devel-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518750" comment="kernel-macros-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518751" comment="kernel-source-4.4.59-92.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550377" comment="kernel-syms-4.4.59-92.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80081" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1038709" ref_url="https://bugzilla.suse.com/1038709" source="BUGZILLA"/>
		<reference ref_id="1038711" ref_url="https://bugzilla.suse.com/1038711" source="BUGZILLA"/>
		<reference ref_id="1038713" ref_url="https://bugzilla.suse.com/1038713" source="BUGZILLA"/>
		<reference ref_id="995374" ref_url="https://bugzilla.suse.com/995374" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329/" source="CVE"/>
		<reference ref_id="CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478/" source="CVE"/>
		<reference ref_id="CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2016-6329: Show which ciphers should no longer be used in openvpn --show-ciphers (bsc#995374)
- CVE-2017-7478: openvpn: Authenticated user can DoS server by using a big payload in P_CONTROL (bsc#1038709)
- CVE-2017-7479: openvpn: Denial of Service due to Exhaustion of Packet-ID counter (bsc#1038711)
- Hardening measures found by internal audit (bsc#1038713)


		</description>
<advisory from="security@suse.de">
	<issued date="2017-06-20"/>
	<updated date="2017-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550378" comment="openvpn-2.3.8-16.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550379" comment="openvpn-auth-pam-plugin-2.3.8-16.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80082" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056993" ref_url="https://bugzilla.suse.com/1056993" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003613.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2017-6362: Prevent double-free in gdImagePngPtr() that potentially allowed for DoS or remote code execution (bsc#1056993).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056993">SUSE bug 1056993</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550380" comment="gd-2.1.0-24.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80083" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536455" comment="kgraft-patch-4_4_120-92_70-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80084" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536456" comment="kgraft-patch-4_4_90-92_50-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80085" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536457" comment="kgraft-patch-4_4_90-92_45-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80086" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536458" comment="kgraft-patch-4_4_103-92_56-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80087" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536459" comment="kgraft-patch-4_4_103-92_53-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80088" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536460" comment="kgraft-patch-4_4_74-92_32-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80089" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536461" comment="kgraft-patch-4_4_74-92_29-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80090" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536462" comment="kgraft-patch-4_4_74-92_38-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80091" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_35 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536463" comment="kgraft-patch-4_4_74-92_35-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80092" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536464" comment="kgraft-patch-4_4_114-92_67-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80093" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536465" comment="kgraft-patch-4_4_114-92_64-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80094" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1075975" ref_url="https://bugzilla.suse.com/1075975" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00047.html" source="SUSE-SU"/>
		<description>
This update for xmltooling fixes the following issues:

- CVE-2018-0486: Fixed a security bug when xmltooling mishandles digital
  signatures of user attribute data, which allows remote attackers to obtain
  sensitive information or conduct impersonation attacks via a crafted DTD
  (bsc#1075975)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-19"/>
	<updated date="2018-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1075975">SUSE bug 1075975</bugzilla>
	<cve impact="important" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550381" comment="libxmltooling6-1.5.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550382" comment="xmltooling-schemas-1.5.6-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80095" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536466" comment="kgraft-patch-4_4_59-92_20-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80096" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="1090368" ref_url="https://bugzilla.suse.com/1090368" source="BUGZILLA"/>
		<reference ref_id="1090646" ref_url="https://bugzilla.suse.com/1090646" source="BUGZILLA"/>
		<reference ref_id="1090869" ref_url="https://bugzilla.suse.com/1090869" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).
- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).
- bsc#1083125: Fixed kgraft: small race in reversion code
- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)
before
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536467" comment="kgraft-patch-4_4_59-92_24-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80097" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004117.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-1000199: - CVE-2018-1000199: An address corruption flaw was discovered while modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1090036).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536468" comment="kgraft-patch-4_4_121-92_73-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80098" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004154.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-05"/>
	<updated date="2018-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536469" comment="kgraft-patch-4_4_121-92_80-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80099" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094150" ref_url="https://bugzilla.suse.com/1094150" source="BUGZILLA"/>
		<reference ref_id="1094154" ref_url="https://bugzilla.suse.com/1094154" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:

- Fix crash in resolver on memory allocation failure (bsc#1086690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-06"/>
	<updated date="2018-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550383" comment="glibc-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550385" comment="glibc-devel-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550387" comment="glibc-locale-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550389" comment="glibc-profile-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550391" comment="nscd-2.22-62.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80100" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<description>
This update for git fixes several issues.

These security issues were fixed:

- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)
- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545508" comment="git-core-2.12.3-27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80101" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

This security issue was fixed:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-07"/>
	<updated date="2018-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80102" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1039616" ref_url="https://bugzilla.suse.com/1039616" source="BUGZILLA"/>
		<reference ref_id="1047487" ref_url="https://bugzilla.suse.com/1047487" source="BUGZILLA"/>
		<reference ref_id="1063043" ref_url="https://bugzilla.suse.com/1063043" source="BUGZILLA"/>
		<reference ref_id="1064311" ref_url="https://bugzilla.suse.com/1064311" source="BUGZILLA"/>
		<reference ref_id="1065180" ref_url="https://bugzilla.suse.com/1065180" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068951" ref_url="https://bugzilla.suse.com/1068951" source="BUGZILLA"/>
		<reference ref_id="1071009" ref_url="https://bugzilla.suse.com/1071009" source="BUGZILLA"/>
		<reference ref_id="1072556" ref_url="https://bugzilla.suse.com/1072556" source="BUGZILLA"/>
		<reference ref_id="1072962" ref_url="https://bugzilla.suse.com/1072962" source="BUGZILLA"/>
		<reference ref_id="1073090" ref_url="https://bugzilla.suse.com/1073090" source="BUGZILLA"/>
		<reference ref_id="1073792" ref_url="https://bugzilla.suse.com/1073792" source="BUGZILLA"/>
		<reference ref_id="1073809" ref_url="https://bugzilla.suse.com/1073809" source="BUGZILLA"/>
		<reference ref_id="1073874" ref_url="https://bugzilla.suse.com/1073874" source="BUGZILLA"/>
		<reference ref_id="1073912" ref_url="https://bugzilla.suse.com/1073912" source="BUGZILLA"/>
		<reference ref_id="964063" ref_url="https://bugzilla.suse.com/964063" source="BUGZILLA"/>
		<reference ref_id="969470" ref_url="https://bugzilla.suse.com/969470" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

This update adds mitigations for various side channel attacks against
modern CPUs that could disclose content of otherwise unreadable memory
(bnc#1068032).

- CVE-2017-5753 / 'SpecŧreAttack': Local attackers on systems with
  modern CPUs featuring deep instruction pipelining could use attacker
  controllable speculative execution over code patterns in the Linux
  Kernel to leak content from otherwise not readable memory in the same
  address space, allowing retrieval of passwords, cryptographic keys
  and other secrets.

  This problem is mitigated by adding speculative fencing on affected
  code paths throughout the Linux kernel.


- CVE-2017-5715 / 'SpectreAttack': Local attackers on systems with modern
  CPUs featuring branch prediction could use mispredicted branches to
  speculatively execute code patterns that in turn could be made to
  leak other non-readable content in the same address space, an attack
  similar to CVE-2017-5753.

  This problem is mitigated by disabling predictive branches, depending
  on CPU architecture either by firmware updates and/or fixes in the
  user-kernel privilege boundaries.

  Please also check with your CPU / Hardware vendor on updated firmware
  or BIOS images regarding this issue.

  As this feature can have a performance impact, it can be disabled
  using the 'nospec' kernel commandline option.


- CVE-2017-5754 / 'MeltdownAttack': Local attackers on systems with
  modern CPUs featuring deep instruction pipelining could use code
  patterns in userspace to speculative executive code that would read
  otherwise read protected memory, an attack similar to CVE-2017-5753.

  This problem is mitigated by unmapping the Linux Kernel from the user
  address space during user code execution, following a approach called
  'KAISER'. The terms used here are 'KAISER' / 'Kernel Address Isolation'
  and 'PTI' / 'Page Table Isolation'.

  Note that this is only done on affected platforms.

  This feature can be enabled / disabled by the 'pti=[on|off|auto]' or
  'nopti' commandline options.

Also the following unrelated security bugs were fixed:

- CVE-2017-17806: The HMAC implementation (crypto/hmac.c) in the Linux kernel did not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization (bnc#1073874).
- CVE-2017-17805: The Salsa20 encryption algorithm in the Linux kernel did not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable (bnc#1073792).

The following non-security bugs were fixed:

- Add undefine _unique_build_ids (bsc#964063)
- Always sign validate_negotiate_info reqs (bsc#1071009, fate#324404).
- apei / ERST: Fix missing error handling in erst_reader() (bsc#1072556).
- arm: Hide finish_arch_post_lock_switch() from modules (bsc#1068032).
- autofs: fix careless error in recent commit (bnc#1012382 bsc#1065180).
- bpf: prevent speculative execution in eBPF interpreter (bnc#1068032).
- carl9170: prevent speculative execution (bnc#1068032).
- Check cmdline_find_option() retval properly and use boot_cpu_has().
- cw1200: prevent speculative execution (bnc#1068032).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#969470 FATE#319819).
- e1000e: Fix e1000_check_for_copper_link_ich8lan return value (bsc#1073809).
- Fix leak of validate_negotiate_info resp (bsc#1071009, fate#324404).
- Fix NULL pointer deref in SMB2_tcon() (bsc#1071009, fate#324404).
- Fix validate_negotiate_info uninitialized mem (bsc#1071009, fate#324404).
- fs: prevent speculative execution (bnc#1068032).
- genwqe: Take R/W permissions into account when dealing with memory pages (bsc#1073090).
- ibmvnic: Include header descriptor support for ARP packets (bsc#1073912).
- ibmvnic: Increase maximum number of RX/TX queues (bsc#1073912).
- ibmvnic: Rename IBMVNIC_MAX_TX_QUEUES to IBMVNIC_MAX_QUEUES (bsc#1073912).
- ipv6: prevent speculative execution (bnc#1068032).
- kaiser: add 'nokaiser' boot option, using ALTERNATIVE.
- kaiser: align addition to x86/mm/Makefile.
- kaiser: asm/tlbflush.h handle noPGE at lower level.
- kaiser: cleanups while trying for gold link.
- kaiser: Disable on Xen PV.
- kaiser: do not set _PAGE_NX on pgd_none.
- kaiser: drop is_atomic arg to kaiser_pagetable_walk().
- kaiser: enhanced by kernel and user PCIDs.
- kaiser: ENOMEM if kaiser_pagetable_walk() NULL.
- kaiser: fix build and FIXME in alloc_ldt_struct().
- kaiser: fix perf crashes.
- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER.
- kaiser: fix unlikely error in alloc_ldt_struct().
- kaiser: KAISER depends on SMP.
- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID.
- kaiser: kaiser_remove_mapping() move along the pgd.
- kaiser: Kernel Address Isolation.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush.
- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user.
- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET.
- kaiser: paranoid_entry pass cr3 need to paranoid_exit.
- kaiser: PCID 0 for kernel and 128 for user.
- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls.
- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE.
- kaiser: tidied up asm/kaiser.h somewhat.
- kaiser: tidied up kaiser_add/remove_mapping slightly.
- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush.
- kaiser: vmstat show NR_KAISERTABLE as nr_overhead.
- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user.
- kvm: SVM: Do not intercept new speculative control MSRs (bsc#1068032).
- kvm: x86: Add speculative control CPUID support for guests (bsc#1068032).
- locking/barriers: introduce new memory barrier gmb() (bnc#1068032).
- mm/mmu_context, sched/core: Fix mmu_context.h assumption (bsc#1068032).
- net: mpls: prevent speculative execution (bnc#1068032).
- nfs: revalidate '.' etc correctly on 'open' (bsc#1068951).
- nfs: revalidate '.' etc correctly on 'open' (git-fixes). Fix References tag.
- nfsv4: always set NFS_LOCK_LOST when a lock is lost (bsc#1068951).
- p54: prevent speculative execution (bnc#1068032).
- powerpc/barrier: add gmb.
- powerpc: Secure memory rfi flush (bsc#1068032).
- ptrace: Add a new thread access check (bsc#1068032).
- qla2xxx: prevent speculative execution (bnc#1068032).
- Redo encryption backport to fix pkt signing (bsc#1071009, fate#324404).
- s390: add ppa to system call and program check path (bsc#1068032).
- s390: introduce CPU alternatives.
- s390: introduce CPU alternatives (bsc#1068032).
- s390/spinlock: add gmb memory barrier
- s390/spinlock: add gmb memory barrier (bsc#1068032).
- s390/spinlock: add ppa to system call path Signoff the s390 patches.
- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (bsc#1068032).
- sched/core: Idle_task_exit() shouldn't use switch_mm_irqs_off() (bsc#1068032).
- scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1064311).
- scsi_scan: Exit loop if TUR to LUN0 fails with 0x05/0x25 (bsc#1063043). This is specific to FUJITSU ETERNUS_DX* targets. They can return 'Illegal Request - Logical unit not supported' and processing should leave the timeout loop in this case.
- scsi: ses: check return code from ses_recv_diag() (bsc#1039616).
- scsi: ses: Fixup error message 'failed to get diagnostic page 0xffffffea' (bsc#1039616).
- scsi: ses: Fix wrong page error (bsc#1039616).
- scsi: ses: make page2 support optional (bsc#1039616).
- Thermal/int340x: prevent speculative execution (bnc#1068032).
- udf: prevent speculative execution (bnc#1068032).
- Update config files: enable KAISER.
- usb: host: fix incorrect updating of offset (bsc#1047487).
- userns: prevent speculative execution (bnc#1068032).
- uvcvideo: prevent speculative execution (bnc#1068032).
- vxlan: correctly handle ipv6.disable module parameter (bsc#1072962).
- x86/boot: Add early cmdline parsing for options with arguments.
- x86/CPU/AMD: Add speculative control support for AMD (bsc#1068032).
- x86/CPU/AMD: Make the LFENCE instruction serialized (bsc#1068032).
- x86/CPU/AMD: Remove now unused definition of MFENCE_RDTSC feature (bsc#1068032).
- x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- x86/enter: Add macros to set/clear IBRS and set IBPB (bsc#1068032).
- x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- x86/feature: Enable the x86 feature to control Speculation (bsc#1068032).
- x86/idle: Disable IBRS when offlining a CPU and re-enable on wakeup (bsc#1068032).
- x86/idle: Toggle IBRS when going idle (bsc#1068032).
- x86/kaiser: Check boottime cmdline params.
- x86/kaiser: Move feature detection up (bsc#1068032).
- x86/kaiser: Reenable PARAVIRT.
- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling.
- x86/kvm: Add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm (bsc#1068032).
- x86/kvm: Flush IBP when switching VMs (bsc#1068032).
- x86/kvm: Pad RSB on VM transition (bsc#1068032).
- x86/kvm: Toggle IBRS on VM entry and exit (bsc#1068032).
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (bsc#1068032).
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (bsc#1068032).
- x86/mm: Add INVPCID helpers (bsc#1068032).
- x86/mm: Add the 'nopcid' boot option to turn off PCID (bsc#1068032).
- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (bsc#1068032).
- x86/mm: Enable CR4.PCIDE on supported systems (bsc#1068032).
- x86/mm: Fix INVPCID asm constraint (bsc#1068032).
- x86/mm: If INVPCID is available, use it to flush global mappings (bsc#1068032).
- x86/mm: Make flush_tlb_mm_range() more predictable (bsc#1068032).
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (bsc#1068032).
- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (bsc#1068032).
- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (bsc#1068032).
- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (bsc#1068032).
- x86/mm, sched/core: Turn off IRQs in switch_mm() (bsc#1068032).
- x86/mm, sched/core: Uninline switch_mm() (bsc#1068032).
- x86/mm: Set IBPB upon context switch (bsc#1068032).
- x86/MSR: Move native_*msr(.. u64) to msr.h (bsc#1068032).
- x86/paravirt: Dont patch flush_tlb_single (bsc#1068032).
- x86/spec: Add IBRS control functions (bsc#1068032).
- x86/spec: Add 'nospec' chicken bit (bsc#1068032).
- x86/spec: Check CPUID direclty post microcode reload to support IBPB feature (bsc#1068032).
- x86/spec_ctrl: Add an Indirect Branch Predictor barrier (bsc#1068032).
- x86/spec_ctrl: Check whether IBPB is enabled before using it (bsc#1068032).
- x86/spec_ctrl: Check whether IBRS is enabled before using it (bsc#1068032).
- x86/svm: Add code to clear registers on VM exit (bsc#1068032).
- x86/svm: Clobber the RSB on VM exit (bsc#1068032).
- x86/svm: Set IBPB when running a different VCPU (bsc#1068032).
- x86/svm: Set IBRS value on VM entry and exit (bsc#1068032).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039616">SUSE bug 1039616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047487">SUSE bug 1047487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063043">SUSE bug 1063043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064311">SUSE bug 1064311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065180">SUSE bug 1065180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068951">SUSE bug 1068951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071009">SUSE bug 1071009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072556">SUSE bug 1072556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072962">SUSE bug 1072962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073090">SUSE bug 1073090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073809">SUSE bug 1073809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073912">SUSE bug 1073912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969470">SUSE bug 969470</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550392" comment="kernel-default-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550393" comment="kernel-default-base-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550394" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550395" comment="kernel-default-man-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550396" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80103" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through (bsc#1092885)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-08"/>
	<updated date="2018-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550397" comment="libvirt-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550398" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550399" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550400" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550401" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550402" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550403" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550404" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550405" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550406" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550407" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550408" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550409" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550410" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550411" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550412" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550413" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550414" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550415" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80104" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1091836" ref_url="https://bugzilla.suse.com/1091836" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004185.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Update to version 20180425 (bsc#1091836)

Fix provided for:

- GLK          B0       6-7a-1/01 0000001e-&gt;00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx

- Name microcodes which are not allowed to load late
  with a *.early suffix
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-12"/>
	<updated date="2018-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091836">SUSE bug 1091836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519666" comment="ucode-intel-20180425-13.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80105" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1087066" ref_url="https://bugzilla.suse.com/1087066" source="BUGZILLA"/>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:

These security issues were fixed:

- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For other changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087066">SUSE bug 1087066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80106" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u181 fixes the following issues:

+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-14"/>
	<updated date="2018-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80107" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following security issue:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545522" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80108" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

This feature was added:

- Added support for qemu monitor command 

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

- bsc#1086039 - Dom0 does not represent DomU cpu flags
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-15"/>
	<updated date="2018-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80109" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1076503" ref_url="https://bugzilla.suse.com/1076503" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes one issues.

This security issue was fixed:

- CVE-2018-5764: The parse_arguments function in options.c did not prevent
  multiple --protect-args uses, which allowed remote attackers to bypass an
  argument-sanitization protection mechanism (bsc#1076503).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550416" comment="rsync-3.1.0-13.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80110" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to version 8.0.5.15 [bsc#1093311, bsc#1085449]

Security fixes:

- CVE-2018-2826 CVE-2018-2825 CVE-2018-2814 CVE-2018-2794
  CVE-2018-2783 CVE-2018-2799 CVE-2018-2798 CVE-2018-2797
  CVE-2018-2796 CVE-2018-2795 CVE-2018-2800 CVE-2018-2790
  CVE-2018-1417

- Removed translations in the java-1_8_0-ibm-devel-32bit package
  as they conflict with those in java-1_8_0-ibm-devel.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-19"/>
	<updated date="2018-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80111" version="1" class="patch">
	<metadata>
		<title>Security update for procmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068648" ref_url="https://bugzilla.suse.com/1068648" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
		<description>
This update for procmail fixes the following issues:

- CVE-2017-16844: Heap-based buffer overflow in loadbuf function could lead to remote denial of service (bsc#1068648)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-22"/>
	<updated date="2018-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550417" comment="procmail-3.22-269.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80112" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]:

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80113" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-20"/>
	<updated date="2018-06-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548186" comment="ntp-4.2.8p11-64.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548187" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80114" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1090518" ref_url="https://bugzilla.suse.com/1090518" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<description>


MariaDB was updated to 10.0.35 (bsc#1090518)

Notable changes:

* PCRE updated to 8.42
* XtraDB updated to 5.6.39-83.1
* TokuDB updated to 5.6.39-83.1
* InnoDB updated to 5.6.40
* The embedded server library now supports SSL when connecting
  to remote servers [bsc#1088681], [CVE-2018-2767]
* MDEV-15249 - Crash in MVCC read after IMPORT TABLESPACE
* MDEV-14988 - innodb_read_only tries to modify files if
  transactions were recovered in COMMITTED state
* MDEV-14773 - DROP TABLE hangs for InnoDB table with FULLTEXT index
* MDEV-15723 - Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES when
  accessing corrupted record
* fixes for the following security vulnerabilities:
  CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
  CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761,
  CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
* Release notes and changelog:

    * https://kb.askmonty.org/en/mariadb-10035-release-notes
    * https://kb.askmonty.org/en/mariadb-10035-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80115" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-22"/>
	<updated date="2018-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545538" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545539" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545540" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80116" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083650" ref_url="https://bugzilla.suse.com/1083650" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1086400" ref_url="https://bugzilla.suse.com/1086400" source="BUGZILLA"/>
		<reference ref_id="1087007" ref_url="https://bugzilla.suse.com/1087007" source="BUGZILLA"/>
		<reference ref_id="1087012" ref_url="https://bugzilla.suse.com/1087012" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087095" ref_url="https://bugzilla.suse.com/1087095" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090534" ref_url="https://bugzilla.suse.com/1090534" source="BUGZILLA"/>
		<reference ref_id="1090955" ref_url="https://bugzilla.suse.com/1090955" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092552" ref_url="https://bugzilla.suse.com/1092552" source="BUGZILLA"/>
		<reference ref_id="1092813" ref_url="https://bugzilla.suse.com/1092813" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094033" ref_url="https://bugzilla.suse.com/1094033" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1095042" ref_url="https://bugzilla.suse.com/1095042" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241/" source="CVE"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092/" source="CVE"/>
		<reference ref_id="CVE-2018-1093" ref_url="https://www.suse.com/security/cve/CVE-2018-1093/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
  not handle unsigned integer overflow properly. As a result, a large value of
  the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
  ioctl (bsc#1096728).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
  nid, which allowed local users to cause a denial of service (race condition) or
  possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
  option that triggers a NULL value for a flush_cmd_control data structure
  (bnc#1086400)
- CVE-2017-13305: Prevent information disclosure vulnerability in
  encrypted-keys (bsc#1094353).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
  cause a denial of service (out-of-bounds read and system crash) via a crafted
  ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers
  (bsc#1087095).
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
  crc32c checksum driver, which allowed attackers to cause a denial of service
  (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
  ext4 image (bsc#1087007).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
  with a zero i_links_count, which allowed attackers to cause a denial of service
  (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
  image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
  allowed a local user to cause a denial of service by a number of certain
  crafted system calls (bsc#1092904).
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
  that contains a jump but lacks a user-defined chain, which allowed local users
  to cause a denial of service (NULL pointer dereference) by leveraging the
  CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
  handling SCTP packets length that could have been exploited to cause a kernel
  crash (bnc#1083900).
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
  __rds_rdma_map() function that allowed local attackers to cause a system panic
  and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
  (bsc#1082962).
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
  could have caused a crash and possibly memory corruption (bsc#1089895).

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fix the patch content (bsc#1085185)
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-06-29"/>
	<updated date="2018-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087012">SUSE bug 1087012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087095">SUSE bug 1087095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090534">SUSE bug 1090534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090955">SUSE bug 1090955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092552">SUSE bug 1092552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092813">SUSE bug 1092813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094033">SUSE bug 1094033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095042">SUSE bug 1095042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1093/">CVE-2018-1093</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80117" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1075992" ref_url="https://bugzilla.suse.com/1075992" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003623.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes one issues.

This security issue was fixed: 

- CVE-2017-13194: Fixed incorrect memory allocation related to odd frame width (bsc#1075992).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-23"/>
	<updated date="2018-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075992">SUSE bug 1075992</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550423" comment="libvpx1-1.3.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80118" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-05"/>
	<updated date="2018-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550424" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550425" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550426" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550427" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550428" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550429" comment="openssl-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80119" version="1" class="patch">
	<metadata>
		<title>Recommended update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1096141" ref_url="https://bugzilla.suse.com/1096141" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<description>


The Intel CPU microcode bundle was updated to the 20180703 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx

- Add a new style supplements for the recent kernels. (bsc#1096141)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096141">SUSE bug 1096141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519785" comment="ucode-intel-20180703-13.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80120" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004267.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536502" comment="kgraft-patch-4_4_114-92_64-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80121" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004265.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536503" comment="kgraft-patch-4_4_114-92_67-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80122" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004261.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536504" comment="kgraft-patch-4_4_103-92_53-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80123" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004266.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536505" comment="kgraft-patch-4_4_103-92_56-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80124" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004263.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536506" comment="kgraft-patch-4_4_90-92_45-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80125" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004269.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536507" comment="kgraft-patch-4_4_90-92_50-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80126" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004268.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536508" comment="kgraft-patch-4_4_121-92_80-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80127" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004270.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-12"/>
	<updated date="2018-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536509" comment="kgraft-patch-4_4_120-92_70-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80128" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004272.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-13"/>
	<updated date="2018-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536510" comment="kgraft-patch-4_4_121-92_73-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80129" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1068565" ref_url="https://bugzilla.suse.com/1068565" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

These security issue were fixed: 

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)

This non-security issue was fixed: 

- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-17"/>
	<updated date="2018-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068565">SUSE bug 1068565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545541" comment="perl-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545543" comment="perl-base-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80130" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1074171" ref_url="https://bugzilla.suse.com/1074171" source="BUGZILLA"/>
		<reference ref_id="1075737" ref_url="https://bugzilla.suse.com/1075737" source="BUGZILLA"/>
		<reference ref_id="1075738" ref_url="https://bugzilla.suse.com/1075738" source="BUGZILLA"/>
		<reference ref_id="1075739" ref_url="https://bugzilla.suse.com/1075739" source="BUGZILLA"/>
		<reference ref_id="1075748" ref_url="https://bugzilla.suse.com/1075748" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.2.12 fixes the following issues:

- CVE-2018-5334: IxVeriWave file could crash (bsc#1075737)
- CVE-2018-5335: WCP dissector could crash (bsc#1075738)
- CVE-2018-5336: Multiple dissector crashes (bsc#1075739)
- CVE-2017-17935: Incorrect handling of '\n' in file_read_line function could
  have lead to denial of service (bsc#1074171)

This release no longer enables the Linux kernel BPF JIT compiler via the
net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable
to Spectre variant 1 CVE-2017-5753 - (bsc#1075748)

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550430" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550431" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550432" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550433" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550434" comment="wireshark-2.2.12-48.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550435" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80131" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004291.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-19"/>
	<updated date="2018-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550436" comment="shadow-4.2.1-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80132" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes several issues.

These security issues were fixed:

- CVE-2016-6328: Fixed integer overflow in parsing MNOTE entry data of the input
  file (bsc#1055857)
- CVE-2017-7544: Fixed out-of-bounds heap read vulnerability in
  exif_data_save_data_entry function in libexif/exif-data.c caused by improper
  length computation of the allocated data of an ExifMnote entry which can cause
  denial-of-service or possibly information disclosure (bsc#1059893)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550437" comment="libexif12-0.6.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550438" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80133" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004304.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-24"/>
	<updated date="2018-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536512" comment="kgraft-patch-4_4_74-92_32-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80134" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1052460" ref_url="https://bugzilla.suse.com/1052460" source="BUGZILLA"/>
		<reference ref_id="1055053" ref_url="https://bugzilla.suse.com/1055053" source="BUGZILLA"/>
		<reference ref_id="1055063" ref_url="https://bugzilla.suse.com/1055063" source="BUGZILLA"/>
		<reference ref_id="1056550" ref_url="https://bugzilla.suse.com/1056550" source="BUGZILLA"/>
		<reference ref_id="1057723" ref_url="https://bugzilla.suse.com/1057723" source="BUGZILLA"/>
		<reference ref_id="1058422" ref_url="https://bugzilla.suse.com/1058422" source="BUGZILLA"/>
		<reference ref_id="1063049" ref_url="https://bugzilla.suse.com/1063049" source="BUGZILLA"/>
		<reference ref_id="1063050" ref_url="https://bugzilla.suse.com/1063050" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563/" source="CVE"/>
		<reference ref_id="CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691/" source="CVE"/>
		<reference ref_id="CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061/" source="CVE"/>
		<reference ref_id="CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062/" source="CVE"/>
		<reference ref_id="CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042/" source="CVE"/>
		<reference ref_id="CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174/" source="CVE"/>
		<reference ref_id="CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343/" source="CVE"/>
		<reference ref_id="CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277/" source="CVE"/>
		<reference ref_id="CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- security update (xcf.c):
  * CVE-2017-14343: Memory leak vulnerability in ReadXCFImage could lead to denial of service via a crafted file.
    CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allows remote attackers to cause a denial of service 
    (memory consumption) via a crafted file.
    [bsc#1058422]

- security update (pnm.c):
  * CVE-2017-14042: A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c and 
    could lead to remote denial of service [bsc#1056550]

- security update (psd.c):
  * CVE-2017-15281: ReadPSDImage allows remote attackers to cause a denial of service (application crash) or 
    possibly have unspecified other impact via a crafted file [bsc#1063049]
  * CVE-2017-13061: A length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, 
    which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. [bsc#1055063]
  * CVE-2017-12563: A Memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, 
    which allows attackers to cause a denial of service. [bsc#1052460]
  * CVE-2017-14174: Due to a lack of an EOF check (End of File) in ReadPSDLayersInternal could cause huge CPU consumption, 
    when a crafted PSD file, which claims a large 'length' field in the header but does not contain sufficient backing data, 
    is provided, the loop over \'length\' would consume huge CPU resources, since there is no EOF check inside the loop.[bsc#1057723]

- security update (meta.c):
  * CVE-2017-13062: Amemory leak vulnerability was found in the function formatIPTC in coders/meta.c, 
    which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file [bsc#1055053]

- security update (gif.c):
  * CVE-2017-15277: ReadGIFImage in coders/gif.c leaves the palette uninitialized when processing a GIF file that has neither 
    a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting 
    data, this data sometimes can be leaked via the uninitialized palette.[bsc#1063050]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80135" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1087289" ref_url="https://bugzilla.suse.com/1087289" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1097523" ref_url="https://bugzilla.suse.com/1097523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12891: Fix preemption checks bypass in x86 PV MM handling (XSA-264) (bsc#1097521).
- CVE-2018-12892: Fix libxl failure to honour readonly flag on HVM emulated SCSI disks (XSA-266) (bsc#1097523).
- CVE-2018-12893: Fix #DB exception safety check that could be triggered by a guest (XSA-265) (bsc#1097522).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-3665: Fix lazy FP Save/Restore (XSA-267) (bsc#1095242).

Bug fixes:

- bsc#1027519: Update to Xen 4.7.6 bug fix only release.
- bsc#1087289: Xen BUG at sched_credit.c:1663.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087289">SUSE bug 1087289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80136" version="1" class="patch">
	<metadata>
		<title>Security update for libevent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1022917" ref_url="https://bugzilla.suse.com/1022917" source="BUGZILLA"/>
		<reference ref_id="1022918" ref_url="https://bugzilla.suse.com/1022918" source="BUGZILLA"/>
		<reference ref_id="1022919" ref_url="https://bugzilla.suse.com/1022919" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<description>
This update for libevent fixes the following security issues:

- CVE-2016-10195: DNS remote stack overread vulnerability (bsc#1022917) 
- CVE-2016-10196: stack/buffer overflow in evutil_parse_sockaddr_port() (bsc#1022918) 
- CVE-2016-10197: out-of-bounds read in search_make_new() (bsc#1022919) 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-24"/>
	<updated date="2018-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550441" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80137" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2099-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182099-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536513" comment="kgraft-patch-4_4_74-92_29-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80138" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004353.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536514" comment="kgraft-patch-4_4_74-92_38-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80139" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090338" ref_url="https://bugzilla.suse.com/1090338" source="BUGZILLA"/>
		<reference ref_id="1096740" ref_url="https://bugzilla.suse.com/1096740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004333.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_35 fixes several issues.

The following security issue was fixed:

- CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially have allowed a local process to infer data from another process via a speculative execution side channel (bsc#1090338, bsc#1096740).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-07-27"/>
	<updated date="2018-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536515" comment="kgraft-patch-4_4_74-92_35-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80140" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077001" ref_url="https://bugzilla.suse.com/1077001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<description>
This update for curl fixes one issues.

This security issue was fixed:

- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550442" comment="curl-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550443" comment="libcurl4-7.37.0-37.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550444" comment="libcurl4-32bit-7.37.0-37.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80141" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1059809" ref_url="https://bugzilla.suse.com/1059809" source="BUGZILLA"/>
		<reference ref_id="1059811" ref_url="https://bugzilla.suse.com/1059811" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2017-14633: out-of-bounds array read vulnerability exists in
  function mapping0_forward() could lead to remote denial of service (bsc#1059811)
- CVE-2017-14632: Remote Code Execution upon freeing uninitialized
  memory in function vorbis_analysis_headerout(bsc#1059809)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533069" comment="libvorbis-doc-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550445" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550446" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550447" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550448" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550449" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550450" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80142" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1020950" ref_url="https://bugzilla.suse.com/1020950" source="BUGZILLA"/>
		<reference ref_id="1024749" ref_url="https://bugzilla.suse.com/1024749" source="BUGZILLA"/>
		<reference ref_id="1050469" ref_url="https://bugzilla.suse.com/1050469" source="BUGZILLA"/>
		<reference ref_id="1066892" ref_url="https://bugzilla.suse.com/1066892" source="BUGZILLA"/>
		<reference ref_id="1069925" ref_url="https://bugzilla.suse.com/1069925" source="BUGZILLA"/>
		<reference ref_id="1073654" ref_url="https://bugzilla.suse.com/1073654" source="BUGZILLA"/>
		<reference ref_id="1075419" ref_url="https://bugzilla.suse.com/1075419" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<description>


This update for webkit2gtk3 fixes the following issues:

Update to version 2.18.5:

  + Disable SharedArrayBuffers from Web API.
  + Reduce the precision of 'high' resolution time to 1ms.
  + bsc#1075419 - Security fixes: includes improvements to mitigate
    the effects of Spectre and Meltdown (CVE-2017-5753 and CVE-2017-5715).

Update to version 2.18.4:

  + Make WebDriver implementation more spec compliant.
  + Fix a bug when trying to remove cookies before a web process is
    spawned.
  + WebKitWebDriver process no longer links to
    libjavascriptcoregtk.
  + Fix several memory leaks in GStreamer media backend.
  + bsc#1073654 - Security fixes: CVE-2017-13866, CVE-2017-13870,
    CVE-2017-7156, CVE-2017-13856.

Update to version 2.18.3:

  + Improve calculation of font metrics to prevent scrollbars from
    being shown unnecessarily in some cases.
  + Fix handling of null capabilities in WebDriver implementation.
  + Security fixes: CVE-2017-13798, CVE-2017-13788, CVE-2017-13803.

Update to version 2.18.2:

  + Fix rendering of arabic text.
  + Fix a crash in the web process when decoding GIF images.
  + Fix rendering of wind in Windy.com.
  + Fix several crashes and rendering issues.

Update to version 2.18.1:

  + Improve performance of GIF animations.
  + Fix garbled display in GMail.
  + Fix rendering of several material design icons when using the
    web font.
  + Fix flickering when resizing the window in Wayland.
  + Prevent default kerberos authentication credentials from being
    used in ephemeral sessions.
  + Fix a crash when webkit_web_resource_get_data() is cancelled.
  + Correctly handle touchmove and touchend events in
    WebKitWebView.
  + Fix the build with enchant 2.1.1.
  + Fix the build in HPPA and Alpha.
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,
    CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093,
    CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098,
    CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104,
    CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117,
    CVE-2017-7120, CVE-2017-7142.

- Enable gold linker on s390/s390x on SLE15/Tumbleweed.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-25"/>
	<updated date="2018-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80143" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1069257" ref_url="https://bugzilla.suse.com/1069257" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003635.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2017-16899: Fix array index error in the fig2dev program (bsc#1069257).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-26"/>
	<updated date="2018-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550456" comment="transfig-3.2.5e-2.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80144" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1054849" ref_url="https://bugzilla.suse.com/1054849" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004409.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

The following other bugs were fixed:

- Fix libnss_wins.so.2 link libreplace with rpath (bsc#1054849)		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054849">SUSE bug 1054849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550457" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550458" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550459" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550460" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550461" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550462" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550463" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550464" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550465" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550466" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550467" comment="libndr0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550468" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550469" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550470" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550471" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550472" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550473" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550474" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550475" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550476" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550477" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550478" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550479" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550480" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550481" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550482" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550483" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550484" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550485" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550486" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550487" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550488" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550489" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550490" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550491" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550492" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550493" comment="samba-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550494" comment="samba-client-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550495" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550496" comment="samba-libs-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550497" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550498" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550499" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80145" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80146" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-14"/>
	<updated date="2018-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545663" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80147" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80148" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-1050: Fixed denial of service vulnerability when SPOOLSS is run externally (bsc#1081741). 
- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-15"/>
	<updated date="2018-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550500" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80149" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1083635" ref_url="https://bugzilla.suse.com/1083635" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1094248" ref_url="https://bugzilla.suse.com/1094248" source="BUGZILLA"/>
		<reference ref_id="1096130" ref_url="https://bugzilla.suse.com/1096130" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097140" ref_url="https://bugzilla.suse.com/1097140" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098435" ref_url="https://bugzilla.suse.com/1098435" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1100491" ref_url="https://bugzilla.suse.com/1100491" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).

The following non-security bugs were fixed:

- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc-&gt;writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083635">SUSE bug 1083635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094248">SUSE bug 1094248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096130">SUSE bug 1096130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097140">SUSE bug 1097140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098435">SUSE bug 1098435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80150" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536543" comment="kgraft-patch-4_4_120-92_70-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80151" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536544" comment="kgraft-patch-4_4_121-92_73-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80152" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536545" comment="kgraft-patch-4_4_121-92_80-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80153" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536546" comment="kgraft-patch-4_4_121-92_85-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80154" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536547" comment="kgraft-patch-4_4_90-92_50-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80155" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536548" comment="kgraft-patch-4_4_90-92_45-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80156" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096564" ref_url="https://bugzilla.suse.com/1096564" source="BUGZILLA"/>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) 
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096564">SUSE bug 1096564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536549" comment="kgraft-patch-4_4_74-92_38-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80157" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536550" comment="kgraft-patch-4_4_114-92_67-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80158" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-16"/>
	<updated date="2018-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536551" comment="kgraft-patch-4_4_114-92_64-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80159" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80160" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536552" comment="kgraft-patch-4_4_103-92_56-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80161" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="1099306" ref_url="https://bugzilla.suse.com/1099306" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-17"/>
	<updated date="2018-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536553" comment="kgraft-patch-4_4_103-92_53-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80162" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040662" ref_url="https://bugzilla.suse.com/1040662" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052448" ref_url="https://bugzilla.suse.com/1052448" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1052466" ref_url="https://bugzilla.suse.com/1052466" source="BUGZILLA"/>
		<reference ref_id="1077732" ref_url="https://bugzilla.suse.com/1077732" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to security release 0.99.3 (bsc#1077732)
  * CVE-2017-12376 (ClamAV Buffer Overflow in handle_pdfname Vulnerability)
  * CVE-2017-12377 (ClamAV Mew Packet Heap Overflow Vulnerability)
  * CVE-2017-12379 (ClamAV Buffer Overflow in messageAddArgument Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition
      or potentially execute arbitrary code on an affected device.
  * CVE-2017-12374 (ClamAV use-after-free Vulnerabilities)
  * CVE-2017-12375 (ClamAV Buffer Overflow Vulnerability)
  * CVE-2017-12378 (ClamAV Buffer Over Read Vulnerability)
  * CVE-2017-12380 (ClamAV Null Dereference Vulnerability)
    - these vulnerabilities could have allowed an unauthenticated,
      remote attacker to cause a denial of service (DoS) condition on an affected device.
  * CVE-2017-6420 (bsc#1052448)
    - this vulnerability could have allowed remote attackers to cause a denial of service
      (use-after-free) via a crafted PE file with WWPack compression.
  * CVE-2017-6419 (bsc#1052449)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (heap-based buffer overflow and application crash) or possibly
      have unspecified other impact via a crafted CHM file.
  * CVE-2017-11423 (bsc#1049423)
    - ClamAV could have allowed remote attackers to cause a denial of service
      (stack-based buffer over-read and application crash) via a crafted CAB file.
  * CVE-2017-6418 (bsc#1052466)
    - ClamAV could have allowed remote attackers to cause a denial
      of service (out-of-bounds read) via a crafted e-mail message.
- update upstream keys in the keyring

- provide and obsolete clamav-nodb to trigger it's removal in Leap
  bsc#1040662
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-27"/>
	<updated date="2018-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80163" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004500.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-08-27"/>
	<updated date="2018-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550507" comment="openssh-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550508" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550509" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550510" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80164" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1076391" ref_url="https://bugzilla.suse.com/1076391" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003656.html" source="SUSE-SU"/>
		<description>
This update for gd fixes one issues.

This security issue was fixed:

- CVE-2018-5711: Prevent integer signedness error that could have lead to an
  infinite loop via a crafted GIF file allowing for DoS (bsc#1076391)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550511" comment="gd-2.1.0-24.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80165" version="1" class="patch">
	<metadata>
		<title>Recommended update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042037" ref_url="https://bugzilla.suse.com/1042037" source="BUGZILLA"/>
		<reference ref_id="1045160" ref_url="https://bugzilla.suse.com/1045160" source="BUGZILLA"/>
		<reference ref_id="1048575" ref_url="https://bugzilla.suse.com/1048575" source="BUGZILLA"/>
		<reference ref_id="1057406" ref_url="https://bugzilla.suse.com/1057406" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7659" ref_url="https://www.suse.com/security/cve/CVE-2017-7659/" source="CVE"/>
		<reference ref_id="CVE-2017-9789" ref_url="https://www.suse.com/security/cve/CVE-2017-9789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003657.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes several issues.

These security issues were fixed:

- CVE-2017-9789: When under stress (closing many connections) the HTTP/2
  handling code would sometimes access memory after it has been freed, resulting
  in potentially erratic behaviour (bsc#1048575).
- CVE-2017-7659: A maliciously constructed HTTP/2 request could cause mod_http2
  to dereference a NULL pointer and crash the server process (bsc#1045160).

These non-security issues were fixed:

- Use the full path to a2enmod and a2dismod in the apache-22-24-upgrade script (bsc#1042037)
- Fall back to 'localhost' as hostname in gensslcert (bsc#1057406)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-29"/>
	<updated date="2018-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042037">SUSE bug 1042037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045160">SUSE bug 1045160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048575">SUSE bug 1048575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057406">SUSE bug 1057406</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7659/">CVE-2017-7659</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9789/">CVE-2017-9789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550512" comment="apache2-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533082" comment="apache2-doc-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550513" comment="apache2-example-pages-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550514" comment="apache2-prefork-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550515" comment="apache2-utils-2.4.23-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550516" comment="apache2-worker-2.4.23-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80166" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1091427" ref_url="https://bugzilla.suse.com/1091427" source="BUGZILLA"/>
		<reference ref_id="1094325" ref_url="https://bugzilla.suse.com/1094325" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1100112" ref_url="https://bugzilla.suse.com/1100112" source="BUGZILLA"/>
		<reference ref_id="959329" ref_url="https://bugzilla.suse.com/959329" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

This new feature was added:

- bsc#1094325, bsc#1094725: libxl: Enable virsh blockresize for XEN guests

This security issue was fixed:

- CVE-2017-5715: Additional fixes for the Spectre patches (bsc#1079869)

These non-security issues were fixed:

- bsc#1100112: schema: allow any strings in smbios entry qemu: escape smbios entry strings 
- bsc#1091427: libxl: fix segfault in libxlReconnectDomain 
- bsc#959329: libxl: don't set hasManagedSave when performing save 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091427">SUSE bug 1091427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094325">SUSE bug 1094325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100112">SUSE bug 1100112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959329">SUSE bug 959329</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550517" comment="libvirt-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550518" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550519" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550520" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550521" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550522" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550523" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550524" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550525" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550526" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550527" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550528" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550529" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550530" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550531" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550532" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550533" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550534" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550535" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80167" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1082828" ref_url="https://bugzilla.suse.com/1082828" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004536.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issue fixed:

- CVE-2017-15130: Fixed a potential denial of service via TLS SNI config
  lookups, which would slow the process down and could have led to exhaustive
  memory allocation and/or process restarts (bsc#1082828)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-06"/>
	<updated date="2018-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545750" comment="dovecot22-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545751" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545752" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545753" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80168" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-07"/>
	<updated date="2018-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80169" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097108" ref_url="https://bugzilla.suse.com/1097108" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004550.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes one issue.

The following security issue was fixed:

- CVE-2018-10853: A KVM guest userspace to guest kernel write was fixed, which could be used by guest users to crash the guest kernel (bsc#1097108).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-11"/>
	<updated date="2018-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536577" comment="kgraft-patch-4_4_121-92_92-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80170" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1079334" ref_url="https://bugzilla.suse.com/1079334" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper provides the following fixes:

Update libzypp to version 16.17.20

Security issues fixed:

- PackageProvider: Validate delta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45

Security issue fixed:
- Improve signature check callback messages
  (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- do not recommend cron (bsc#1079334)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-14"/>
	<updated date="2018-09-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079334">SUSE bug 1079334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550536" comment="libzypp-16.17.20-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550537" comment="zypper-1.13.45-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80171" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-21"/>
	<updated date="2018-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545781" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545782" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545783" comment="openslp-server-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80172" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1104826" ref_url="https://bugzilla.suse.com/1104826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550538" comment="apache2-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550539" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550540" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550541" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550542" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80173" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
- 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
- HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
- HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545806" comment="gnutls-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545807" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545808" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80174" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:

- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1104668)
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1104668)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1104668)
- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE. Successful attacks require human
  interaction from a person other than the attacker. Successful attacks of this
  vulnerability can result in takeover of Java SE. (bsc#1104668)
- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that
  allowed remote attackers to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a malformed DSA private key
  (bsc#1104668)
- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)
- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)
- CVE-2018-12539: Users other than the process owner might have been able to
  use Java Attach API to connect to an IBM JVM on the same machine and use Attach
  API operations, which includes the ability to execute untrusted native code
  (bsc#1104668)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-24"/>
	<updated date="2018-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80175" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536585" comment="kgraft-patch-4_4_121-92_92-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80176" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536586" comment="kgraft-patch-4_4_120-92_70-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80177" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536587" comment="kgraft-patch-4_4_121-92_73-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80178" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536588" comment="kgraft-patch-4_4_121-92_80-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80179" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1103203" ref_url="https://bugzilla.suse.com/1103203" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536589" comment="kgraft-patch-4_4_121-92_85-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80180" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536590" comment="kgraft-patch-4_4_90-92_50-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80181" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536591" comment="kgraft-patch-4_4_90-92_45-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80182" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536592" comment="kgraft-patch-4_4_103-92_56-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80183" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536593" comment="kgraft-patch-4_4_103-92_53-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80184" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536594" comment="kgraft-patch-4_4_74-92_38-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80185" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536595" comment="kgraft-patch-4_4_114-92_67-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80186" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096723" ref_url="https://bugzilla.suse.com/1096723" source="BUGZILLA"/>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1105323" ref_url="https://bugzilla.suse.com/1105323" source="BUGZILLA"/>
		<reference ref_id="1106191" ref_url="https://bugzilla.suse.com/1106191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issues were fixed:

- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-25"/>
	<updated date="2018-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536596" comment="kgraft-patch-4_4_114-92_64-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80187" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80188" version="1" class="patch">
	<metadata>
		<title>Security update for smt, yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1006984" ref_url="https://bugzilla.suse.com/1006984" source="BUGZILLA"/>
		<reference ref_id="1006989" ref_url="https://bugzilla.suse.com/1006989" source="BUGZILLA"/>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="1097824" ref_url="https://bugzilla.suse.com/1097824" source="BUGZILLA"/>
		<reference ref_id="1103809" ref_url="https://bugzilla.suse.com/1103809" source="BUGZILLA"/>
		<reference ref_id="1103810" ref_url="https://bugzilla.suse.com/1103810" source="BUGZILLA"/>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470/" source="CVE"/>
		<reference ref_id="CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471/" source="CVE"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004613.html" source="SUSE-SU"/>
		<description>
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006984">SUSE bug 1006984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006989">SUSE bug 1006989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097824">SUSE bug 1097824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548301" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548302" comment="smt-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548303" comment="smt-support-3.0.37-52.23.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80189" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004615.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues in yast2-smt:

- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Added missing translation marks (bsc#1037811)
- Remove cron job rescheduling (bsc#1097560)

This update is a requirement for the security update for SMT. Because of that it is
tagged as security to ensure that all users, even those that only install security updates,
install it.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-27"/>
	<updated date="2018-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530266" comment="yast2-smt-3.0.14-17.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80190" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-09-28"/>
	<updated date="2018-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550543" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550544" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550545" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550546" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550547" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550548" comment="openssl-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80191" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056126" ref_url="https://bugzilla.suse.com/1056126" source="BUGZILLA"/>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes several issues.

These security issues were fixed:

- CVE-2017-13734: Prevent illegal address access in the _nc_safe_strcat
  function in strings.c that might have lead to a remote denial of service attack
  (bsc#1056126).
- CVE-2017-13733: Prevent illegal address access in the fmt_entry function in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056127).
- CVE-2017-13732: Prevent illegal address access in the function dump_uses() in
  progs/dump_entry.c that might have lead to a remote denial of service attack
  (bsc#1056128).
- CVE-2017-13731: Prevent illegal address access in the function
  postprocess_termcap() in parse_entry.c that might have lead to a remote denial
  of service attack (bsc#1056129).
- CVE-2017-13730: Prevent illegal address access in the function
  _nc_read_entry_source() in progs/tic.c that might have lead to a remote denial
  of service attack (bsc#1056131).
- CVE-2017-13729: Prevent illegal address access in the _nc_save_str function
  in alloc_entry.c that might have lead to a remote denial of service attack
  (bsc#1056132).
- CVE-2017-13728: Prevent infinite loop in the next_char function in
  comp_scan.c that might have lead to a remote denial of service attack
  (bsc#1056136).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80192" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550558" comment="qemu-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550559" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550560" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550561" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550563" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536606" comment="qemu-ppc-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550565" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80193" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-02"/>
	<updated date="2018-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80194" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1048510" ref_url="https://bugzilla.suse.com/1048510" source="BUGZILLA"/>
		<reference ref_id="1065276" ref_url="https://bugzilla.suse.com/1065276" source="BUGZILLA"/>
		<reference ref_id="1066156" ref_url="https://bugzilla.suse.com/1066156" source="BUGZILLA"/>
		<reference ref_id="1068251" ref_url="https://bugzilla.suse.com/1068251" source="BUGZILLA"/>
		<reference ref_id="1070428" ref_url="https://bugzilla.suse.com/1070428" source="BUGZILLA"/>
		<reference ref_id="1071558" ref_url="https://bugzilla.suse.com/1071558" source="BUGZILLA"/>
		<reference ref_id="1074254" ref_url="https://bugzilla.suse.com/1074254" source="BUGZILLA"/>
		<reference ref_id="1075724" ref_url="https://bugzilla.suse.com/1075724" source="BUGZILLA"/>
		<reference ref_id="1076308" ref_url="https://bugzilla.suse.com/1076308" source="BUGZILLA"/>
		<reference ref_id="897422" ref_url="https://bugzilla.suse.com/897422" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes several issues.

This security issue was fixed:

- CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).

These non-security issues were fixed:

- core: don't choke if a unit another unit triggers vanishes during reload
- delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX
- delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428)
- delta: check if a prefix needs to be skipped only once
- delta: skip symlink paths when split-usr is enabled (#4591)
- sysctl: use raw file descriptor in sysctl_write (#7753)
- sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254)
- Fix the regexp used to detect broken by-id symlinks in /etc/crypttab
  It was missing the following case: '/dev/disk/by-id/cr_-xxx'.
- sysctl: disable buffer while writing to /proc (bsc#1071558)
- Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558)
- sysctl: no need to check for eof twice
- def: add new constant LONG_LINE_MAX
- fileio: add new helper call read_line() as bounded getline() replacement
- service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156)
- gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280)
- gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422)
- fstab-util: introduce fstab_has_fstype() helper
- fstab-generator: ignore root=/dev/nfs (#3591)
- fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452)
- virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510)
- analyze: replace --no-man with --man=no in the man page (bsc#1068251)
- udev: net_setup_link: don't error out when we couldn't apply link config (#7328)
- Add missing /etc/systemd/network directory
- Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510)
- sd-bus: use -- when passing arguments to ssh (#6706)
- systemctl: make sure we terminate the bus connection first, and then close the pager (#3550)
- sd-bus: bump message queue size (bsc#1075724)
- tmpfiles: downgrade warning about duplicate line
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1048510">SUSE bug 1048510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066156">SUSE bug 1066156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068251">SUSE bug 1068251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070428">SUSE bug 1070428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071558">SUSE bug 1071558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074254">SUSE bug 1074254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075724">SUSE bug 1075724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897422">SUSE bug 897422</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550566" comment="libsystemd0-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550567" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550568" comment="libudev1-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550569" comment="libudev1-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550570" comment="systemd-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550571" comment="systemd-32bit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550572" comment="systemd-sysvinit-228-150.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550573" comment="udev-228-150.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80195" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-04"/>
	<updated date="2018-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545818" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545819" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545820" comment="openslp-server-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80196" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548314" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548315" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548316" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548317" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80197" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80198" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004655.html" source="SUSE-SU"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-08"/>
	<updated date="2018-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545827" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545828" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545829" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530291" comment="postgresql-init-10-17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545830" comment="postgresql10-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545831" comment="postgresql10-contrib-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530293" comment="postgresql10-docs-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545832" comment="postgresql10-server-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80199" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1088810" ref_url="https://bugzilla.suse.com/1088810" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1094466" ref_url="https://bugzilla.suse.com/1094466" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="1108239" ref_url="https://bugzilla.suse.com/1108239" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14678" ref_url="https://www.suse.com/security/cve/CVE-2018-14678/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw (bnc#1106016).
- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allowed local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bnc#1092903).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).
- CVE-2018-13093: There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation (bnc#1100001).
- CVE-2018-13094: An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-13095: A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork (bnc#1099999).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-14678: The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S did not properly maintain RBX, which allowed local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges (bnc#1102715).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bnc#1107689).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following security bugs were fixed:
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).

The following non-security bugs were fixed:

- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- kABI: protect struct x86_emulate_ops (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kvm: MMU: always terminate page walks at level 1 (bsc#1062604).
- kvm: MMU: simplify last_pte_bitmap (bsc#1062604).
- kvm: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- kvm: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- kvm: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108239).
- net: ena: fix device destruction to gracefully free resources (bsc#1108239).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108239).
- net: ena: fix incorrect usage of memory barriers (bsc#1108239).
- net: ena: fix missing calls to READ_ONCE (bsc#1108239).
- net: ena: fix missing lock during device destruction (bsc#1108239).
- net: ena: fix potential double ena_destroy_device() (bsc#1108239).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108239).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1108239).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382 bsc#1100152).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- provide special timeout module parameters for EC2 (bsc#1065364).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86: Drop kernel trampoline stack. It is involved in breaking kdump/kexec infrastucture. (bsc#1099597)
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key &amp; ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-09"/>
	<updated date="2018-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088810">SUSE bug 1088810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094466">SUSE bug 1094466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108239">SUSE bug 1108239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14678/">CVE-2018-14678</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80200" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040039" ref_url="https://bugzilla.suse.com/1040039" source="BUGZILLA"/>
		<reference ref_id="1047184" ref_url="https://bugzilla.suse.com/1047184" source="BUGZILLA"/>
		<reference ref_id="1076118" ref_url="https://bugzilla.suse.com/1076118" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00102.html" source="SUSE-SU"/>
		<description>
This update for bind fixes several issues.

This security issue was fixed:

- CVE-2017-3145: Improper sequencing during cleanup could have lead to a
  use-after-free error that triggered an assertion failure and crash in named
  (bsc#1076118).

These non-security issues were fixed:

- Updated named.root file (bsc#1040039)
- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-30"/>
	<updated date="2018-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040039">SUSE bug 1040039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047184">SUSE bug 1047184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550579" comment="bind-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550580" comment="bind-chrootenv-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533101" comment="bind-doc-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550581" comment="bind-libs-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548322" comment="bind-libs-32bit-9.9.9P1-63.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550582" comment="bind-utils-9.9.9P1-63.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80201" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004681.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536621" comment="kgraft-patch-4_4_121-92_92-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80202" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536622" comment="kgraft-patch-4_4_121-92_73-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80203" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536623" comment="kgraft-patch-4_4_120-92_70-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80204" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536624" comment="kgraft-patch-4_4_121-92_80-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80205" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536625" comment="kgraft-patch-4_4_121-92_85-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80206" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536626" comment="kgraft-patch-4_4_90-92_45-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80207" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536627" comment="kgraft-patch-4_4_90-92_50-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80208" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536628" comment="kgraft-patch-4_4_103-92_56-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80209" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536629" comment="kgraft-patch-4_4_103-92_53-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80210" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536630" comment="kgraft-patch-4_4_114-92_67-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80211" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536631" comment="kgraft-patch-4_4_114-92_64-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80212" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040543" ref_url="https://bugzilla.suse.com/1040543" source="BUGZILLA"/>
		<reference ref_id="1041447" ref_url="https://bugzilla.suse.com/1041447" source="BUGZILLA"/>
		<reference ref_id="1041470" ref_url="https://bugzilla.suse.com/1041470" source="BUGZILLA"/>
		<reference ref_id="1061310" ref_url="https://bugzilla.suse.com/1061310" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14970" ref_url="https://www.suse.com/security/cve/CVE-2017-14970/" source="CVE"/>
		<reference ref_id="CVE-2017-9214" ref_url="https://www.suse.com/security/cve/CVE-2017-9214/" source="CVE"/>
		<reference ref_id="CVE-2017-9263" ref_url="https://www.suse.com/security/cve/CVE-2017-9263/" source="CVE"/>
		<reference ref_id="CVE-2017-9265" ref_url="https://www.suse.com/security/cve/CVE-2017-9265/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003692.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

* CVE-2017-9263: While parsing an OpenFlow role status message, there is a call to the abort() functio  for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch. (bsc#1041470)
* CVE-2017-9265: Buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.(bsc#1041447)
* CVE-2017-9214: While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. (bsc#1040543)
* CVE-2017-14970: In lib/ofp-util.c, there are multiple memory leaks while parsing malformed OpenFlow group mod messages.(bsc#1061310)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-31"/>
	<updated date="2018-01-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040543">SUSE bug 1040543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041447">SUSE bug 1041447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041470">SUSE bug 1041470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061310">SUSE bug 1061310</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14970/">CVE-2017-14970</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9214/">CVE-2017-9214</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9263/">CVE-2017-9263</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9265/">CVE-2017-9265</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550583" comment="openvswitch-2.5.1-25.12.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550584" comment="openvswitch-dpdk-2.5.1-25.12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550585" comment="openvswitch-dpdk-switch-2.5.1-25.12.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550586" comment="openvswitch-switch-2.5.1-25.12.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80213" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-17"/>
	<updated date="2018-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80214" version="1" class="patch">
	<metadata>
		<title>Security update for libXfont (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049692" ref_url="https://bugzilla.suse.com/1049692" source="BUGZILLA"/>
		<reference ref_id="1050459" ref_url="https://bugzilla.suse.com/1050459" source="BUGZILLA"/>
		<reference ref_id="1054285" ref_url="https://bugzilla.suse.com/1054285" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<description>
This update for libXfont fixes several issues.

These security issues were fixed:

- CVE-2017-13720: Improper check for end of string in PatterMatch caused invalid reads (bsc#1054285)
- CVE-2017-13722: Malformed PCF file could have caused DoS or leak information (bsc#1049692)
- Prevent the X server from accessing arbitrary files as root. It is not possible to leak information, but special files can be touched allowing for causing side effects (bsc#1050459)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550587" comment="libXfont1-1.5.1-11.3.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80215" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="989121" ref_url="https://bugzilla.suse.com/989121" source="BUGZILLA"/>
		<reference ref_id="989122" ref_url="https://bugzilla.suse.com/989122" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946/" source="CVE"/>
		<reference ref_id="CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<description>
This update for ecryptfs-utils fixes the following issues:

- CVE-2015-8946: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning (bsc#989121)
- CVE-2016-6224: ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning on a NVMe or MMC drive (bsc#989122)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-01"/>
	<updated date="2018-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550588" comment="ecryptfs-utils-103-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550589" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80216" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) could have locked up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)

Non security issues fixed:

- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80217" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548351" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548352" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80218" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="1104202" ref_url="https://bugzilla.suse.com/1104202" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 to 9.6.10 fixes the following issues:

These security issues were fixed:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199)
- CVE-2018-10925: Add missing authorization check on certain statements
  involved with 'INSERT ... ON CONFLICT DO UPDATE'. An attacker with 'CREATE
  TABLE' privileges could have exploited this to read arbitrary bytes server
  memory. If the attacker also had certain 'INSERT' and limited 'UPDATE'
  privileges to a particular table, they could have exploited this to update
  other columns in the same table (bsc#1104202)

For addition details please see
https://www.postgresql.org/docs/current/static/release-9-6-10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-24"/>
	<updated date="2018-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545885" comment="postgresql96-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545886" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545887" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80219" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1043353" ref_url="https://bugzilla.suse.com/1043353" source="BUGZILLA"/>
		<reference ref_id="1043354" ref_url="https://bugzilla.suse.com/1043354" source="BUGZILLA"/>
		<reference ref_id="1047908" ref_url="https://bugzilla.suse.com/1047908" source="BUGZILLA"/>
		<reference ref_id="1050037" ref_url="https://bugzilla.suse.com/1050037" source="BUGZILLA"/>
		<reference ref_id="1050072" ref_url="https://bugzilla.suse.com/1050072" source="BUGZILLA"/>
		<reference ref_id="1050098" ref_url="https://bugzilla.suse.com/1050098" source="BUGZILLA"/>
		<reference ref_id="1050100" ref_url="https://bugzilla.suse.com/1050100" source="BUGZILLA"/>
		<reference ref_id="1050635" ref_url="https://bugzilla.suse.com/1050635" source="BUGZILLA"/>
		<reference ref_id="1051442" ref_url="https://bugzilla.suse.com/1051442" source="BUGZILLA"/>
		<reference ref_id="1052470" ref_url="https://bugzilla.suse.com/1052470" source="BUGZILLA"/>
		<reference ref_id="1052708" ref_url="https://bugzilla.suse.com/1052708" source="BUGZILLA"/>
		<reference ref_id="1052717" ref_url="https://bugzilla.suse.com/1052717" source="BUGZILLA"/>
		<reference ref_id="1052721" ref_url="https://bugzilla.suse.com/1052721" source="BUGZILLA"/>
		<reference ref_id="1052768" ref_url="https://bugzilla.suse.com/1052768" source="BUGZILLA"/>
		<reference ref_id="1052777" ref_url="https://bugzilla.suse.com/1052777" source="BUGZILLA"/>
		<reference ref_id="1052781" ref_url="https://bugzilla.suse.com/1052781" source="BUGZILLA"/>
		<reference ref_id="1054600" ref_url="https://bugzilla.suse.com/1054600" source="BUGZILLA"/>
		<reference ref_id="1055068" ref_url="https://bugzilla.suse.com/1055068" source="BUGZILLA"/>
		<reference ref_id="1055374" ref_url="https://bugzilla.suse.com/1055374" source="BUGZILLA"/>
		<reference ref_id="1055455" ref_url="https://bugzilla.suse.com/1055455" source="BUGZILLA"/>
		<reference ref_id="1055456" ref_url="https://bugzilla.suse.com/1055456" source="BUGZILLA"/>
		<reference ref_id="1057000" ref_url="https://bugzilla.suse.com/1057000" source="BUGZILLA"/>
		<reference ref_id="1060162" ref_url="https://bugzilla.suse.com/1060162" source="BUGZILLA"/>
		<reference ref_id="1062752" ref_url="https://bugzilla.suse.com/1062752" source="BUGZILLA"/>
		<reference ref_id="1072362" ref_url="https://bugzilla.suse.com/1072362" source="BUGZILLA"/>
		<reference ref_id="1072901" ref_url="https://bugzilla.suse.com/1072901" source="BUGZILLA"/>
		<reference ref_id="1074120" ref_url="https://bugzilla.suse.com/1074120" source="BUGZILLA"/>
		<reference ref_id="1074125" ref_url="https://bugzilla.suse.com/1074125" source="BUGZILLA"/>
		<reference ref_id="1074185" ref_url="https://bugzilla.suse.com/1074185" source="BUGZILLA"/>
		<reference ref_id="1074309" ref_url="https://bugzilla.suse.com/1074309" source="BUGZILLA"/>
		<reference ref_id="1075939" ref_url="https://bugzilla.suse.com/1075939" source="BUGZILLA"/>
		<reference ref_id="1076021" ref_url="https://bugzilla.suse.com/1076021" source="BUGZILLA"/>
		<reference ref_id="1076051" ref_url="https://bugzilla.suse.com/1076051" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995/" source="CVE"/>
		<reference ref_id="CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505/" source="CVE"/>
		<reference ref_id="CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525/" source="CVE"/>
		<reference ref_id="CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526/" source="CVE"/>
		<reference ref_id="CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539/" source="CVE"/>
		<reference ref_id="CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639/" source="CVE"/>
		<reference ref_id="CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750/" source="CVE"/>
		<reference ref_id="CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565/" source="CVE"/>
		<reference ref_id="CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640/" source="CVE"/>
		<reference ref_id="CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641/" source="CVE"/>
		<reference ref_id="CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643/" source="CVE"/>
		<reference ref_id="CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671/" source="CVE"/>
		<reference ref_id="CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673/" source="CVE"/>
		<reference ref_id="CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676/" source="CVE"/>
		<reference ref_id="CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935/" source="CVE"/>
		<reference ref_id="CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059/" source="CVE"/>
		<reference ref_id="CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141/" source="CVE"/>
		<reference ref_id="CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142/" source="CVE"/>
		<reference ref_id="CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147/" source="CVE"/>
		<reference ref_id="CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103/" source="CVE"/>
		<reference ref_id="CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649/" source="CVE"/>
		<reference ref_id="CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218/" source="CVE"/>
		<reference ref_id="CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504/" source="CVE"/>
		<reference ref_id="CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681/" source="CVE"/>
		<reference ref_id="CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879/" source="CVE"/>
		<reference ref_id="CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884/" source="CVE"/>
		<reference ref_id="CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914/" source="CVE"/>
		<reference ref_id="CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008/" source="CVE"/>
		<reference ref_id="CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027/" source="CVE"/>
		<reference ref_id="CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029/" source="CVE"/>
		<reference ref_id="CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261/" source="CVE"/>
		<reference ref_id="CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-18027: Prevent memory leak vulnerability in the function
  ReadMATImage which allowed remote attackers to cause a denial of service via a
  crafted file (bsc#1076051)
- CVE-2017-18029: Prevent memory leak in the function ReadMATImage which
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1076021)
- CVE-2017-17681: Prevent infinite loop in the function ReadPSDChannelZip in
  coders/psd.c, which allowed attackers to cause a denial of service (CPU
  exhaustion) via a crafted psd image file (bsc#1072901).
- CVE-2017-18008: Prevent memory Leak in ReadPWPImage which allowed attackers
  to cause a denial of service via a PWP file (bsc#1074309).
- CVE-2018-5685: Prevent infinite loop and application hang in the ReadBMPImage
  function. Remote attackers could leverage this vulnerability to cause a denial
  of service via an image file with a crafted bit-field mask value (bsc#1075939)
- CVE-2017-11639: Prevent heap-based buffer over-read in the WriteCIPImage()
  function, related to the GetPixelLuma function in MagickCore/pixel-accessor.h
  (bsc#1050635)
- CVE-2017-11525: Prevent memory consumption in the ReadCINImage function that
  allowed remote attackers to cause a denial of service (bsc#1050098)
- CVE-2017-9262: The ReadJNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043353).
- CVE-2017-9261: The ReadMNGImage function in coders/png.c allowed attackers to
  cause a denial of service (memory leak) via a crafted file (bsc#1043354).
- CVE-2017-10995: The mng_get_long function in coders/png.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) via a crafted MNG image (bsc#1047908).
- CVE-2017-11539: Prevent memory leak in the ReadOnePNGImage() function in
  coders/png.c (bsc#1050037).
- CVE-2017-11505: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050072).
- CVE-2017-11526: The ReadOneMNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (large loop and CPU consumption) via a
  crafted file (bsc#1050100).
- CVE-2017-11750: The ReadOneJNGImage function in coders/png.c allowed remote
  attackers to cause a denial of service (NULL pointer dereference) via a crafted
  file (bsc#1051442).
- CVE-2017-12565: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052470).
- CVE-2017-12676: Prevent memory leak in the function ReadOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052708).
- CVE-2017-12673: Prevent memory leak in the function ReadOneMNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (bsc#1052717).
- CVE-2017-12671: Added NULL assignment in coders/png.c to prevent an invalid
  free in the function RelinquishMagickMemory in MagickCore/memory.c, which
  allowed attackers to cause a denial of service (bsc#1052721).
- CVE-2017-12643: Prevent a memory exhaustion vulnerability in ReadOneJNGImage
  in coders\png.c (bsc#1052768).
- CVE-2017-12641: Prevent a memory leak vulnerability in ReadOneJNGImage in
  coders\png.c (bsc#1052777).
- CVE-2017-12640: Prevent an out-of-bounds read vulnerability in
  ReadOneMNGImage in coders/png.c (bsc#1052781).
- CVE-2017-12935: The ReadMNGImage function in coders/png.c mishandled large
  MNG images, leading to an invalid memory read in the SetImageColorCallBack
  function in magick/image.c (bsc#1054600).
- CVE-2017-13059: Prevent memory leak in the function WriteOneJNGImage in
  coders/png.c, which allowed attackers to cause a denial of service
  (WriteJNGImage memory consumption) via a crafted file (bsc#1055068).
- CVE-2017-13147: Prevent allocation failure in the function ReadMNGImage in
  coders/png.c when a small MNG file has a MEND chunk with a large length value
  (bsc#1055374).
- CVE-2017-13142: Added additional checks for short files to prevent a crafted
  PNG file from triggering a crash (bsc#1055455).
- CVE-2017-13141: Prevent memory leak in ReadOnePNGImage in coders/png.c
  (bsc#1055456).
- CVE-2017-14103: The ReadJNGImage and ReadOneJNGImage functions in
  coders/png.c did not properly manage image pointers after certain error
  conditions, which allowed remote attackers to conduct use-after-free attacks
  via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call
  (bsc#1057000).
- CVE-2017-14649: ReadOneJNGImage in coders/png.c did not properly validate JNG
  data, leading to a denial of service (assertion failure in
  magick/pixel_cache.c, and application crash) (bsc#1060162).
- CVE-2017-15218: Prevent memory leak in ReadOneJNGImage in coders/png.c
  (bsc#1062752).
- CVE-2017-17504: Prevent heap-based buffer over-read via a crafted file in
  Magick_png_read_raw_profile, related to ReadOneMNGImage (bsc#1072362).
- CVE-2017-17884: Prevent memory leak in the function WriteOnePNGImage in
  coders/png.c, which allowed attackers to cause a denial of service via a
  crafted PNG image file (bsc#1074120).
- CVE-2017-17879: Prevent heap-based buffer over-read in ReadOneMNGImage in
  coders/png.c, related to length calculation and caused by an off-by-one error
  (bsc#1074125).
- CVE-2017-17914: Prevent crafted files to cause a large loop in
  ReadOneMNGImage (bsc#1074185).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055068">SUSE bug 1055068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80220" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545888" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80221" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548353" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548354" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548355" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548356" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548357" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80222" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1043978" ref_url="https://bugzilla.suse.com/1043978" source="BUGZILLA"/>
		<reference ref_id="1059911" ref_url="https://bugzilla.suse.com/1059911" source="BUGZILLA"/>
		<reference ref_id="1059912" ref_url="https://bugzilla.suse.com/1059912" source="BUGZILLA"/>
		<reference ref_id="1059913" ref_url="https://bugzilla.suse.com/1059913" source="BUGZILLA"/>
		<reference ref_id="1069874" ref_url="https://bugzilla.suse.com/1069874" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2017-16942: Divide-by-zero in the function wav_w64_read_fmt_chunk(), which may lead to Denial of service (bsc#1069874). 
- CVE-2017-6892:  Fixed an out-of-bounds read memory access in the aiff_read_chanmap() (bsc#1043978).
- CVE-2017-14634: In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. (bsc#1059911)
- CVE-2017-14245: An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values. (bsc#1059912)
- CVE-2017-14246: An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of 
                  the NAN and INFINITY floating-point values.(bsc#1059913)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-02"/>
	<updated date="2018-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043978">SUSE bug 1043978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80223" version="1" class="patch">
	<metadata>
		<title>Security update for smt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="1111056" ref_url="https://bugzilla.suse.com/1111056" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004795.html" source="SUSE-SU"/>
		<description>


SMT was updated to version 3.0.38.

Following security issue was fixed:

- CVE-2018-12472: Harden hostname check during sibling check by forcing double
  reverse lookup (bsc#1104076)

Following non security issues were fixed:

- Add migration path check when registration sharing is enabled
- Fix sibling sync errors (bsc#1111056):
  - Synchronize all registered products
  - Handle duplicate registrations when syncing
  - Force resync to the sibling instance in `upgrade` and
    `synchronize` API calls
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111056">SUSE bug 1111056</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548358" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548359" comment="smt-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548360" comment="smt-support-3.0.38-52.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80224" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536642" comment="kgraft-patch-4_4_121-92_95-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80225" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1109961" ref_url="https://bugzilla.suse.com/1109961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004815.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-11763: In Apache HTTP Server by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. (bsc#1109961)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550594" comment="apache2-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550595" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550596" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550597" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550598" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80226" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545890" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545891" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545892" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545893" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545894" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545895" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80227" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80228" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1062937" ref_url="https://bugzilla.suse.com/1062937" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

Feature update:

- Update from version 1.3.1 to version 1.5.2 (fate#324061).
  
Security issue fixed:

- CVE-2017-15232: Fix NULL pointer dereference in jdpostct.c and jquant1.c (bsc#1062937).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550599" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550600" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550601" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550602" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550603" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550604" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550605" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80229" version="1" class="patch">
	<metadata>
		<title>security update for spice-vdagent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012215" ref_url="https://bugzilla.suse.com/1012215" source="BUGZILLA"/>
		<reference ref_id="1070724" ref_url="https://bugzilla.suse.com/1070724" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003708.html" source="SUSE-SU"/>
		<description>
This update for spice-vdagent provides the following fixes:

This security issue was fixed:

- CVE-2017-15108: Properly escape save directory that is passed to the shell to
  prevent local attacker with access to the session the agent runs from injecting
  arbitrary commands to be executed (bsc#1070724).

This non-security issue was fixed:

- Implement endian swapping, required for big-endian guests to connect to the spice client
  successfully. (bsc#1012215)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1012215">SUSE bug 1012215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070724">SUSE bug 1070724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550606" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80230" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077291" ref_url="https://bugzilla.suse.com/1077291" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 52.6 several issues.

These security issues were fixed:

- CVE-2018-5091: Use-after-free with DTMF timers (bsc#1077291).
- CVE-2018-5095: Integer overflow in Skia library during edge builder allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5089: Fixed several memory safety bugs (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-06"/>
	<updated date="2018-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80231" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80232" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550609" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550611" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550613" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550615" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550616" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80233" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bsc#1107832).
- CVE-2018-5390: Fixed the possiblilty that the kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536662" comment="kgraft-patch-4_4_121-92_98-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80234" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004862.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536663" comment="kgraft-patch-4_4_114-92_64-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80235" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536664" comment="kgraft-patch-4_4_114-92_67-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80236" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536665" comment="kgraft-patch-4_4_121-92_80-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80237" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536666" comment="kgraft-patch-4_4_121-92_73-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80238" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536667" comment="kgraft-patch-4_4_120-92_70-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80239" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="1112039" ref_url="https://bugzilla.suse.com/1112039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004859.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536668" comment="kgraft-patch-4_4_103-92_53-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80240" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="1112039" ref_url="https://bugzilla.suse.com/1112039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536669" comment="kgraft-patch-4_4_103-92_56-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80241" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="1112039" ref_url="https://bugzilla.suse.com/1112039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536670" comment="kgraft-patch-4_4_90-92_50-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80242" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536671" comment="kgraft-patch-4_4_121-92_85-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80243" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00021.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

This update for qemu fixes the following issues:

A mitigation for a security flaw has been applied:

- CVE-2017-5715: QEMU was updated to allow passing through new MSR and CPUID flags from 
  the host VM to the CPU, to allow enabling/disabling branch prediction features in the
  Intel CPU. (bsc#1068032)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-08"/>
	<updated date="2018-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550617" comment="qemu-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533120" comment="qemu-arm-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550618" comment="qemu-block-curl-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550619" comment="qemu-block-rbd-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550620" comment="qemu-block-ssh-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550621" comment="qemu-guest-agent-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518844" comment="qemu-ipxe-1.0.0-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550622" comment="qemu-kvm-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550623" comment="qemu-lang-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550624" comment="qemu-ppc-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550625" comment="qemu-s390-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518846" comment="qemu-seabios-1.9.1-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518847" comment="qemu-sgabios-8-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550626" comment="qemu-tools-2.6.2-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518849" comment="qemu-vgabios-1.9.1-41.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518850" comment="qemu-x86-2.6.2-41.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80244" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1058722" ref_url="https://bugzilla.suse.com/1058722" source="BUGZILLA"/>
		<reference ref_id="1064101" ref_url="https://bugzilla.suse.com/1064101" source="BUGZILLA"/>
		<reference ref_id="1064115" ref_url="https://bugzilla.suse.com/1064115" source="BUGZILLA"/>
		<reference ref_id="1076505" ref_url="https://bugzilla.suse.com/1076505" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<description>
This update for mariadb to version 10.0.33 fixes several issues.

These security issues were fixed:

- CVE-2017-10378: Vulnerability in subcomponent: Server: Optimizer. Easily
  exploitable vulnerability allowed low privileged attacker with network access
  via multiple protocols to compromise MySQL Server. Successful attacks of this
  vulnerability can result in unauthorized ability to cause a hang or frequently
  repeatable crash (complete DOS) of MySQL Server (bsc#1064115).
- CVE-2017-10268: Vulnerability in subcomponent: Server: Replication. Difficult
  to exploit vulnerability allowed high privileged attacker with logon to the
  infrastructure where MySQL Server executes to compromise MySQL Server.
  Successful attacks of this vulnerability can result in unauthorized access to
  critical data or complete access to all MySQL Server accessible data
  (bsc#1064101).

These non-security issues were fixed:

- CHECK TABLE no longer returns an error when run on a CONNECT table
- 'Undo log record is too big.' error occurring in very narrow range of string
  lengths
- Race condition between INFORMATION_SCHEMA.INNODB_SYS_TABLESTATS and
  ALTER/DROP/TRUNCATE TABLE
- Wrong result after altering a partitioned table fixed bugs in InnoDB FULLTEXT
  INDEX
- InnoDB FTS duplicate key error
- InnoDB crash after failed ADD INDEX and table_definition_cache eviction
- fts_create_doc_id() unnecessarily allocates 8 bytes for every inserted row
- IMPORT TABLESPACE may corrupt ROW_FORMAT=REDUNDANT tables

For additional details please see https://kb.askmonty.org/en/mariadb-10033-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1058722">SUSE bug 1058722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550627" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550628" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550629" comment="mariadb-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550630" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550631" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550632" comment="mariadb-tools-10.0.33-29.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80245" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1070130" ref_url="https://bugzilla.suse.com/1070130" source="BUGZILLA"/>
		<reference ref_id="1072887" ref_url="https://bugzilla.suse.com/1072887" source="BUGZILLA"/>
		<reference ref_id="1073973" ref_url="https://bugzilla.suse.com/1073973" source="BUGZILLA"/>
		<reference ref_id="1076500" ref_url="https://bugzilla.suse.com/1076500" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003713.html" source="SUSE-SU"/>
		<description>
This update for libvirt provides several fixes.

This security issue was fixed:

- CVE-2018-5748: Prevent resource exhaustion via qemuMonitorIORead() method which allowed to cause DoS (bsc#1076500).

These security issues were fixed:

- Add a qemu hook script providing functionality similar to Xen's block-dmmd script.
  (fate#324177)
- schema: Make disk driver name attribute optional. (bsc#1073973)
- virt-create-rootfs: Handle all SLE 12 versions. (bsc#1072887)
- libvirt-guests: Fix the 'stop' operation when action is 'suspend'. (bsc#1070130)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-07"/>
	<updated date="2018-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1070130">SUSE bug 1070130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072887">SUSE bug 1072887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073973">SUSE bug 1073973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550633" comment="libvirt-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550634" comment="libvirt-client-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550635" comment="libvirt-daemon-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550636" comment="libvirt-daemon-config-network-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550637" comment="libvirt-daemon-config-nwfilter-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550638" comment="libvirt-daemon-driver-interface-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518865" comment="libvirt-daemon-driver-libxl-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550639" comment="libvirt-daemon-driver-lxc-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550640" comment="libvirt-daemon-driver-network-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550641" comment="libvirt-daemon-driver-nodedev-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550642" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550643" comment="libvirt-daemon-driver-qemu-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550644" comment="libvirt-daemon-driver-secret-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550645" comment="libvirt-daemon-driver-storage-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550646" comment="libvirt-daemon-lxc-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550647" comment="libvirt-daemon-qemu-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518875" comment="libvirt-daemon-xen-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550648" comment="libvirt-doc-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550649" comment="libvirt-lock-sanlock-2.0.0-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550650" comment="libvirt-nss-2.0.0-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80246" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077993" ref_url="https://bugzilla.suse.com/1077993" source="BUGZILLA"/>
		<reference ref_id="1078806" ref_url="https://bugzilla.suse.com/1078806" source="BUGZILLA"/>
		<reference ref_id="1078813" ref_url="https://bugzilla.suse.com/1078813" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes one issue.

This security issue was fixed:

- CVE-2017-15412: Prevent use after free when calling XPath extension functions
  that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
  remote attackers to cause a denial of service or possibly have
  unspecified other impact via vectors related to the XPointer range-to
  function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
  xmlMemoryStrdup() (bsc#1078806)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-08"/>
	<updated date="2018-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550651" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550652" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533151" comment="libxml2-doc-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550653" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550654" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80247" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550655" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550656" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550658" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550660" comment="openssl-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80248" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545949" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545950" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545952" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545953" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80249" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1032138" ref_url="https://bugzilla.suse.com/1032138" source="BUGZILLA"/>
		<reference ref_id="1032230" ref_url="https://bugzilla.suse.com/1032230" source="BUGZILLA"/>
		<reference ref_id="1040643" ref_url="https://bugzilla.suse.com/1040643" source="BUGZILLA"/>
		<reference ref_id="1050879" ref_url="https://bugzilla.suse.com/1050879" source="BUGZILLA"/>
		<reference ref_id="1050887" ref_url="https://bugzilla.suse.com/1050887" source="BUGZILLA"/>
		<reference ref_id="1050888" ref_url="https://bugzilla.suse.com/1050888" source="BUGZILLA"/>
		<reference ref_id="1050889" ref_url="https://bugzilla.suse.com/1050889" source="BUGZILLA"/>
		<reference ref_id="1050891" ref_url="https://bugzilla.suse.com/1050891" source="BUGZILLA"/>
		<reference ref_id="1051184" ref_url="https://bugzilla.suse.com/1051184" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612/" source="CVE"/>
		<reference ref_id="CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726/" source="CVE"/>
		<reference ref_id="CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727/" source="CVE"/>
		<reference ref_id="CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739/" source="CVE"/>
		<reference ref_id="CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes several issues.



These security issues were fixed: 

- CVE-2017-9835: The gs_alloc_ref_array function allowed remote attackers to
  cause a denial of service (heap-based buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted PostScript document
  (bsc#1050879).
- CVE-2017-9216: Prevent NULL pointer dereference in the jbig2_huffman_get
  function in jbig2_huffman.c which allowed for DoS (bsc#1040643).
- CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c
  allowed remote attackers to cause a denial of service (heap-based buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted PostScript document (bsc#1032230).
- CVE-2017-9612: The Ins_IP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (use-after-free and application crash)
  or possibly have unspecified other impact via a crafted document (bsc#1050891).
- CVE-2017-9726: The Ins_MDRP function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050889).
- CVE-2017-9727: The gx_ttfReader__Read function in base/gxttfb.c allowed
  remote attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050888).
- CVE-2017-9739: The Ins_JMPR function in base/ttinterp.c allowed remote
  attackers to cause a denial of service (heap-based buffer over-read and
  application crash) or possibly have unspecified other impact via a crafted
  document (bsc#1050887).
- CVE-2017-11714: psi/ztoken.c mishandled references to the scanner state
  structure, which allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact via a crafted
  PostScript document, related to an out-of-bounds read in the
  igc_reloc_struct_ptr function in psi/igc.c (bsc#1051184).
- CVE-2016-10219: The intersect function in base/gxfill.c allowed remote
  attackers to cause a denial of service (divide-by-zero error and application
  crash) via a crafted file (bsc#1032138).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80250" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104199" ref_url="https://bugzilla.suse.com/1104199" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004887.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 to 9.4.19 fixes the following security issue:

- CVE-2018-10915: libpq failed to properly reset its internal state between
  connections. If an affected version of libpq was used with 'host' or 'hostaddr'
  connection parameters from untrusted input, attackers could have bypassed
  client-side connection security features, obtain access to higher privileged
  connections or potentially cause other impact SQL injection, by causing the
  PQescape() functions to malfunction (bsc#1104199).

A dump/restore is not required for this update unless you use
the functions query_to_xml, cursor_to_xml, cursor_to_xmlschema,
query_to_xmlschema, and query_to_xml_and_xmlschema. In this case please see
the first entry of https://www.postgresql.org/docs/9.4/static/release-9-4-18.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545954" comment="postgresql94-9.4.19-21.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545955" comment="postgresql94-contrib-9.4.19-21.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530335" comment="postgresql94-docs-9.4.19-21.22.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545956" comment="postgresql94-server-9.4.19-21.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80251" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550663" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550664" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550665" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550666" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80252" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80253" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012917" ref_url="https://bugzilla.suse.com/1012917" source="BUGZILLA"/>
		<reference ref_id="1019784" ref_url="https://bugzilla.suse.com/1019784" source="BUGZILLA"/>
		<reference ref_id="1022476" ref_url="https://bugzilla.suse.com/1022476" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1038078" ref_url="https://bugzilla.suse.com/1038078" source="BUGZILLA"/>
		<reference ref_id="1038085" ref_url="https://bugzilla.suse.com/1038085" source="BUGZILLA"/>
		<reference ref_id="1043652" ref_url="https://bugzilla.suse.com/1043652" source="BUGZILLA"/>
		<reference ref_id="1048585" ref_url="https://bugzilla.suse.com/1048585" source="BUGZILLA"/>
		<reference ref_id="1052360" ref_url="https://bugzilla.suse.com/1052360" source="BUGZILLA"/>
		<reference ref_id="1060279" ref_url="https://bugzilla.suse.com/1060279" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1066842" ref_url="https://bugzilla.suse.com/1066842" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068038" ref_url="https://bugzilla.suse.com/1068038" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1068984" ref_url="https://bugzilla.suse.com/1068984" source="BUGZILLA"/>
		<reference ref_id="1069160" ref_url="https://bugzilla.suse.com/1069160" source="BUGZILLA"/>
		<reference ref_id="1070799" ref_url="https://bugzilla.suse.com/1070799" source="BUGZILLA"/>
		<reference ref_id="1072163" ref_url="https://bugzilla.suse.com/1072163" source="BUGZILLA"/>
		<reference ref_id="1072484" ref_url="https://bugzilla.suse.com/1072484" source="BUGZILLA"/>
		<reference ref_id="1072589" ref_url="https://bugzilla.suse.com/1072589" source="BUGZILLA"/>
		<reference ref_id="1073229" ref_url="https://bugzilla.suse.com/1073229" source="BUGZILLA"/>
		<reference ref_id="1073928" ref_url="https://bugzilla.suse.com/1073928" source="BUGZILLA"/>
		<reference ref_id="1074134" ref_url="https://bugzilla.suse.com/1074134" source="BUGZILLA"/>
		<reference ref_id="1074392" ref_url="https://bugzilla.suse.com/1074392" source="BUGZILLA"/>
		<reference ref_id="1074488" ref_url="https://bugzilla.suse.com/1074488" source="BUGZILLA"/>
		<reference ref_id="1074621" ref_url="https://bugzilla.suse.com/1074621" source="BUGZILLA"/>
		<reference ref_id="1074709" ref_url="https://bugzilla.suse.com/1074709" source="BUGZILLA"/>
		<reference ref_id="1074839" ref_url="https://bugzilla.suse.com/1074839" source="BUGZILLA"/>
		<reference ref_id="1074847" ref_url="https://bugzilla.suse.com/1074847" source="BUGZILLA"/>
		<reference ref_id="1075066" ref_url="https://bugzilla.suse.com/1075066" source="BUGZILLA"/>
		<reference ref_id="1075078" ref_url="https://bugzilla.suse.com/1075078" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1075617" ref_url="https://bugzilla.suse.com/1075617" source="BUGZILLA"/>
		<reference ref_id="1075621" ref_url="https://bugzilla.suse.com/1075621" source="BUGZILLA"/>
		<reference ref_id="1075627" ref_url="https://bugzilla.suse.com/1075627" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1076806" ref_url="https://bugzilla.suse.com/1076806" source="BUGZILLA"/>
		<reference ref_id="1076809" ref_url="https://bugzilla.suse.com/1076809" source="BUGZILLA"/>
		<reference ref_id="1076872" ref_url="https://bugzilla.suse.com/1076872" source="BUGZILLA"/>
		<reference ref_id="1076899" ref_url="https://bugzilla.suse.com/1076899" source="BUGZILLA"/>
		<reference ref_id="1077068" ref_url="https://bugzilla.suse.com/1077068" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077592" ref_url="https://bugzilla.suse.com/1077592" source="BUGZILLA"/>
		<reference ref_id="1078526" ref_url="https://bugzilla.suse.com/1078526" source="BUGZILLA"/>
		<reference ref_id="1078681" ref_url="https://bugzilla.suse.com/1078681" source="BUGZILLA"/>
		<reference ref_id="963844" ref_url="https://bugzilla.suse.com/963844" source="BUGZILLA"/>
		<reference ref_id="988524" ref_url="https://bugzilla.suse.com/988524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.114 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).

  The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.

- CVE-2017-15129: A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel The function get_net_ns_by_id() in net/core/net_namespace.c did not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely (bnc#1074839).
- CVE-2017-17712: The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel has a race condition in inet-&gt;hdrincl that leads to uninitialized stack pointer usage; this allowed a local user to execute code and gain privileges (bnc#1073229).
- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignored unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).
- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a 'pointer leak (bnc#1073928).
- CVE-2017-18017: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel allowed remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action (bnc#1074488).
- CVE-2018-1000004: In the Linux kernel a race condition vulnerability existed in the sound system, this can lead to a deadlock and denial of service condition (bnc#1076017).
- CVE-2018-5332: In the Linux kernel the rds_message_alloc_sgs() function did not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c) (bnc#1075621).
- CVE-2018-5333: In the Linux kernel the rds_cmsg_atomic function in net/rds/rdma.c mishandled cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference (bnc#1075617).

The following non-security bugs were fixed:

- 8021q: fix a memory leak for VLAN 0 device (bnc#1012382).
- ACPI / scan: Prefer devices without _HID/_CID for _ADR matching (bnc#1012382).
- ARC: uaccess: dont use 'l' gcc inline asm constraint modifier (bnc#1012382).
- Fix EX_SIZE. We do not have the patches that shave off parts of the exception data.
- Fix build error in vma.c (bnc#1012382).
- Fix mishandling of cases with MSR not being present (writing to MSR even though _state == -1).
- Fix return value from ib[rs|pb]_enabled()
- Input: trackpoint - force 3 buttons if 0 button is reported (bnc#1012382).
- KVM: s390: Enable all facility bits that are known good for passthrough (bsc#1076806).
- Kabi: Keep KVM stable after enable s390 wire up bpb feature (bsc#1076806).
- Move RFI sysfs to a separate patch
- Move the RFI debug code into separate patch.
- Re-enable fixup detection by CPU type in case hypervisor call fails.
- Revert 'Bluetooth: btusb: driver to enable the usb-wakeup feature' (bnc#1012382).
- Revert 'Re-enable fixup detection by CPU type in case hypervisor call fails.' The firmware update is required for the existing instructions to also do the cache flush.
- Revert 'arm64: alternatives: add enable parameter to conditional asm macros' (bsc#1068032).
- Revert 'drm/armada: Fix compile fail' (bnc#1012382).
- Revert 'drm/radeon: dont switch vt on suspend' (bnc#1012382).
- Revert 'ipsec: Fix aborted xfrm policy dump crash' (kabi).
- Revert 'kaiser: vmstat show NR_KAISERTABLE as nr_overhead' (kabi).
- Revert 'lib/genalloc.c: make the avail variable an atomic_long_t' (kabi).
- Revert 'module: Add retpoline tag to VERMAGIC' (bnc#1012382 kabi).
- Revert 'netlink: add a start callback for starting a netlink dump' (kabi).
- Revert 'ocfs2: should wait dio before inode lock in ocfs2_setattr()' (bnc#1012382).
- Revert 's390/kbuild: enable modversions for symbols exported from asm' (bnc#1012382).
- Revert 'sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks' (kabi).
- Revert 'scsi: libsas: align sata_device's rps_resp on a cacheline' (kabi).
- Revert 'spi: SPI_FSL_DSPI should depend on HAS_DMA' (bnc#1012382).
- Revert 'userfaultfd: selftest: vm: allow to build in vm/ directory' (bnc#1012382).
- Revert 'x86/efi: Build our own page table structures' (bnc#1012382).
- Revert 'x86/efi: Hoist page table switching code into efi_call_virt()' (bnc#1012382).
- Revert 'x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers' (bnc#1012382).
- SMB2: Fix share type handling (bnc#1074392).
- Set supported_modules_check 1 (bsc#1072163).
- Update patches.suse/powerpc-Secure-memory-rfi-flush-SLE12SP3.patch (bsc#1068032, bsc#1075087).
- af_key: fix buffer overread in parse_exthdrs() (bnc#1012382).
- af_key: fix buffer overread in verify_address_len() (bnc#1012382).
- afs: Adjust mode bits processing (bnc#1012382).
- afs: Connect up the CB.ProbeUuid (bnc#1012382).
- afs: Fix afs_kill_pages() (bnc#1012382).
- afs: Fix missing put_page() (bnc#1012382).
- afs: Fix page leak in afs_write_begin() (bnc#1012382).
- afs: Fix the maths in afs_fs_store_data() (bnc#1012382).
- afs: Flush outstanding writes when an fd is closed (bnc#1012382).
- afs: Migrate vlocation fields to 64-bit (bnc#1012382).
- afs: Populate and use client modification time (bnc#1012382).
- afs: Populate group ID from vnode status (bnc#1012382).
- afs: Prevent callback expiry timer overflow (bnc#1012382).
- alpha: fix build failures (bnc#1012382).
- alsa: aloop: Fix inconsistent format due to incomplete rule (bsc#1031717).
- alsa: aloop: Fix racy hw constraints adjustment (bsc#1031717).
- alsa: aloop: Release cable upon open error path (bsc#1031717).
- alsa: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds (bsc#1031717).
- alsa: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines (bsc#1031717).
- alsa: hda - Add mute led support for HP EliteBook 840 G3 (bsc#1031717).
- alsa: hda - Add mute led support for HP ProBook 440 G4 (bsc#1031717).
- alsa: hda - Apply headphone noise quirk for another Dell XPS 13 variant (bsc#1031717).
- alsa: hda - Apply the existing quirk to iMac 14,1 (bsc#1031717).
- alsa: hda - Fix click noises on Samsung Ativ Book 8 (bsc#1031717).
- alsa: hda - Fix headset microphone detection for ASUS N551 and N751 (bsc#1031717).
- alsa: hda - Fix mic regression by ASRock mobo fixup (bsc#1031717).
- alsa: hda - Fix missing COEF init for ALC225/295/299 (bsc#1031717).
- alsa: hda - Fix surround output pins for ASRock B150M mobo (bsc#1031717).
- alsa: hda - On-board speaker fixup on ACER Veriton (bsc#1031717).
- alsa: hda - Skip Realtek SKU check for Lenovo machines (bsc#1031717).
- alsa: hda - add support for docking station for HP 820 G2 (bsc#1031717).
- alsa: hda - add support for docking station for HP 840 G3 (bsc#1031717).
- alsa: hda - change the location for one mic on a Lenovo machine (bsc#1031717).
- alsa: hda - fix headset mic detection issue on a Dell machine (bsc#1031717).
- alsa: hda - fix headset mic problem for Dell machines with alc274 (bsc#1031717).
- alsa: hda/realtek - ALC891 headset mode for Dell (bsc#1031717).
- alsa: hda/realtek - Add ALC256 HP depop function (bsc#1031717).
- alsa: hda/realtek - Add default procedure for suspend and resume state (bsc#1031717).
- alsa: hda/realtek - Add support for ALC1220 (bsc#1031717).
- alsa: hda/realtek - Add support for Acer Aspire E5-475 headset mic (bsc#1031717).
- alsa: hda/realtek - Add support for headset MIC for ALC622 (bsc#1031717).
- alsa: hda/realtek - Enable jack detection function for Intel ALC700 (bsc#1031717).
- alsa: hda/realtek - Fix ALC275 no sound issue (bsc#1031717).
- alsa: hda/realtek - Fix Dell AIO LineOut issue (bsc#1031717).
- alsa: hda/realtek - Fix headset and mic on several Asus laptops with ALC256 (bsc#1031717).
- alsa: hda/realtek - Fix headset mic and speaker on Asus X441SA/X441UV (bsc#1031717).
- alsa: hda/realtek - Fix headset mic on several Asus laptops with ALC255 (bsc#1031717).
- alsa: hda/realtek - Fix pincfg for Dell XPS 13 9370 (bsc#1031717).
- alsa: hda/realtek - Fix speaker support for Asus AiO ZN270IE (bsc#1031717).
- alsa: hda/realtek - Fix typo of pincfg for Dell quirk (bsc#1031717).
- alsa: hda/realtek - New codec device ID for ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codec support for ALC257 (bsc#1031717).
- alsa: hda/realtek - New codec support of ALC1220 (bsc#1031717).
- alsa: hda/realtek - New codecs support for ALC215/ALC285/ALC289 (bsc#1031717).
- alsa: hda/realtek - No loopback on ALC225/ALC295 codec (bsc#1031717).
- alsa: hda/realtek - Remove ALC285 device ID (bsc#1031717).
- alsa: hda/realtek - Support Dell headset mode for ALC3271 (bsc#1031717).
- alsa: hda/realtek - Support headset mode for ALC234/ALC274/ALC294 (bsc#1031717).
- alsa: hda/realtek - There is no loopback mixer in the ALC234/274/294 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC225 (bsc#1031717).
- alsa: hda/realtek - Update headset mode for ALC298 (bsc#1031717).
- alsa: hda/realtek - change the location for one of two front microphones (bsc#1031717).
- alsa: hda/realtek - fix headset mic detection for MSI MS-B120 (bsc#1031717).
- alsa: hda: Drop useless WARN_ON() (bsc#1031717).
- alsa: pcm: Abort properly at pending signal in OSS read/write loops (bsc#1031717).
- alsa: pcm: Add missing error checks in OSS emulation plugin builder (bsc#1031717).
- alsa: pcm: Allow aborting mutex lock at OSS read/write loops (bsc#1031717).
- alsa: pcm: Remove incorrect snd_BUG_ON() usages (bsc#1031717).
- alsa: pcm: Remove yet superfluous WARN_ON() (bsc#1031717).
- alsa: pcm: prevent UAF in snd_pcm_info (bsc#1031717).
- alsa: rawmidi: Avoid racy info ioctl via ctl device (bsc#1031717).
- alsa: seq: Remove spurious WARN_ON() at timer check (bsc#1031717).
- alsa: usb-audio: Add check return value for usb_string() (bsc#1031717).
- alsa: usb-audio: Fix out-of-bound error (bsc#1031717).
- alsa: usb-audio: Fix the missing ctl name suffix at parsing SU (bsc#1031717).
- arm-ccn: perf: Prevent module unload while PMU is in use (bnc#1012382).
- arm64/cpufeature: do not use mutex in bringup path (bsc#1068032).
- arm64: Add hypervisor safe helper for checking constant capabilities (bsc#1068032).
- arm64: Add macros to read/write system registers (bsc#1068032).
- arm64: Add skeleton to harden the branch predictor against aliasing attacks (bsc#1068032).
- arm64: Add trace_hardirqs_off annotation in ret_to_user (bsc#1068032).
- arm64: Disable TTBR0_EL1 during normal kernel execution (bsc#1068032).
- arm64: Disable kpti for non broadcast TLB HW (bsc#1068032).
- arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: Factor out PAN enabling/disabling into separate uaccess_* macros (bsc#1068032).
- arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro (bsc#1068032).
- arm64: Fix circular include of asm/lse.h through linux/jump_label.h (bsc#1068032).
- arm64: Fix compilation (bsc#1068032).
- arm64: Handle el1 synchronous instruction aborts cleanly (bsc#1068032).
- arm64: Implement branch predictor hardening for affected Cortex-A CPUs (bsc#1068032).
- arm64: Initialise high_memory global variable earlier (bnc#1012382).
- arm64: Introduce uaccess_{disable,enable} functionality based on TTBR0_EL1 (bsc#1068032).
- arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 (bsc#1068032).
- arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry (bsc#1068032).
- arm64: Mask all exceptions during kernel_exit (bsc#1068032).
- arm64: Move BP hardening to check_and_switch_context (bsc#1068032).
- arm64: Move post_ttbr_update_workaround to C code (bsc#1068032).
- arm64: Move the async/fiq helpers to explicitly set process context flags (bsc#1068032).
- arm64: SW PAN: Point saved ttbr0 at the zero page when switching to init_mm (bsc#1068032).
- arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb (bsc#1068032).
- arm64: Store struct thread_info in sp_el0 (bsc#1068032).
- arm64: Take into account ID_AA64PFR0_EL1.CSV3 (bsc#1068032).
- arm64: Use static keys for CPU features (bsc#1068032).
- arm64: add macro to extract ESR_ELx.EC (bsc#1068032).
- arm64: alternative: add auto-nop infrastructure (bsc#1068032).
- arm64: barriers: introduce nops and __nops macros for NOP sequences (bsc#1068032).
- arm64: cpu_errata: Allow an erratum to be match for all revisions of a core (bsc#1068032).
- arm64: cpufeature: Add scope for capability check (bsc#1068032).
- arm64: cpufeature: Pass capability structure to -&gt;enable callback (bsc#1068032).
- arm64: debug: remove unused local_dbg_{enable, disable} macros (bsc#1068032).
- arm64: do not pull uaccess.h into *.S (bsc#1068032).
- arm64: entry.S convert el0_sync (bsc#1068032).
- arm64: entry.S: Remove disable_dbg (bsc#1068032).
- arm64: entry.S: convert el1_sync (bsc#1068032).
- arm64: entry.S: convert elX_irq (bsc#1068032).
- arm64: entry.S: move SError handling into a C function for future expansion (bsc#1068032).
- arm64: entry: Add exception trampoline page for exceptions from EL0 (bsc#1068032).
- arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 (bsc#1068032).
- arm64: entry: Explicitly pass exception level to kernel_ventry macro (bsc#1068032).
- arm64: entry: Hook up entry trampoline to exception vectors (bsc#1068032).
- arm64: entry: remove pointless SPSR mode check (bsc#1068032).
- arm64: explicitly mask all exceptions (bsc#1068032).
- arm64: factor out PAGE_* and CONT_* definitions (bsc#1068032).
- arm64: factor out entry stack manipulation (bsc#1068032).
- arm64: factor work_pending state machine to C (bsc#1068032).
- arm64: fpsimd: Prevent registers leaking from dead tasks (bnc#1012382).
- arm64: head.S: get rid of x25 and x26 with 'global' scope (bsc#1068032).
- arm64: introduce an order for exceptions (bsc#1068032).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bsc#1068032).
- arm64: kaslr: Put kernel vectors address in separate data page (bsc#1068032).
- arm64: kill ESR_LNX_EXEC (bsc#1068032).
- arm64: kpti: Fix the interaction between ASID switching and software PAN (bsc#1068032).
- arm64: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).
- arm64: kvm: Survive unknown traps from guests (bnc#1012382).
- arm64: kvm: Use per-CPU vector when BP hardening is enabled (bsc#1068032).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm64: mm: Add arm64_kernel_unmapped_at_el0 helper (bsc#1068032).
- arm64: mm: Allocate ASIDs in pairs (bsc#1068032).
- arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR (bsc#1068032).
- arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI (bsc#1068032).
- arm64: mm: Map entry trampoline into trampoline and kernel page tables (bsc#1068032).
- arm64: mm: Move ASID from TTBR0 to TTBR1 (bsc#1068032).
- arm64: mm: Rename post_ttbr0_update_workaround (bsc#1068032).
- arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN (bsc#1068032).
- arm64: mm: Use non-global mappings for kernel space (bsc#1068032).
- arm64: mm: hardcode rodata=true (bsc#1068032).
- arm64: swp emulation: bound LL/SC retries before rescheduling (bsc#1068032).
- arm64: sysreg: Fix unprotected macro argmuent in write_sysreg (bsc#1068032).
- arm64: sysreg: allow write_sysreg to use XZR (bsc#1068032).
- arm64: tlbflush.h: add __tlbi() macro (bsc#1068032).
- arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks (bsc#1068032).
- arm64: use RET instruction for exiting the trampoline (bsc#1068032).
- arm64: use alternative auto-nop (bsc#1068032).
- arm64: xen: Enable user access before a privcmd hvc call (bsc#1068032).
- arm: BUG if jumping to usermode address in kernel mode (bnc#1012382).
- arm: OMAP1: DMA: Correct the number of logical channels (bnc#1012382).
- arm: OMAP2+: Fix device node reference counts (bnc#1012382).
- arm: OMAP2+: Release device node after it is no longer needed (bnc#1012382).
- arm: OMAP2+: gpmc-onenand: propagate error on initialization failure (bnc#1012382).
- arm: avoid faulting on qemu (bnc#1012382).
- arm: dma-mapping: disallow dma_get_sgtable() for non-kernel managed memory (bnc#1012382).
- arm: dts: am335x-evmsk: adjust mmc2 param to allow suspend (bnc#1012382).
- arm: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 (bnc#1012382).
- arm: dts: omap3: logicpd-torpedo-37xx-devkit: Fix MMC1 cd-gpio (bnc#1012382).
- arm: dts: ti: fix PCI bus dtc warnings (bnc#1012382).
- arm: kprobes: Align stack to 8-bytes in test code (bnc#1012382).
- arm: kprobes: Fix the return address of multiple kretprobes (bnc#1012382).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bnc#1012382).
- arm: kvm: Survive unknown traps from guests (bnc#1012382).
- asm-prototypes: Clear any CPP defines before declaring the functions (git-fixes).
- asn.1: check for error from ASN1_OP_END__ACT actions (bnc#1012382).
- asn.1: fix out-of-bounds read when parsing indefinite length item (bnc#1012382).
- asoc: fsl_ssi: AC'97 ops need regmap, clock and cleaning up on failure (bsc#1031717).
- asoc: twl4030: fix child-node lookup (bsc#1031717).
- asoc: wm_adsp: Fix validation of firmware and coeff lengths (bsc#1031717).
- ath9k: fix tx99 potential info leak (bnc#1012382).
- atm: horizon: Fix irq release error (bnc#1012382).
- audit: ensure that 'audit=1' actually enables audit for PID 1 (bnc#1012382).
- axonram: Fix gendisk handling (bnc#1012382).
- backlight: pwm_bl: Fix overflow condition (bnc#1012382).
- bcache.txt: standardize document format (bsc#1076110).
- bcache: Avoid nested function definition (bsc#1076110).
- bcache: Do not reinvent the wheel but use existing llist API (bsc#1076110).
- bcache: Fix building error on MIPS (bnc#1012382).
- bcache: Remove deprecated create_workqueue (bsc#1076110).
- bcache: Remove redundant block_size assignment (bsc#1076110).
- bcache: Remove redundant parameter for cache_alloc() (bsc#1076110).
- bcache: Remove redundant set_capacity (bsc#1076110).
- bcache: Update continue_at() documentation (bsc#1076110).
- bcache: add a comment in journal bucket reading (bsc#1076110).
- bcache: check return value of register_shrinker (bsc#1076110).
- bcache: debug: avoid accessing .bi_io_vec directly (bsc#1076110).
- bcache: do not write back data if reading it failed (bsc#1076110).
- bcache: documentation formatting, edited for clarity, stripe alignment notes (bsc#1076110).
- bcache: documentation updates and corrections (bsc#1076110).
- bcache: explicitly destroy mutex while exiting (bnc#1012382).
- bcache: fix a comments typo in bch_alloc_sectors() (bsc#1076110).
- bcache: fix sequential large write IO bypass (bsc#1076110).
- bcache: fix wrong cache_misses statistics (bnc#1012382).
- bcache: gc does not work when triggering by manual command (bsc#1076110, bsc#1038078).
- bcache: implement PI controller for writeback rate (bsc#1076110).
- bcache: increase the number of open buckets (bsc#1076110).
- bcache: only permit to recovery read error when cache device is clean (bnc#1012382 bsc#1043652).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1076110).
- bcache: pr_err: more meaningful error message when nr_stripes is invalid (bsc#1076110).
- bcache: rearrange writeback main thread ratelimit (bsc#1076110).
- bcache: recover data from backing when data is clean (bnc#1012382 bsc#1043652).
- bcache: register_bcache(): call blkdev_put() when cache_alloc() fails (bsc#1076110).
- bcache: remove unused parameter (bsc#1076110).
- bcache: rewrite multiple partitions support (bsc#1076110, bsc#1038085, bsc#1019784).
- bcache: safeguard a dangerous addressing in closure_queue (bsc#1076110).
- bcache: silence static checker warning (bsc#1076110).
- bcache: smooth writeback rate control (bsc#1076110).
- bcache: switch to using blk_queue_write_cache() (bsc#1076110).
- bcache: update bio-&gt;bi_opf bypass/writeback REQ_ flag hints (bsc#1076110).
- bcache: update bucket_in_use in real time (bsc#1076110).
- bcache: update document info (bsc#1076110).
- bcache: use kmalloc to allocate bio in bch_data_verify() (bsc#1076110).
- bcache: use llist_for_each_entry_safe() in __closure_wake_up() (bsc#1076110).
- bcache: writeback rate clamping: make 32 bit safe (bsc#1076110).
- bcache: writeback rate shouldn't artifically clamp (bsc#1076110).
- be2net: restore properly promisc mode after queues reconfiguration (bsc#963844).
- block: export bio_free_pages to other modules (bsc#1076110).
- block: wake up all tasks blocked in get_request() (bnc#1012382).
- bluetooth: btusb: driver to enable the usb-wakeup feature (bnc#1012382).
- bnx2x: do not rollback VF MAC/VLAN filters we did not configure (bnc#1012382).
- bnx2x: fix possible overrun of VFPF multicast addresses array (bnc#1012382).
- bnx2x: prevent crash when accessing PTP with interface down (bnc#1012382).
- btrfs: account for pinned bytes in should_alloc_chunk (bsc#1066842).
- btrfs: add missing memset while reading compressed inline extents (bnc#1012382).
- btrfs: clear space cache inode generation always (bnc#1012382).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bnc#1012382).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: gs_usb: fix return value of the 'set_bittiming' callback (bnc#1012382).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bnc#1012382).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- can: kvaser_usb: free buf in error paths (bnc#1012382).
- can: kvaser_usb: ratelimit errors if incomplete messages are received (bnc#1012382).
- can: peak: fix potential bug in packet fragmentation (bnc#1012382).
- can: ti_hecc: Fix napi poll return value for repoll (bnc#1012382).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bnc#1012382).
- cdc-acm: apply quirk for card reader (bsc#1060279).
- cdrom: factor out common open_for_* code (bsc#1048585).
- cdrom: wait for tray to close (bsc#1048585).
- ceph: drop negative child dentries before try pruning inode's alias (bnc#1012382).
- ceph: more accurate statfs (bsc#1077068).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bnc#1012382).
- clk: mediatek: add the option for determining PLL source clock (bnc#1012382).
- clk: tegra: Fix cclk_lp divisor register (bnc#1012382).
- cpuidle: Validate cpu_dev in cpuidle_add_sysfs() (bnc#1012382).
- cpuidle: fix broadcast control when broadcast can not be entered (bnc#1012382).
- cpuidle: powernv: Pass correct drv-&gt;cpumask for registration (bnc#1012382).
- crypto: algapi - fix NULL dereference in crypto_remove_spawns() (bnc#1012382).
- crypto: chacha20poly1305 - validate the digest size (bnc#1012382).
- crypto: crypto4xx - increase context and scatter ring buffer elements (bnc#1012382).
- crypto: deadlock between crypto_alg_sem/rtnl_mutex/genl_mutex (bnc#1012382).
- crypto: mcryptd - protect the per-CPU queue with a lock (bnc#1012382).
- crypto: n2 - cure use after free (bnc#1012382).
- crypto: pcrypt - fix freeing pcrypt instances (bnc#1012382).
- crypto: s5p-sss - Fix completing crypto request in IRQ handler (bnc#1012382).
- crypto: tcrypt - fix buffer lengths in test_aead_speed() (bnc#1012382).
- cxl: Check if vphb exists before iterating over AFU devices (bsc#1066223).
- dax: Pass detailed error code from __dax_fault() (bsc#1072484).
- dccp: don't restart ccid2_hc_tx_rto_expire() if sk in closed state (bnc#1012382).
- delay: add poll_event_interruptible (bsc#1048585).
- dm btree: fix serious bug in btree_split_beneath() (bnc#1012382).
- dm bufio: fix shrinker scans when (nr_to_scan &lt; retain_target) (bnc#1012382).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bnc#1012382).
- dmaengine: Fix array index out of bounds warning in __get_unmap_pool() (bnc#1012382).
- dmaengine: dmatest: move callback wait queue to thread context (bnc#1012382).
- dmaengine: pl330: fix double lock (bnc#1012382).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bnc#1012382).
- drivers/firmware: Expose psci_get_version through psci_ops structure (bsc#1068032).
- drivers/md/bcache/util.h: remove duplicate inclusion of blkdev.h (bsc#1076110).
- drivers: base: cacheinfo: fix boot error message when acpi is enabled (bnc#1012382).
- drivers: base: cacheinfo: fix x86 with CONFIG_OF enabled (bnc#1012382).
- drivers: net: xgene: Fix hardware checksum setting (bsc#1078526).
- drm/amd/amdgpu: fix console deadlock if late init failed (bnc#1012382).
- drm/exynos/decon5433: set STANDALONE_UPDATE_F on output enablement (bnc#1012382).
- drm/exynos: gem: Drop NONCONTIG flag for buffers allocated without IOMMU (bnc#1012382).
- drm/omap: fix dmabuf mmap for dma_alloc'ed buffers (bnc#1012382).
- drm/radeon/si: add dpm quirk for Oland (bnc#1012382).
- drm/radeon: fix atombios on big endian (bnc#1012382).
- drm/radeon: reinstate oland workaround for sclk (bnc#1012382).
- drm/vmwgfx: Potential off by one in vmw_view_add() (bnc#1012382).
- drm: extra printk() wrapper macros (bnc#1012382).
- dynamic-debug-howto: fix optional/omitted ending line number to be LARGE instead of 0 (bnc#1012382).
- edac, i5000, i5400: Fix definition of NRECMEMB register (bnc#1012382).
- edac, i5000, i5400: Fix use of MTR_DRAM_WIDTH macro (bnc#1012382).
- edac, sb_edac: Fix missing break in switch (bnc#1012382).
- eeprom: at24: check at24_read/write arguments (bnc#1012382).
- efi/esrt: Cleanup bad memory map log messages (bnc#1012382).
- efi: Move some sysfs files to be read-only by root (bnc#1012382).
- eventpoll.h: add missing epoll event masks (bnc#1012382).
- ext4: Fix ENOSPC handling in DAX page fault handle (bsc#1072484).
- ext4: fix crash when a directory's i_size is too small (bnc#1012382).
- ext4: fix fdatasync(2) after fallocate(2) operation (bnc#1012382).
- fbdev: controlfb: Add missing modes to fix out of bounds access (bnc#1012382).
- fjes: Fix wrong netdevice feature flags (bnc#1012382).
- flow_dissector: properly cap thoff field (bnc#1012382).
- fm10k: ensure we process SM mbx when processing VF mbx (bnc#1012382).
- fork: clear thread stack upon allocation (bsc#1077560). Conflicts: 	series.conf
- fscache: Fix the default for fscache_maybe_release_page() (bnc#1012382).
- futex: Prevent overflow by strengthen input validation (bnc#1012382).
- gcov: disable for COMPILE_TEST (bnc#1012382).
- gfs2: Take inode off order_write list when setting jdata flag (bnc#1012382).
- gpio: altera: Use handle_level_irq when configured as a level_high (bnc#1012382).
- hid: chicony: Add support for another ASUS Zen AiO keyboard (bnc#1012382).
- hid: xinmo: fix for out of range for THT 2P arcade controller (bnc#1012382).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1012382).
- hv: kvp: Avoid reading past allocated blocks from KVP file (bnc#1012382).
- hwmon: (asus_atk0110) fix uninitialized data access (bnc#1012382).
- i40e: Do not enable NAPI on q_vectors that have no rings (bnc#1012382).
- ib/hfi1: Correct defered count after processing qp_wait_list (git-fixes).
- ib/hfi1: Fix rnr_timer addition (git-fixes).
- ib/hfi1: Handle kzalloc failure in init_pervl_scs (git-fixes).
- ib/hfi1: Move iowait_init() to priv allocate (git-fixes).
- ib/hfi1: Prevent kernel QP post send hard lockups (git-fixes).
- ib/hfi1: Reset QSFP on every run through channel tuning (git-fixes).
- ib/ipoib: Fix lockdep issue found on ipoib_ib_dev_heavy_flush (git-fixes).
- ib/ipoib: Grab rtnl lock on heavy flush when calling ndo_open/stop (bnc#1012382).
- ib/mlx4: Increase maximal message size under UD QP (bnc#1012382).
- ib/mlx5: Assign send CQ and recv CQ of UMR QP (bnc#1012382).
- ib/qib: Remove qpt_mask global (git-fixes).
- ib/rdmavt: restore IRQs on error path in rvt_create_ah() (git-fixes).
- ib/srpt: Disable RDMA access by the initiator (bnc#1012382).
- ibmvnic: Allocate and request vpd in init_resources (bsc#1076872).
- ibmvnic: Do not handle RX interrupts when not up (bsc#1075066).
- ibmvnic: Fix IP offload control buffer (bsc#1076899).
- ibmvnic: Fix IPv6 packet descriptors (bsc#1076899).
- ibmvnic: Fix pending MAC address changes (bsc#1075627).
- ibmvnic: Modify buffer size and number of queues on failover (bsc#1076872).
- ibmvnic: Revert to previous mtu when unsupported value requested (bsc#1076872).
- ibmvnic: Wait for device response when changing MAC (bsc#1078681).
- igb: check memory allocation failure (bnc#1012382).
- ima: fix hash algorithm initialization (bnc#1012382).
- inet: frag: release spinlock before calling icmp_send() (bnc#1012382).
- input: 88pm860x-ts - fix child-node lookup (bnc#1012382).
- input: elantech - add new icbody type 15 (bnc#1012382).
- input: i8042 - add TUXEDO BU1406 (N24_25BU) to the nomux list (bnc#1012382).
- input: twl4030-vibra - fix sibling-node lookup (bnc#1012382).
- input: twl6040-vibra - fix DT node memory management (bnc#1012382).
- input: twl6040-vibra - fix child-node lookup (bnc#1012382).
- intel_th: pci: Add Gemini Lake support (bnc#1012382).
- iommu/arm-smmu-v3: Do not free page table ops twice (bnc#1012382).
- iommu/vt-d: Fix scatterlist offset handling (bnc#1012382).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (bnc#1012382).
- ipmi: Stop timers before cleaning up the module (bnc#1012382).
- ipv4: Fix use-after-free when flushing FIB tables (bnc#1012382).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (bnc#1012382).
- ipv4: igmp: guard against silly MTU values (bnc#1012382).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (bnc#1012382).
- ipv6: fix possible mem leaks in ipv6_make_skb() (bnc#1012382).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (bnc#1012382).
- ipv6: ip6_make_skb() needs to clear cork.base.dst (git-fixes).
- ipv6: mcast: better catch silly mtu values (bnc#1012382).
- ipv6: reorder icmpv6_init() and ip6_mr_init() (bnc#1012382).
- ipvlan: fix ipv6 outbound device (bnc#1012382).
- ipvlan: remove excessive packet scrubbing (bsc#1070799).
- irda: vlsi_ir: fix check for DMA mapping errors (bnc#1012382).
- irqchip/crossbar: Fix incorrect type of register size (bnc#1012382).
- iscsi-target: Make TASK_REASSIGN use proper se_cmd-&gt;cmd_kref (bnc#1012382).
- iscsi-target: fix memory leak in lio_target_tiqn_addtpg() (bnc#1012382).
- isdn: kcapi: avoid uninitialized data (bnc#1012382).
- iw_cxgb4: Only validate the MSN for successful completions (bnc#1012382).
- ixgbe: fix use of uninitialized padding (bnc#1012382).
- jump_label: Invoke jump_label_test() via early_initcall() (bnc#1012382).
- jump_label: Make it possible for arches to invoke jump_label_init() earlier (bsc#1068032).
- jump_labels: Allow array initialisers (bsc#1068032).
- kABI: protect struct bpf_map (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect struct t10_alua_tg_pt_gp (kabi).
- kabi fix for new hash_cred function (bsc#1012917).
- kabi/severities: do not care about stuff_RSB
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kaiser: Set _PAGE_NX only if supported (bnc#1012382).
- kbuild: add '-fno-stack-check' to kernel build options (bnc#1012382).
- kbuild: modversions for EXPORT_SYMBOL() for asm (bsc#1074621 bsc#1068032).
- kbuild: pkg: use --transform option to prefix paths in tar (bnc#1012382).
- kdb: Fix handling of kallsyms_symbol_next() return value (bnc#1012382).
- kernel/acct.c: fix the acct-&gt;needcheck check in check_free_space() (bnc#1012382).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (bnc#1012382).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (bnc#1012382).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (bnc#1012382).
- kernel: make groups_sort calling a responsibility group_info allocators (bnc#1012382).
- keys: add missing permission check for request_key() destination (bnc#1012382).
- kprobes/x86: Disable preemption in ftrace-based jprobes (bnc#1012382).
- kpti: Rename to PAGE_TABLE_ISOLATION (bnc#1012382).
- kpti: Report when enabled (bnc#1012382).
- kvm: Fix stack-out-of-bounds read in write_mmio (bnc#1012382).
- kvm: VMX: Fix enable VPID conditions (bnc#1012382).
- kvm: VMX: remove I/O port 0x80 bypass on Intel hosts (bnc#1012382).
- kvm: X86: Fix load RFLAGS w/o the fixed bit (bnc#1012382).
- kvm: arm/arm64: Fix occasional warning from the timer work function (bnc#1012382 bsc#988524).
- kvm: nVMX: VMCLEAR should not cause the vCPU to shut down (bnc#1012382).
- kvm: nVMX: reset nested_run_pending if the vCPU is going to be reset (bnc#1012382).
- kvm: pci-assign: do not map smm memory slot pages in vt-d page tables (bnc#1012382).
- kvm: s390: wire up bpb feature (bsc#1076806).
- kvm: vmx: Scrub hardware GPRs at VM-exit (bnc#1012382).
- kvm: x86: Add memory barrier on vmcs field lookup (bnc#1012382).
- kvm: x86: Exit to user-mode on #UD intercept when emulator requires (bnc#1012382).
- kvm: x86: correct async page present tracepoint (bnc#1012382).
- kvm: x86: fix RSM when PCID is non-zero (bnc#1012382).
- kvm: x86: inject exceptions produced by x86_decode_insn (bnc#1012382).
- kvm: x86: pvclock: Handle first-time write to pvclock-page contains random junk (bnc#1012382).
- l2tp: cleanup l2tp_tunnel_delete calls (bnc#1012382).
- lan78xx: Fix failure in USB Full Speed (bnc#1012382).
- lib/genalloc.c: make the avail variable an atomic_long_t (bnc#1012382).
- libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (bnc#1012382).
- libata: drop WARN from protocol error in ata_sff_qc_issue() (bnc#1012382).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bnc#1012382).
- md-cluster: free md_cluster_info if node leave cluster (bnc#1012382).
- media: dvb: i2c transfers over usb cannot be done from stack (bnc#1012382).
- mfd: cros ec: spi: Do not send first message too soon (bnc#1012382).
- mfd: twl4030-audio: Fix sibling-node lookup (bnc#1012382).
- mfd: twl6040: Fix child-node lookup (bnc#1012382).
- mlxsw: reg: Fix SPVM max record count (bnc#1012382).
- mlxsw: reg: Fix SPVMLR max record count (bnc#1012382).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1012382).
- mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP (bnc#1012382).
- mm: Handle 0 flags in _calc_vm_trans() macro (bnc#1012382).
- mm: Introduce lm_alias (bsc#1068032).
- mm: avoid returning VM_FAULT_RETRY from -&gt;page_mkwrite handlers (bnc#1012382).
- mm: drop unused pmdp_huge_get_and_clear_notify() (bnc#1012382).
- mmc: core: Do not leave the block driver in a suspended state (bnc#1012382).
- mmc: mediatek: Fixed bug where clock frequency could be set wrong (bnc#1012382).
- module: set __jump_table alignment to 8 (bnc#1012382).
- more bio_map_user_iov() leak fixes (bnc#1012382).
- mtd: nand: Fix writing mtdoops to nand flash (bnc#1012382).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1012382).
- net/appletalk: Fix kernel memory disclosure (bnc#1012382).
- net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y (bnc#1012382).
- net/packet: fix a race in packet_bind() and packet_notifier() (bnc#1012382).
- net: Allow neigh contructor functions ability to modify the primary_key (bnc#1012382).
- net: Do not allow negative values for busy_read and busy_poll sysctl interfaces (bnc#1012382).
- net: Fix double free and memory corruption in get_net_ns_by_id() (bnc#1012382).
- net: Resend IGMP memberships upon peer notification (bnc#1012382).
- net: bcmgenet: Power up the internal PHY before probing the MII (bnc#1012382).
- net: bcmgenet: correct MIB access of UniMAC RUNT counters (bnc#1012382).
- net: bcmgenet: correct the RBUF_OVFL_CNT and RBUF_ERR_CNT MIB values (bnc#1012382).
- net: bcmgenet: power down internal phy if open or resume fails (bnc#1012382).
- net: bcmgenet: reserved phy revisions must be checked first (bnc#1012382).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (bnc#1012382).
- net: core: fix module type in sock_diag_bind (bnc#1012382).
- net: fec: fix multicast filtering hardware setup (bnc#1012382).
- net: igmp: Use correct source address on IGMPv3 reports (bnc#1012382).
- net: igmp: fix source address check for IGMPv3 reports (bnc#1012382).
- net: initialize msg.msg_flags in recvfrom (bnc#1012382).
- net: ipv4: fix for a race condition in raw_sendmsg (bnc#1012382).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (bnc#1012382).
- net: mvneta: clear interface link status on port disable (bnc#1012382).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bnc#1012382).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (bnc#1012382).
- net: qdisc_pkt_len_init() should be more robust (bnc#1012382).
- net: qmi_wwan: Add USB IDs for MDM6600 modem on Motorola Droid 4 (bnc#1012382).
- net: qmi_wwan: add Sierra EM7565 1199:9091 (bnc#1012382).
- net: reevalulate autoflowlabel setting after sysctl setting (bnc#1012382).
- net: sctp: fix array overrun read on sctp_timer_tbl (bnc#1012382).
- net: stmmac: enable EEE in MII, GMII or RGMII only (bnc#1012382).
- net: systemport: Pad packet before inserting TSB (bnc#1012382).
- net: systemport: Utilize skb_put_padto() (bnc#1012382).
- net: tcp: close sock if net namespace is exiting (bnc#1012382).
- net: wimax/i2400m: fix NULL-deref at probe (bnc#1012382).
- netfilter: bridge: honor frag_max_size when refragmenting (bnc#1012382).
- netfilter: do not track fragmented packets (bnc#1012382).
- netfilter: ipvs: Fix inappropriate output of procfs (bnc#1012382).
- netfilter: nfnetlink_queue: fix secctx memory leak (bnc#1012382).
- netfilter: nfnetlink_queue: fix timestamp attribute (bsc#1074134).
- netfilter: nfnl_cthelper: Fix memory leak (bnc#1012382).
- netfilter: nfnl_cthelper: fix a race when walk the nf_ct_helper_hash table (bnc#1012382).
- netfilter: nfnl_cthelper: fix runtime expectation policy updates (bnc#1012382).
- netlink: add a start callback for starting a netlink dump (bnc#1012382).
- nfs: Do not take a reference on fl-&gt;fl_file for LOCK operation (bnc#1012382).
- nfs: Fix a typo in nfs_rename() (bnc#1012382).
- nfs: improve shinking of access cache (bsc#1012917).
- nfsd: Fix another OPEN stateid race (bnc#1012382).
- nfsd: Fix stateid races between OPEN and CLOSE (bnc#1012382).
- nfsd: Make init_open_stateid() a bit more whole (bnc#1012382).
- nfsd: auth: Fix gid sorting when rootsquash enabled (bnc#1012382).
- nfsd: fix nfsd_minorversion(.., NFSD_AVAIL) (bnc#1012382).
- nfsd: fix nfsd_reset_versions for NFSv4 (bnc#1012382).
- nfsv4.1 respect server's max size in CREATE_SESSION (bnc#1012382).
- nfsv4: Fix client recovery when server reboots multiple times (bnc#1012382).
- nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() (bnc#1012382).
- openrisc: fix issue handling 8 byte get_user calls (bnc#1012382).
- packet: fix crash in fanout_demux_rollover() (bnc#1012382).
- parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel (bnc#1012382).
- parisc: Hide Diva-built-in serial aux and graphics card (bnc#1012382).
- partially revert tipc improve link resiliency when rps is activated (bsc#1068038).
- pci / PM: Force devices to D0 in pci_pm_thaw_noirq() (bnc#1012382).
- pci/AER: Report non-fatal errors only to the affected endpoint (bnc#1012382).
- pci/PME: Handle invalid data when reading Root Status (bnc#1012382).
- pci: Avoid bus reset if bridge itself is broken (bnc#1012382).
- pci: Create SR-IOV virtfn/physfn links before attaching driver (bnc#1012382).
- pci: Detach driver before procfs &amp; sysfs teardown on device remove (bnc#1012382).
- perf symbols: Fix symbols__fixup_end heuristic for corner cases (bnc#1012382).
- perf test attr: Fix ignored test case result (bnc#1012382).
- perf: xgene: Add support for SoC PMU version 3 (bsc#1076809).
- perf: xgene: Include module.h (bsc#1076809).
- perf: xgene: Move PMU leaf functions into function pointer structure (bsc#1076809).
- perf: xgene: Parse PMU subnode from the match table (bsc#1076809).
- perf: xgene: Remove unnecessary managed resources cleanup (bsc#1076809).
- phy: work around 'phys' references to usb-nop-xceiv devices (bnc#1012382).
- pinctrl: adi2: Fix Kconfig build problem (bnc#1012382).
- pinctrl: st: add irq_request/release_resources callbacks (bnc#1012382).
- pipe: avoid round_pipe_size() nr_pages overflow on 32-bit (bnc#1012382).
- powerpc/64: Add macros for annotating the destination of rfid/hrfid (bsc#1068032, bsc#1075087).
- powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Add EX_SIZE definition for paca exception save areas (bsc#1068032, bsc#1075087).
- powerpc/64s: Add support for RFI flush of L1-D cache (bsc#1068032,  bsc#1075087).
- powerpc/64s: Allow control of RFI flush via debugfs (bsc#1068032, bsc#1075087).
- powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL (bsc#1068032, bsc#1075087).
- powerpc/64s: Simple RFI macro conversions (bsc#1068032, bsc#1075087).
- powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti (bsc#1068032, bsc#1075087).
- powerpc/64s: Wire up cpu_show_meltdown() (bsc#1068032).
- powerpc/asm: Allow including ppc_asm.h in asm files (bsc#1068032, bsc#1075087).
- powerpc/ipic: Fix status get and status clear (bnc#1012382).
- powerpc/perf/hv-24x7: Fix incorrect comparison in memord (bnc#1012382).
- powerpc/perf: Dereference BHRB entries safely (bsc#1066223).
- powerpc/powernv/cpufreq: Fix the frequency read by /proc/cpuinfo (bnc#1012382).
- powerpc/powernv/ioda2: Gracefully fail if too many TCE levels requested (bnc#1012382).
- powerpc/powernv: Check device-tree for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/pseries/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).
- powerpc/pseries: Introduce H_GET_CPU_CHARACTERISTICS (bsc#1068032, bsc#1075087).
- powerpc/pseries: Query hypervisor for RFI flush settings (bsc#1068032,  bsc#1075087).
- powerpc/pseries: include linux/types.h in asm/hvcall.h (bsc#1068032, bsc#1075087).
- powerpc/pseries: rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Add DEBUG_RFI config option (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Make setup_rfi_flush() not __init (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move RFI flush fields out of the paca (unbreak kABI) (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: Move the logic to avoid a redo into the sysfs code (bsc#1068032, bsc#1075087).
- powerpc/rfi-flush: prevent crash when changing flush type to fallback after system boot (bsc#1068032, bsc#1075087).
- ppp: Destroy the mutex when cleanup (bnc#1012382).
- pppoe: take -&gt;needed_headroom of lower device into account on xmit (bnc#1012382).
- pti: unbreak EFI (bsc#1074709).
- r8152: fix the list rx_done may be used without initialization (bnc#1012382).
- r8152: prevent the driver from transmitting packets with carrier off (bnc#1012382).
- r8169: fix memory corruption on retrieval of hardware statistics (bnc#1012382).
- raid5: Set R5_Expanded on parity devices as well as data (bnc#1012382).
- ravb: Remove Rx overflow log messages (bnc#1012382).
- rbd: set max_segments to USHRT_MAX (bnc#1012382).
- rdma/cma: Avoid triggering undefined behavior (bnc#1012382).
- rdma/iser: Fix possible mr leak on device removal event (bnc#1012382).
- rds: Fix NULL pointer dereference in __rds_rdma_map (bnc#1012382).
- rds: Heap OOB write in rds_message_alloc_sgs() (bnc#1012382).
- rds: null pointer dereference in rds_atomic_free_op (bnc#1012382).
- regulator: Try to resolve regulators supplies on registration (bsc#1074847).
- regulator: core: Rely on regulator_dev_release to free constraints (bsc#1074847).
- regulator: da9063: Return an error code on probe failure (bsc#1074847).
- regulator: pwm: Fix regulator ramp delay for continuous mode (bsc#1074847).
- rfi-flush: Make DEBUG_RFI a CONFIG option (bsc#1068032, bsc#1075087).
- ring-buffer: Mask out the info bits when returning buffer page length (bnc#1012382).
- route: also update fnhe_genid when updating a route cache (bnc#1012382).
- route: update fnhe_expires for redirect when the fnhe exists (bnc#1012382).
- rtc: cmos: Initialize hpet timer before irq is registered (bsc#1077592).
- rtc: pcf8563: fix output clock rate (bnc#1012382).
- rtc: pl031: make interrupt optional (bnc#1012382).
- rtc: set the alarm to the next expiring timer (bnc#1012382).
- s390/pci: do not require AIS facility (bnc#1012382).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1012382).
- s390/runtime instrumentation: simplify task exit handling (bnc#1012382).
- s390: always save and restore all registers on context switch (bnc#1012382).
- s390: fix compat system call table (bnc#1012382).
- sch_dsmark: fix invalid skb_cow() usage (bnc#1012382).
- sched/deadline: Make sure the replenishment timer fires in the next period (bnc#1012382).
- sched/deadline: Throttle a constrained deadline task activated after the deadline (bnc#1012382).
- sched/deadline: Use deadline instead of period when calculating overflow (bnc#1012382).
- sched/deadline: Use the revised wakeup rule for suspending constrained dl tasks (bnc#1012382).
- sched/deadline: Zero out positive runtime after throttling constrained tasks (git-fixes).
- sched/rt: Do not pull from current CPU if only one CPU to pull (bnc#1022476).
- scsi: bfa: integer overflow in debugfs (bnc#1012382).
- scsi: check for device state in __scsi_remove_target() (bsc#1072589).
- scsi: cxgb4i: fix Tx skb leak (bnc#1012382).
- scsi: fixup kernel warning during rmmod() (bsc#1052360).
- scsi: hpsa: cleanup sas_phy structures in sysfs when unloading (bnc#1012382).
- scsi: hpsa: destroy sas transport properties before scsi_host (bnc#1012382).
- scsi: libsas: align sata_device's rps_resp on a cacheline (bnc#1012382).
- scsi: lpfc: Fix PT2PT PRLI reject (bnc#1012382).
- scsi: lpfc: Fix crash during Hardware error recovery on SLI3 adapters (bnc#1012382).
- scsi: lpfc: Fix secure firmware updates (bnc#1012382).
- scsi: lpfc: PLOGI failures during NPIV testing (bnc#1012382).
- scsi: mpt3sas: Fix IO error occurs on pulling out a drive from RAID1 volume created on two SATA drive (bnc#1012382).
- scsi: sd: change allow_restart to bool in sysfs interface (bnc#1012382).
- scsi: sd: change manage_start_stop to bool in sysfs interface (bnc#1012382).
- scsi: sg: disable SET_FORCE_LOW_DMA (bnc#1012382).
- scsi: sr: wait for the medium to become ready (bsc#1048585).
- sctp: Replace use of sockets_allocated with specified macro (bnc#1012382).
- sctp: do not allow the v4 socket to bind a v4mapped v6 address (bnc#1012382).
- sctp: do not free asoc when it is already dead in sctp_sendmsg (bnc#1012382).
- sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (bnc#1012382).
- sctp: use the right sk after waking up from wait_buf sleep (bnc#1012382).
- selftest/powerpc: Fix false failures for skipped tests (bnc#1012382).
- selftests/x86/ldt_get: Add a few additional tests for limits (bnc#1012382).
- selftests/x86: Add test_vsyscall (bnc#1012382).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bnc#1012382).
- serial: 8250_pci: Add Amazon PCI serial device ID (bnc#1012382).
- series.conf: fix wrong bsc reference
- series.conf: whitespace cleanup
- sfc: do not warn on successful change of MAC (bnc#1012382).
- sh_eth: fix SH7757 GEther initialization (bnc#1012382).
- sh_eth: fix TSU resource handling (bnc#1012382).
- sit: update frag_off info (bnc#1012382).
- sock: free skb in skb_complete_tx_timestamp on error (bnc#1012382).
- sparc64/mm: set fields in deferred pages (bnc#1012382).
- spi: sh-msiof: Fix DMA transfer size check (bnc#1012382).
- spi: xilinx: Detect stall with Unknown commands (bnc#1012382).
- spi_ks8995: fix 'BUG: key accdaa28 not in .data!' (bnc#1012382).
- staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl (bnc#1012382).
- sunrpc: Fix rpc_task_begin trace point (bnc#1012382).
- sunrpc: add RPCSEC_GSS hash_cred() function (bsc#1012917).
- sunrpc: add auth_unix hash_cred() function (bsc#1012917).
- sunrpc: add generic_auth hash_cred() function (bsc#1012917).
- sunrpc: add hash_cred() function to rpc_authops struct (bsc#1012917).
- sunrpc: replace generic auth_cred hash with auth-specific function (bsc#1012917).
- sunrpc: use supplimental groups in auth hash (bsc#1012917).
- sunxi-rsb: Include OF based modalias in device uevent (bnc#1012382).
- sysfs/cpu: Add vulnerability folder (bnc#1012382).
- sysfs/cpu: Fix typos in vulnerability documentation (bnc#1012382).
- sysfs: spectre_v2, handle spec_ctrl (bsc#1075994 bsc#1075091).
- sysrq : fix Show Regs call trace on ARM (bnc#1012382).
- target/file: Do not return error for UNMAP if length is zero (bnc#1012382).
- target/iscsi: Fix a race condition in iscsit_add_reject_from_cmd() (bnc#1012382).
- target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK (bnc#1012382).
- target: Use system workqueue for ALUA transitions (bnc#1012382).
- target: fix ALUA transition timeout handling (bnc#1012382).
- target: fix race during implicit transition work flushes (bnc#1012382).
- target:fix condition return in core_pr_dump_initiator_port() (bnc#1012382).
- tcp md5sig: Use skb's saddr when replying to an incoming segment (bnc#1012382).
- tcp: __tcp_hdrlen() helper (bnc#1012382).
- tcp: correct memory barrier usage in tcp_check_space() (bnc#1012382).
- tcp: fix under-evaluated ssthresh in TCP Vegas (bnc#1012382).
- tg3: Fix rx hang on MTU change with 5717/5719 (bnc#1012382).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bnc#1012382).
- thermal: hisilicon: Handle return value of clk_prepare_enable (bnc#1012382).
- tipc: fix cleanup at module unload (bnc#1012382).
- tipc: fix memory leak in tipc_accept_from_sock() (bnc#1012382).
- tipc: improve link resiliency when rps is activated (bsc#1068038).
- tracing: Allocate mask_str buffer dynamically (bnc#1012382).
- tracing: Fix converting enum's from the map in trace_event_eval_update() (bnc#1012382).
- tracing: Fix crash when it fails to alloc ring buffer (bnc#1012382).
- tracing: Fix possible double free on failure of allocating trace buffer (bnc#1012382).
- tracing: Remove extra zeroing out of the ring buffer page (bnc#1012382).
- tty fix oops when rmmod 8250 (bnc#1012382).
- uas: Always apply US_FL_NO_ATA_1X quirk to Seagate devices (bnc#1012382).
- uas: ignore UAS for Norelsys NS1068(X) chips (bnc#1012382).
- udf: Avoid overflow when session starts at large offset (bnc#1012382).
- um: link vmlinux with -no-pie (bnc#1012382).
- usb: Add device quirk for Logitech HD Pro Webcam C925e (bnc#1012382).
- usb: Fix off by one in type-specific length check of BOS SSP capability (git-fixes).
- usb: Increase usbfs transfer limit (bnc#1012382).
- usb: add RESET_RESUME for ELSA MicroLink 56K (bnc#1012382).
- usb: core: Add type-specific length check of BOS descriptors (bnc#1012382).
- usb: core: prevent malicious bNumInterfaces overflow (bnc#1012382).
- usb: devio: Prevent integer overflow in proc_do_submiturb() (bnc#1012382).
- usb: fix usbmon BUG trigger (bnc#1012382).
- usb: gadget: configs: plug memory leak (bnc#1012382).
- usb: gadget: f_uvc: Sanity check wMaxPacketSize for SuperSpeed (bnc#1012382).
- usb: gadget: ffs: Forbid usb_ep_alloc_request from sleeping (bnc#1012382).
- usb: gadget: udc: remove pointer dereference after free (bnc#1012382).
- usb: gadgetfs: Fix a potential memory leak in 'dev_config()' (bnc#1012382).
- usb: hub: Cycle HUB power when initialization fails (bnc#1012382).
- usb: misc: usb3503: make sure reset is low for at least 100us (bnc#1012382).
- usb: musb: da8xx: fix babble condition handling (bnc#1012382).
- usb: phy: isp1301: Add OF device ID table (bnc#1012382).
- usb: phy: isp1301: Fix build warning when CONFIG_OF is disabled (git-fixes).
- usb: phy: tahvo: fix error handling in tahvo_usb_probe() (bnc#1012382).
- usb: quirks: Add no-lpm quirk for KY-688 USB 3.1 Type-C Hub (bnc#1012382).
- usb: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ (bnc#1012382).
- usb: serial: cp210x: add new device ID ELV ALC 8xxx (bnc#1012382).
- usb: serial: ftdi_sio: add id for Airbus DS P8GR (bnc#1012382).
- usb: serial: option: add Quectel BG96 id (bnc#1012382).
- usb: serial: option: add support for Telit ME910 PID 0x1101 (bnc#1012382).
- usb: serial: option: adding support for YUGA CLM920-NC5 (bnc#1012382).
- usb: serial: qcserial: add Sierra Wireless EM7565 (bnc#1012382).
- usb: uas and storage: Add US_FL_BROKEN_FUA for another JMicron JMS567 ID (bnc#1012382).
- usb: usbfs: Filter flags passed in from user space (bnc#1012382).
- usb: usbip: Fix possible deadlocks reported by lockdep (bnc#1012382).
- usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 (bnc#1012382).
- usb: xhci: fix panic in xhci_free_virt_devices_depth_first (bnc#1012382).
- usbip: Fix implicit fallthrough warning (bnc#1012382).
- usbip: Fix potential format overflow in userspace tools (bnc#1012382).
- usbip: fix stub_rx: get_pipe() to validate endpoint number (bnc#1012382).
- usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input (bnc#1012382).
- usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer (bnc#1012382).
- usbip: fix usbip bind writing random string after command in match_busid (bnc#1012382).
- usbip: prevent leaking socket pointer address in messages (bnc#1012382).
- usbip: prevent vhci_hcd driver from leaking a socket pointer address (bnc#1012382).
- usbip: remove kernel addresses from usb device and urb debug msgs (bnc#1012382).
- usbip: stub: stop printing kernel pointer addresses in messages (bnc#1012382).
- usbip: vhci: stop printing kernel pointer addresses in messages (bnc#1012382).
- userfaultfd: selftest: vm: allow to build in vm/ directory (bnc#1012382).
- userfaultfd: shmem: __do_fault requires VM_FAULT_NOPAGE (bnc#1012382).
- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bnc#1012382).
- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bnc#1012382).
- virtio: release virtio index when fail to device_register (bnc#1012382).
- vmxnet3: repair memory leak (bnc#1012382).
- vsyscall: Fix permissions for emulate mode with KAISER/PTI (bnc#1012382).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bnc#1012382).
- vti6: Do not report path MTU below IPV6_MIN_MTU (bnc#1012382).
- vti6: fix device register to report IFLA_INFO_KIND (bnc#1012382).
- workqueue: trigger WARN if queue_delayed_work() is called with NULL @wq (bnc#1012382).
- writeback: fix memory leak in wb_queue_work() (bnc#1012382).
- x.509: fix buffer overflow detection in sprint_oid() (bsc#1075078).
- x.509: reject invalid BIT STRING for subjectPublicKey (bnc#1012382).
- x509: fix printing uninitialized stack memory when OID is empty (bsc#1075078).
- x86/Documentation: Add PTI description (bnc#1012382).
- x86/PCI: Make broadcom_postcore_init() check acpi_disabled (bnc#1012382).
- x86/acpi: Handle SCI interrupts above legacy space gracefully (bsc#1068984).
- x86/acpi: Reduce code duplication in mp_override_legacy_irq() (bsc#1068984).
- x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm (bnc#1012382).
- x86/alternatives: Fix optimize_nops() checking (bnc#1012382).
- x86/apic/vector: Fix off by one in error path (bnc#1012382).
- x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels (bnc#1012382).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1068032).
- x86/cpu, x86/pti: Do not enable PTI on AMD processors (bnc#1012382).
- x86/cpu: Factor out application of forced CPU caps (bnc#1012382).
- x86/cpu: Implement CPU vulnerabilites sysfs functions (bnc#1012382).
- x86/cpu: Merge bugs.c and bugs_64.c (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- x86/efi-bgrt: Fix kernel panic when mapping BGRT data (bnc#1012382).
- x86/efi-bgrt: Replace early_memremap() with memremap() (bnc#1012382).
- x86/efi: Build our own page table structures (bnc#1012382).
- x86/efi: Hoist page table switching code into efi_call_virt() (bnc#1012382).
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt() (bnc#1012382).
- x86/hpet: Prevent might sleep splat on resume (bnc#1012382).
- x86/kasan: Clear kasan_zero_page after TLB flush (bnc#1012382).
- x86/kasan: Write protect kasan zero shadow (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading further with LLC size check (bnc#1012382).
- x86/microcode/intel: Extend BDW late-loading with a revision check (bnc#1012382).
- x86/microcode/intel: Fix BDW late-loading revision check (bnc#1012382).
- x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier (git-fixes).
- x86/mm/pat: Ensure cpa-&gt;pfn only contains page frame numbers (bnc#1012382).
- x86/mm: Disable PCID on 32-bit kernels (bnc#1012382).
- x86/pti/efi: broken conversion from efi to kernel page table (bnc#1012382).
- x86/pti: Document fix wrong index (bnc#1012382).
- x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
- x86/retpolines/spec_ctrl: disable IBRS on !SKL if retpolines are active (bsc#1068032).
- x86/smpboot: Remove stale TLB flush invocations (bnc#1012382).
- x86/spectre_v2: fix ordering in IBRS initialization (bsc#1075994 bsc#1075091).
- x86/spectre_v2: nospectre_v2 means nospec too (bsc#1075994 bsc#1075091).
- x86/tlb: Drop the _GPL from the cpu_tlbstate export (bnc#1012382).
- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (bnc#1012382).
- xen-netfront: Improve error handling during initialization (bnc#1012382).
- xen-netfront: avoid crashing on resume after a failure in talk_to_netback() (bnc#1012382).
- xfrm: Copy policy family in clone_policy (bnc#1012382).
- xfs: Add infrastructure needed for error propagation during buffer IO failure (bsc#1068569).
- xfs: Properly retry failed inode items in case of error during buffer writeback (bsc#1068569).
- xfs: add 'fail at unmount' error handling configuration (bsc#1068569).
- xfs: add configurable error support to metadata buffers (bsc#1068569).
- xfs: add configuration handlers for specific errors (bsc#1068569).
- xfs: add configuration of error failure speed (bsc#1068569).
- xfs: address kabi for xfs buffer retry infrastructure (kabi).
- xfs: configurable error behavior via sysfs (bsc#1068569).
- xfs: fix incorrect extent state in xfs_bmap_add_extent_unwritten_real (bnc#1012382).
- xfs: fix log block underflow during recovery cycle verification (bnc#1012382).
- xfs: fix up inode32/64 (re)mount handling (bsc#1069160).
- xfs: introduce metadata IO error class (bsc#1068569).
- xfs: introduce table-based init for error behaviors (bsc#1068569).
- xfs: remove xfs_trans_ail_delete_bulk (bsc#1068569).
- xhci: Do not add a virt_dev to the devs array before it's fully allocated (bnc#1012382).
- xhci: Fix ring leak in failure path of xhci_alloc_virt_device() (bnc#1012382).
- xhci: plat: Register shutdown for xhci_plat (bnc#1012382).
- zram: set physical queue limits to avoid array out of bounds accesses (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012917">SUSE bug 1012917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019784">SUSE bug 1019784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022476">SUSE bug 1022476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038078">SUSE bug 1038078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038085">SUSE bug 1038085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043652">SUSE bug 1043652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048585">SUSE bug 1048585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052360">SUSE bug 1052360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060279">SUSE bug 1060279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066842">SUSE bug 1066842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068038">SUSE bug 1068038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068984">SUSE bug 1068984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069160">SUSE bug 1069160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070799">SUSE bug 1070799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072163">SUSE bug 1072163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072484">SUSE bug 1072484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072589">SUSE bug 1072589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073229">SUSE bug 1073229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074134">SUSE bug 1074134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074392">SUSE bug 1074392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074621">SUSE bug 1074621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074709">SUSE bug 1074709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074847">SUSE bug 1074847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075066">SUSE bug 1075066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075078">SUSE bug 1075078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075627">SUSE bug 1075627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076806">SUSE bug 1076806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076809">SUSE bug 1076809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076872">SUSE bug 1076872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076899">SUSE bug 1076899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077068">SUSE bug 1077068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077592">SUSE bug 1077592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078526">SUSE bug 1078526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078681">SUSE bug 1078681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963844">SUSE bug 963844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988524">SUSE bug 988524</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80254" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1028103" ref_url="https://bugzilla.suse.com/1028103" source="BUGZILLA"/>
		<reference ref_id="1035807" ref_url="https://bugzilla.suse.com/1035807" source="BUGZILLA"/>
		<reference ref_id="1036457" ref_url="https://bugzilla.suse.com/1036457" source="BUGZILLA"/>
		<reference ref_id="1079600" ref_url="https://bugzilla.suse.com/1079600" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244/" source="CVE"/>
		<reference ref_id="CVE-2017-7864" ref_url="https://www.suse.com/security/cve/CVE-2017-7864/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<description>

  
This update for freetype2 fixes the following security issues:

- CVE-2016-10244: Make sure that the parse_charstrings function in
  type1/t1load.c does ensure that a font contains a glyph name to prevent a DoS
  through a heap-based buffer over-read or possibly have unspecified other
  impact via a crafted file (bsc#1028103)
- CVE-2017-8105: Fix an out-of-bounds write caused by a heap-based
  buffer overflow related to the t1_decoder_parse_charstrings function in
  psaux/t1decode.ca (bsc#1035807)
- CVE-2017-8287: an out-of-bounds write caused by a heap-based buffer
  overflow related to the t1_builder_close_contour function in psaux/psobjs.c
  (bsc#1036457)
- Fix several integer overflow issues in truetype/ttinterp.c (bsc#1079600)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-09"/>
	<updated date="2018-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079600">SUSE bug 1079600</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7864/">CVE-2017-7864</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550672" comment="ft2demos-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550673" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550674" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80255" version="1" class="patch">
	<metadata>
		<title>Security update for ipsec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1047443" ref_url="https://bugzilla.suse.com/1047443" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003724.html" source="SUSE-SU"/>
		<description>
This update for ipsec-tools fixes one issue.

This security issue was fixed:

- CVE-2016-10396: The racoon daemon contained a remotely exploitable
  computational-complexity attack when parsing and storing ISAKMP fragments that
  allowed a remote attacker to exhaust computational resources on the remote
  endpoint by repeatedly sending ISAKMP fragment packets in a particular order
  (bsc#1047443).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-12"/>
	<updated date="2018-02-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550675" comment="ipsec-tools-0.8.0-19.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80256" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550676" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550677" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80257" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<description>

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)

* Class Libraries:

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10930 CVE-2018-3183
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
  - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

  - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
  - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
  - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
  - IJ10931 CVE-2018-3169
  - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
  - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
  - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
  - IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

  - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
  - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
  - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

  - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

  - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
  - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
  - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
  - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER

* z/OS Extentions

  - PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM

* Java Virtual Machine

  - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
  - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

  - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE
  - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
  - IJ08205 CRASH WHILE COMPILING
  - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80258" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80259" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009545986" comment="git-core-2.12.3-27.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80260" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004964.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536695" comment="kgraft-patch-4_4_120-92_70-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80261" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536696" comment="kgraft-patch-4_4_121-92_73-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80262" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536697" comment="kgraft-patch-4_4_121-92_80-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80263" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536698" comment="kgraft-patch-4_4_103-92_56-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80264" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536699" comment="kgraft-patch-4_4_103-92_53-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80265" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536700" comment="kgraft-patch-4_4_114-92_67-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80266" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536701" comment="kgraft-patch-4_4_114-92_64-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80267" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550678" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550679" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550680" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550681" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550682" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550683" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550684" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550685" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550686" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550687" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550688" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550689" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550690" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550691" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550692" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80268" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80269" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-22"/>
	<updated date="2018-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80270" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following security vulnerabilities:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80271" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1037930" ref_url="https://bugzilla.suse.com/1037930" source="BUGZILLA"/>
		<reference ref_id="1051791" ref_url="https://bugzilla.suse.com/1051791" source="BUGZILLA"/>
		<reference ref_id="1073990" ref_url="https://bugzilla.suse.com/1073990" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="1079036" ref_url="https://bugzilla.suse.com/1079036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)

Non security bugs fixed:

- Release read lock after resetting timeout (bsc#1073990)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-15"/>
	<updated date="2018-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073990">SUSE bug 1073990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80272" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1065641" ref_url="https://bugzilla.suse.com/1065641" source="BUGZILLA"/>
		<reference ref_id="1079798" ref_url="https://bugzilla.suse.com/1079798" source="BUGZILLA"/>
		<reference ref_id="1079799" ref_url="https://bugzilla.suse.com/1079799" source="BUGZILLA"/>
		<reference ref_id="1079800" ref_url="https://bugzilla.suse.com/1079800" source="BUGZILLA"/>
		<reference ref_id="1079801" ref_url="https://bugzilla.suse.com/1079801" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00030.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the security following issues:

- The Quagga BGP daemon contained a bug in the AS_PATH size calculation that
  could have been exploited to facilitate a remote denial-of-service attack via
  specially crafted BGP UPDATE messages. [CVE-2017-16227, bsc#1065641]

- The Quagga BGP daemon did not check whether data sent to peers via NOTIFY had
  an invalid attribute length. It was possible to exploit this issue and cause
  the bgpd process to leak sensitive information over the network to a
  configured peer. [CVE-2018-5378, bsc#1079798]

- The Quagga BGP daemon used to double-free memory when processing certain
  forms of UPDATE messages. This issue could be exploited by sending an
  optional/transitive UPDATE attribute that all conforming eBGP speakers should
  pass along. Consequently, a single UPDATE message could have affected many
  bgpd processes across a wide area of a network. Through this vulnerability,
  attackers could potentially have taken over control of affected bgpd
  processes remotely. [CVE-2018-5379, bsc#1079799]

- It was possible to overrun internal BGP code-to-string conversion tables in
  the Quagga BGP daemon. Configured peers could have exploited this issue and
  cause bgpd to emit debug and warning messages into the logs that would
  contained arbitrary bytes. [CVE-2018-5380, bsc#1079800]

- The Quagga BGP daemon could have entered an infinite loop if sent an invalid
  OPEN message by a configured peer. If this issue was exploited, then bgpd
  would cease to respond to any other events. BGP sessions would have been
  dropped and not be reestablished. The CLI interface would have been
  unresponsive. The bgpd daemon would have stayed in this state until
  restarted. [CVE-2018-5381, bsc#1079801]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80273" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077724" ref_url="https://bugzilla.suse.com/1077724" source="BUGZILLA"/>
		<reference ref_id="1077725" ref_url="https://bugzilla.suse.com/1077725" source="BUGZILLA"/>
		<reference ref_id="1077978" ref_url="https://bugzilla.suse.com/1077978" source="BUGZILLA"/>
		<reference ref_id="984650" ref_url="https://bugzilla.suse.com/984650" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<reference ref_id="CVE-2018-5996" ref_url="https://www.suse.com/security/cve/CVE-2018-5996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<description>

  
This update for p7zip fixes the following issues:

Security issues fixed:

- CVE-2016-1372: Fixed multiple vulnerabilities when processing crafted 7z files (bsc#984650)
- CVE-2017-17969: Fixed a heap-based buffer overflow in a shrink decoder (bsc#1077725)
- CVE-2018-5996: Fixed memory corruption in RAR decompression. The complete RAR decoder was removed as it also has license issues (bsc#1077724 bsc#1077978)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077724">SUSE bug 1077724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077978">SUSE bug 1077978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5996/">CVE-2018-5996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550716" comment="p7zip-9.20.1-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80274" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1075608" ref_url="https://bugzilla.suse.com/1075608" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003739.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes one issue.

This security issue was fixed:

- CVE-2017-15132: An abort of SASL authentication resulted in a memory leak in
  dovecot's auth client used by login processes. The leak has impact in high
  performance configuration where same login processes are reused and can cause
  the process to crash due to memory exhaustion (bsc#1075608).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-16"/>
	<updated date="2018-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1075608">SUSE bug 1075608</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550717" comment="dovecot22-2.2.31-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550718" comment="dovecot22-backend-mysql-2.2.31-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550719" comment="dovecot22-backend-pgsql-2.2.31-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550720" comment="dovecot22-backend-sqlite-2.2.31-19.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80275" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1035442" ref_url="https://bugzilla.suse.com/1035442" source="BUGZILLA"/>
		<reference ref_id="1051729" ref_url="https://bugzilla.suse.com/1051729" source="BUGZILLA"/>
		<reference ref_id="1061081" ref_url="https://bugzilla.suse.com/1061081" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1070158" ref_url="https://bugzilla.suse.com/1070158" source="BUGZILLA"/>
		<reference ref_id="1070159" ref_url="https://bugzilla.suse.com/1070159" source="BUGZILLA"/>
		<reference ref_id="1070160" ref_url="https://bugzilla.suse.com/1070160" source="BUGZILLA"/>
		<reference ref_id="1070163" ref_url="https://bugzilla.suse.com/1070163" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1076116" ref_url="https://bugzilla.suse.com/1076116" source="BUGZILLA"/>
		<reference ref_id="1076180" ref_url="https://bugzilla.suse.com/1076180" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595/" source="CVE"/>
		<reference ref_id="CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563/" source="CVE"/>
		<reference ref_id="CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564/" source="CVE"/>
		<reference ref_id="CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565/" source="CVE"/>
		<reference ref_id="CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via
  side effects of speculative execution, aka 'Spectre' and 'Meltdown' attacks
  (bsc#1074562, bsc#1068032)
- CVE-2017-15595: x86 PV guest OS users were able to cause a DoS (unbounded
  recursion, stack consumption, and hypervisor crash) or possibly gain privileges
  via crafted page-table stacking (bsc#1061081)
- CVE-2017-17566: Prevent PV guest OS users to cause a denial of service (host
  OS crash) or gain host OS privileges in shadow mode by mapping a certain
  auxiliary page (bsc#1070158).
- CVE-2017-17563: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging an incorrect mask for
  reference-count overflow checking in shadow mode (bsc#1070159).
- CVE-2017-17564: Prevent guest OS users to cause a denial of service (host OS
  crash) or gain host OS privileges by leveraging incorrect error handling for
  reference counting in shadow mode (bsc#1070160).
- CVE-2017-17565: Prevent PV guest OS users to cause a denial of service (host
  OS crash) if shadow mode and log-dirty mode are in place, because of an
  incorrect assertion related to M2P (bsc#1070163).
- CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged
  users to cause a denial of service (out-of-bounds read and QEMU process crash)
  by leveraging improper memory address validation (bsc#1076116).
- CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest
  privileged users to cause a denial of service (out-of-bounds array access and
  QEMU process crash) via vectors related to negative pitch (bsc#1076180).

These non-security issues were fixed:

- bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2
- bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100
  seconds. If many domUs shutdown in parallel the backends couldn't keep up
- bsc#1027519: Added several upstream patches
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-19"/>
	<updated date="2018-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035442">SUSE bug 1035442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051729">SUSE bug 1051729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80276" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003746.html" source="SUSE-SU"/>
		<description>

  
This update for postgresql96 to version 9.6.7 fixes the following issues:

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)

A full changelog is available here:

	https://www.postgresql.org/docs/9.6/static/release-9-6-7.html

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550724" comment="libecpg6-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550725" comment="libpq5-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550726" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550727" comment="postgresql96-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550728" comment="postgresql96-contrib-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533185" comment="postgresql96-docs-9.6.7-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550729" comment="postgresql96-server-9.6.7-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80277" version="1" class="patch">
	<metadata>
		<title>Security update for libdb-4_8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1043886" ref_url="https://bugzilla.suse.com/1043886" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003748.html" source="SUSE-SU"/>
		<description>
This update for libdb-4_8 fixes the following issues:

- A DB_CONFIG file in the current working directory allowed local
  users to obtain sensitive information via a symlink attack
  involving a setgid or setuid application using libdb-4_8. (bsc#1043886)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-21"/>
	<updated date="2018-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043886">SUSE bug 1043886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550730" comment="db48-utils-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550731" comment="libdb-4_8-4.8.30-29.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550732" comment="libdb-4_8-32bit-4.8.30-29.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80278" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1023415" ref_url="https://bugzilla.suse.com/1023415" source="BUGZILLA"/>
		<reference ref_id="1059061" ref_url="https://bugzilla.suse.com/1059061" source="BUGZILLA"/>
		<reference ref_id="1073935" ref_url="https://bugzilla.suse.com/1073935" source="BUGZILLA"/>
		<reference ref_id="1076119" ref_url="https://bugzilla.suse.com/1076119" source="BUGZILLA"/>
		<reference ref_id="987170" ref_url="https://bugzilla.suse.com/987170" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
		<description>
 This update for dhcp fixes several issues.

This security issue was fixed:

- CVE-2017-3144: OMAPI code didn't free socket descriptors when empty message
  is received allowing DoS (bsc#1076119).

These non-security issues were fixed:

- Optimized if and when DNS client context and ports are initted (bsc#1073935)
- Relax permission of dhclient-script for libguestfs (bsc#987170)
- Modify dhclient-script to handle static route updates (bsc#1023415).
- Use only the 12 least significant bits of an inbound packet's TCI value as the VLAN ID
  to fix some packages being wrongly discarded by the Linux packet filter. (bsc#1059061)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-23"/>
	<updated date="2018-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023415">SUSE bug 1023415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059061">SUSE bug 1059061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073935">SUSE bug 1073935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987170">SUSE bug 987170</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550733" comment="dhcp-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550734" comment="dhcp-client-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550735" comment="dhcp-relay-4.3.3-10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550736" comment="dhcp-server-4.3.3-10.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80279" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1057974" ref_url="https://bugzilla.suse.com/1057974" source="BUGZILLA"/>
		<reference ref_id="1068588" ref_url="https://bugzilla.suse.com/1068588" source="BUGZILLA"/>
		<reference ref_id="1071224" ref_url="https://bugzilla.suse.com/1071224" source="BUGZILLA"/>
		<reference ref_id="1071311" ref_url="https://bugzilla.suse.com/1071311" source="BUGZILLA"/>
		<reference ref_id="1075801" ref_url="https://bugzilla.suse.com/1075801" source="BUGZILLA"/>
		<reference ref_id="1077925" ref_url="https://bugzilla.suse.com/1077925" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
		<description>

  
This update for systemd fixes the following issues:

Security issue fixed:

- CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are
  hardlinked, unless protected_hardlinks sysctl is on. This could be used
  by local attackers to gain privileges (bsc#1077925)

Non Security issues fixed:

- core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
- cryptsetup-generator: run cryptsetup service before swap unit (#5480)
- udev-rules: all values can contain escaped double quotes now (#6890)
- strv: fix buffer size calculation in strv_join_quoted()
- tmpfiles: change ownership of symlinks too
- stdio-bridge: Correctly propagate error
- stdio-bridge: remove dead code
- remove bus-proxyd (bsc#1057974)
- core/timer: Prevent timer looping when unit cannot start (bsc#1068588)

- Make systemd-timesyncd use the openSUSE NTP servers by default
  Previously systemd-timesyncd used the Google Public NTP servers
  time{1..4}.google.com

- Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224)
  But we still ship a copy in /var.
  Users who want to use tmpfs on /tmp are supposed to add a symlink in
  /etc/ pointing to the copy shipped in /var.
  To support the update path we automatically create the symlink if
  tmp.mount in use is located in /usr.

- Enable systemd-networkd on Leap distros only (bsc#1071311)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-02-26"/>
	<updated date="2018-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057974">SUSE bug 1057974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068588">SUSE bug 1068588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071224">SUSE bug 1071224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071311">SUSE bug 1071311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075801">SUSE bug 1075801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550737" comment="libsystemd0-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550738" comment="libsystemd0-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550739" comment="libudev1-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550740" comment="libudev1-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550741" comment="systemd-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550742" comment="systemd-32bit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009518969" comment="systemd-bash-completion-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550743" comment="systemd-sysvinit-228-150.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550744" comment="udev-228-150.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80280" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042824" ref_url="https://bugzilla.suse.com/1042824" source="BUGZILLA"/>
		<reference ref_id="1042911" ref_url="https://bugzilla.suse.com/1042911" source="BUGZILLA"/>
		<reference ref_id="1048110" ref_url="https://bugzilla.suse.com/1048110" source="BUGZILLA"/>
		<reference ref_id="1048272" ref_url="https://bugzilla.suse.com/1048272" source="BUGZILLA"/>
		<reference ref_id="1049374" ref_url="https://bugzilla.suse.com/1049374" source="BUGZILLA"/>
		<reference ref_id="1049375" ref_url="https://bugzilla.suse.com/1049375" source="BUGZILLA"/>
		<reference ref_id="1050048" ref_url="https://bugzilla.suse.com/1050048" source="BUGZILLA"/>
		<reference ref_id="1050119" ref_url="https://bugzilla.suse.com/1050119" source="BUGZILLA"/>
		<reference ref_id="1050122" ref_url="https://bugzilla.suse.com/1050122" source="BUGZILLA"/>
		<reference ref_id="1050126" ref_url="https://bugzilla.suse.com/1050126" source="BUGZILLA"/>
		<reference ref_id="1050132" ref_url="https://bugzilla.suse.com/1050132" source="BUGZILLA"/>
		<reference ref_id="1050617" ref_url="https://bugzilla.suse.com/1050617" source="BUGZILLA"/>
		<reference ref_id="1052207" ref_url="https://bugzilla.suse.com/1052207" source="BUGZILLA"/>
		<reference ref_id="1052248" ref_url="https://bugzilla.suse.com/1052248" source="BUGZILLA"/>
		<reference ref_id="1052251" ref_url="https://bugzilla.suse.com/1052251" source="BUGZILLA"/>
		<reference ref_id="1052254" ref_url="https://bugzilla.suse.com/1052254" source="BUGZILLA"/>
		<reference ref_id="1052472" ref_url="https://bugzilla.suse.com/1052472" source="BUGZILLA"/>
		<reference ref_id="1052688" ref_url="https://bugzilla.suse.com/1052688" source="BUGZILLA"/>
		<reference ref_id="1052711" ref_url="https://bugzilla.suse.com/1052711" source="BUGZILLA"/>
		<reference ref_id="1052747" ref_url="https://bugzilla.suse.com/1052747" source="BUGZILLA"/>
		<reference ref_id="1052750" ref_url="https://bugzilla.suse.com/1052750" source="BUGZILLA"/>
		<reference ref_id="1052754" ref_url="https://bugzilla.suse.com/1052754" source="BUGZILLA"/>
		<reference ref_id="1052761" ref_url="https://bugzilla.suse.com/1052761" source="BUGZILLA"/>
		<reference ref_id="1055069" ref_url="https://bugzilla.suse.com/1055069" source="BUGZILLA"/>
		<reference ref_id="1055229" ref_url="https://bugzilla.suse.com/1055229" source="BUGZILLA"/>
		<reference ref_id="1056768" ref_url="https://bugzilla.suse.com/1056768" source="BUGZILLA"/>
		<reference ref_id="1057163" ref_url="https://bugzilla.suse.com/1057163" source="BUGZILLA"/>
		<reference ref_id="1058009" ref_url="https://bugzilla.suse.com/1058009" source="BUGZILLA"/>
		<reference ref_id="1072898" ref_url="https://bugzilla.suse.com/1072898" source="BUGZILLA"/>
		<reference ref_id="1074119" ref_url="https://bugzilla.suse.com/1074119" source="BUGZILLA"/>
		<reference ref_id="1074170" ref_url="https://bugzilla.suse.com/1074170" source="BUGZILLA"/>
		<reference ref_id="1075821" ref_url="https://bugzilla.suse.com/1075821" source="BUGZILLA"/>
		<reference ref_id="1076182" ref_url="https://bugzilla.suse.com/1076182" source="BUGZILLA"/>
		<reference ref_id="1078433" ref_url="https://bugzilla.suse.com/1078433" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170/" source="CVE"/>
		<reference ref_id="CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448/" source="CVE"/>
		<reference ref_id="CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450/" source="CVE"/>
		<reference ref_id="CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528/" source="CVE"/>
		<reference ref_id="CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530/" source="CVE"/>
		<reference ref_id="CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531/" source="CVE"/>
		<reference ref_id="CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533/" source="CVE"/>
		<reference ref_id="CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537/" source="CVE"/>
		<reference ref_id="CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638/" source="CVE"/>
		<reference ref_id="CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642/" source="CVE"/>
		<reference ref_id="CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418/" source="CVE"/>
		<reference ref_id="CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427/" source="CVE"/>
		<reference ref_id="CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429/" source="CVE"/>
		<reference ref_id="CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432/" source="CVE"/>
		<reference ref_id="CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566/" source="CVE"/>
		<reference ref_id="CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654/" source="CVE"/>
		<reference ref_id="CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663/" source="CVE"/>
		<reference ref_id="CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664/" source="CVE"/>
		<reference ref_id="CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665/" source="CVE"/>
		<reference ref_id="CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668/" source="CVE"/>
		<reference ref_id="CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674/" source="CVE"/>
		<reference ref_id="CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058/" source="CVE"/>
		<reference ref_id="CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131/" source="CVE"/>
		<reference ref_id="CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060/" source="CVE"/>
		<reference ref_id="CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139/" source="CVE"/>
		<reference ref_id="CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224/" source="CVE"/>
		<reference ref_id="CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682/" source="CVE"/>
		<reference ref_id="CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885/" source="CVE"/>
		<reference ref_id="CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934/" source="CVE"/>
		<reference ref_id="CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028/" source="CVE"/>
		<reference ref_id="CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405/" source="CVE"/>
		<reference ref_id="CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407/" source="CVE"/>
		<reference ref_id="CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357/" source="CVE"/>
		<reference ref_id="CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-11170: ReadTGAImage in coders\tga.c allowed for memory exhaustion via invalid colors data in the header of a TGA or VST file (bsc#1048272)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11531: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.  (bsc#1050126)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-14060: A NULL Pointer Dereference issue in the ReadCUTImage function in coders/cut.c was fixed that could have caused a Denial of Service (bsc#1056768)
- CVE-2017-14139: A memory leak vulnerability in WriteMSLImage in coders/msl.c was fixed. (bsc#1057163)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-17934: A memory leak in the function MSLPopImage and ProcessMSLScript could have lead to a denial of service (bsc#1074170)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-5357: ImageMagick had memory leaks in the ReadDCMImage function in coders/dcm.c.  (bsc#1075821)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-01"/>
	<updated date="2018-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048272">SUSE bug 1048272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050126">SUSE bug 1050126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056768">SUSE bug 1056768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075821">SUSE bug 1075821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80281" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040107" ref_url="https://bugzilla.suse.com/1040107" source="BUGZILLA"/>
		<reference ref_id="1040114" ref_url="https://bugzilla.suse.com/1040114" source="BUGZILLA"/>
		<reference ref_id="1052522" ref_url="https://bugzilla.suse.com/1052522" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

* CVE-2017-9110: In OpenEXR, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. (bsc#1040107)
* CVE-2017-9114: In OpenEXR, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.  (bsc#1040114)
* CVE-2017-12596: In OpenEXR, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it could have resulted in denial of service or possibly unspecified other impact.  (bsc#1052522)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-02"/>
	<updated date="2018-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550747" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550748" comment="openexr-2.1.0-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80282" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1042948" ref_url="https://bugzilla.suse.com/1042948" source="BUGZILLA"/>
		<reference ref_id="1049373" ref_url="https://bugzilla.suse.com/1049373" source="BUGZILLA"/>
		<reference ref_id="1051412" ref_url="https://bugzilla.suse.com/1051412" source="BUGZILLA"/>
		<reference ref_id="1052252" ref_url="https://bugzilla.suse.com/1052252" source="BUGZILLA"/>
		<reference ref_id="1052771" ref_url="https://bugzilla.suse.com/1052771" source="BUGZILLA"/>
		<reference ref_id="1058082" ref_url="https://bugzilla.suse.com/1058082" source="BUGZILLA"/>
		<reference ref_id="1072902" ref_url="https://bugzilla.suse.com/1072902" source="BUGZILLA"/>
		<reference ref_id="1074122" ref_url="https://bugzilla.suse.com/1074122" source="BUGZILLA"/>
		<reference ref_id="1074425" ref_url="https://bugzilla.suse.com/1074425" source="BUGZILLA"/>
		<reference ref_id="1074610" ref_url="https://bugzilla.suse.com/1074610" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445/" source="CVE"/>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449/" source="CVE"/>
		<reference ref_id="CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751/" source="CVE"/>
		<reference ref_id="CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430/" source="CVE"/>
		<reference ref_id="CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642/" source="CVE"/>
		<reference ref_id="CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249/" source="CVE"/>
		<reference ref_id="CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680/" source="CVE"/>
		<reference ref_id="CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882/" source="CVE"/>
		<reference ref_id="CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2017-1000476: A CPU exhaustion vulnerability was found in the function
  ReadDDSInfo in coders/dds.c, which allowed attackers to cause a denial of
  service (bsc#1074610).
- CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to cause
  a denial of service (memory leak) via a crafted file (bsc#1042948).
- CVE-2017-1000445: A NULL pointer dereference in the MagickCore component
  might have lead to denial of service (bsc#1074425).
- CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17882)
  (bsc#1072902).
- CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in
  coders/xpm.c, which allowed attackers to cause a denial of service via a
  crafted XPM image file (a different vulnerability than CVE-2017-17680)
  (bsc#1074122).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not
  validate blob sizes, which allowed remote attackers to cause a denial of
  service (application crash) or possibly have unspecified other impact via an
  image received from stdin (bsc#1049373).
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
  coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
  coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that
  lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c
  allowed remote attackers to cause a denial of service via a crafted file
  (bsc#1058082).
- Prevent memory leak via crafted file in pwp.c allowing for DoS (bsc#1051412)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-09"/>
	<updated date="2018-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80283" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1081557" ref_url="https://bugzilla.suse.com/1081557" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00023.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2017-18190: Removed localhost.localdomain from list
  of trustworthy hosts in scheduler/client.c to avoid arbitrary IPP
  command execution in conjunction with DNS rebinding.
  (bsc#1081557)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550751" comment="cups-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550752" comment="cups-client-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550753" comment="cups-libs-1.7.5-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546056" comment="cups-libs-32bit-1.7.5-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80284" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1021483" ref_url="https://bugzilla.suse.com/1021483" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169/" source="CVE"/>
		<reference ref_id="CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170/" source="CVE"/>
		<reference ref_id="CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171/" source="CVE"/>
		<reference ref_id="CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172: Make sure upper and lower boundaries make sense, to avoid out of bounds memory reads that could lead to crashes or disclosing memory. (bsc#1021483)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-05"/>
	<updated date="2018-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550754" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80285" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077003" ref_url="https://bugzilla.suse.com/1077003" source="BUGZILLA"/>
		<reference ref_id="1077006" ref_url="https://bugzilla.suse.com/1077006" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003793.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issues fixed:

- CVE-2018-1000024: DoS fix caused by incorrect pointer handling when processing ESI
  responses. This affects the default custom esi_parser (bsc#1077003).
- CVE-2018-1000027: DoS fix caused by incorrect pointer handing whien processing ESI
  responses or downloading intermediate CA certificates (bsc#1077006).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-08"/>
	<updated date="2018-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550755" comment="squid-3.5.21-26.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80286" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1054171" ref_url="https://bugzilla.suse.com/1054171" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003800.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

Security issue fixed:

- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
  by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550756" comment="augeas-1.2.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550757" comment="augeas-lenses-1.2.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550758" comment="libaugeas0-1.2.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80287" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1081556" ref_url="https://bugzilla.suse.com/1081556" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-09"/>
	<updated date="2018-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550759" comment="glibc-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550760" comment="glibc-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550761" comment="glibc-devel-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550762" comment="glibc-devel-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533214" comment="glibc-html-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519002" comment="glibc-i18ndata-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533215" comment="glibc-info-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550763" comment="glibc-locale-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550764" comment="glibc-locale-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550765" comment="glibc-profile-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550766" comment="glibc-profile-32bit-2.22-62.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550767" comment="nscd-2.22-62.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80288" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1081294" ref_url="https://bugzilla.suse.com/1081294" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2018-7169: Fixed an privilege escalation in newgidmap,
  which allowed an unprivileged user to be placed in a user namespace where
  setgroups(2) is allowed. (bsc#1081294)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550768" comment="shadow-4.2.1-27.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80289" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2638" ref_url="https://www.suse.com/security/cve/CVE-2018-2638/" source="CVE"/>
		<reference ref_id="CVE-2018-2639" ref_url="https://www.suse.com/security/cve/CVE-2018-2639/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<description>

  
This update for java-1_8_0-ibm fixes the following issues:

- Removed java-1_8_0-ibm-alsa and java-1_8_0-ibm-plugin entries in
  baselibs.conf due to errors in osc source_validator

Version update to 8.0.5.10 [bsc#1082810]

* Security fixes:

    CVE-2018-2639 CVE-2018-2638 CVE-2018-2633 CVE-2018-2637
    CVE-2018-2634 CVE-2018-2582 CVE-2018-2641 CVE-2018-2618
    CVE-2018-2603 CVE-2018-2599 CVE-2018-2602 CVE-2018-2678
    CVE-2018-2677 CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

    - IJ02608 Class Libraries: Change of namespace definitions with
      	      handlers that implement javax.xml.ws.handler.soap.soaphandler
    - IJ04280 Class Libraries: Deploy Upgrade to Oracle level 8u161-b12
    - IJ03390 Class Libraries: JCL Upgrade to Oracle level 8u161-b12
    - IJ04001 Class Libraries: Performance improvement with child
      	      process on AIX
    - IJ04281 Class Libraries: Startup time increase after applying
      	      apar IV96905
    - IJ03822 Class Libraries: Update timezone information to tzdata2017c
    - IJ03440 Java Virtual Machine: Assertion failure during class creation
    - IJ03717 Java Virtual Machine: Assertion for gencon with concurrent
      	      scavenger on ZOS64
    - IJ03513 Java Virtual Machine: Assertion in concurrent scavenger if
      	      initial heap memory size -Xms is set too low
    - IJ03994 Java Virtual Machine: Class.getmethods() does not return
      	      all methods
    - IJ03413 Java Virtual Machine: Hang creating thread after redefining
      	      classes
    - IJ03852 Java Virtual Machine: ICH408I message when groupaccess is
      	      specified with -xshareclasses
    - IJ03716 Java Virtual Machine: java/lang/linkageerror from
      	      sun/misc/unsafe.definean onymousclass()
    - IJ03116 Java Virtual Machine: java.fullversion string contains an
      	      extra space
    - IJ03347 Java Virtual Machine: java.lang.IllegalStateException in
      	      related class MemoryMXBean
    - IJ03878 Java Virtual Machine: java.lang.StackOverflowError is thrown
      	      when custom security manager in place
    - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
      	      trace, log was not enabled by default
    - IJ04248 JIT Compiler: ArrayIndexOutOfBoundsException is thrown when
      	      converting BigDecimal to String
    - IJ04250 JIT Compiler: Assertion failure with concurrentScavenge on Z14
    - IJ03606 JIT Compiler: Java crashes with -version
    - IJ04251 JIT Compiler: JIT compiled method that takes advantage of
      	      AutoSIMD produces an incorrect result on x86
    - IJ03854 JIT Compiler: JVM info message appears in stdout
    - IJ03607 JIT Compiler: Result String contains a redundant dot when
      	      converted from BigDecimal with 0 on all platforms
    - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
    - IJ03715 Security: Add additional support for the IBMJCEPlus provider,
      	      add support for new IBMJCEPlusFIPS provider
    - IJ03800 Security: A fix in CMS provider for KDB integrity
    - IJ04282 Security: Change in location and default of jurisdiction
      	      policy files
    - IJ03853 Security: IBMCAC provider does not support SHA224
    - IJ02679 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ02706 Security: IBMPKCS11Impl – Bad sessions are being allocated
      	      internally
    - IJ03552 Security: IBMPKCS11Impl - Config file problem with the slot
      	      specification attribute
    - IJ01901 Security: IBMPKCS11Impl – SecureRandom.setSeed() exception
    - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
      	      stash, JKS Chain issue and JVM argument parse issue with iKeyman
    - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
    - PI93233 z/OS Extentions: Cipher.doFinal() fails when using
      	      AES/GCM/nopadding with AAD data of 13 bytes and a block size
	      of 4081 to 4096

* Fixes in 8.0.5.7:

    - IJ02605 Class Libraries: Update IBM-1371 charset with new specification
      	      support
    - IJ02541 Java Virtual Machine: Assertions in GC when jvmti runs with
      	      Concurrent Scavenger
    - IJ02443 Java Virtual Machine: Committed eden region size is bigger than
      	      maximum eden region size
    - IJ02378 Java Virtual Machine: Existing signal action for SIG_IGN/SIG_DFL
      	      is not detected properly
    - IJ02758 JIT Compiler: Crash in JIT module during method compilation
    - IJ02733 JIT Compiler: Crash in jit module when compiling in non-default
      	      configuration

* Fixes in 8.0.5.6:

    - IJ02283 Java Virtual Machine: IllegalAccessException due to a missing
      	      access check for the same class in MethodHandle apis
    - IJ02082 Java Virtual Machine: The default value for class unloading kick
      	      off threshold is not set
    - IJ02018 JIT Compiler: Crash or assertion while attempting to acquire
      	      VM access
    - IJ02284 JIT Compiler: Division by zero in JIT compiler
    - IV88941 JIT Compiler: JIT compiler takes far too long to compile a
      	      method
    - IJ02285 JIT Compiler: Performance degradation during class unloading in
      	      Java 8 SR5

- Support Java jnlp files run from Firefox. [bsc#1076390]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2638/">CVE-2018-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2639/">CVE-2018-2639</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80290" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed in OpenJDK 7u171 (January 2018 CPU)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80291" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1076366" ref_url="https://bugzilla.suse.com/1076366" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Security issues fix in jdk8u161 (icedtea 3.7.0)(bsc#1076366):

- CVE-2018-2579: Improve key keying case
- CVE-2018-2582: Better interface invocations
- CVE-2018-2588: Improve LDAP logins
- CVE-2018-2599: Improve reliability of DNS lookups
- CVE-2018-2602: Improve usage messages
- CVE-2018-2603: Improve PKCS usage
- CVE-2018-2618: Stricter key generation
- CVE-2018-2629: Improve GSS handling
- CVE-2018-2633: Improve LDAP lookup robustness
- CVE-2018-2634: Improve property negotiations
- CVE-2018-2637: Improve JMX supportive features
- CVE-2018-2641: Improve GTK initialization
- CVE-2018-2663: More refactoring for deserialization cases
- CVE-2018-2677: More refactoring for client deserialization cases
- CVE-2018-2678: More refactoring for naming deserialization cases
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-12"/>
	<updated date="2018-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80292" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077983" ref_url="https://bugzilla.suse.com/1077983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003813.html" source="SUSE-SU"/>
		<description>

  
This update for postgresql94 fixes the following issues:

PostgreSQL was updated to version 9.4.15, the full release notes are here:

	https://www.postgresql.org/docs/9.4/static/release-9-4-15.html

- CVE-2018-1053: Ensure that all temporary files made by pg_upgrade are non-world-readable. (bsc#1077983)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550777" comment="postgresql94-9.4.16-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550778" comment="postgresql94-contrib-9.4.16-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533230" comment="postgresql94-docs-9.4.16-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550779" comment="postgresql94-server-9.4.16-21.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80293" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077355" ref_url="https://bugzilla.suse.com/1077355" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003812.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2015-1142857: Add 7.13.1.0 bnx2x firmware files to fix a ethernet flow control
  vulnerability in SRIOV devices (bsc#1077355)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519012" comment="kernel-firmware-20170530-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519013" comment="ucode-amd-20170530-21.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80294" version="1" class="patch">
	<metadata>
		<title>Security update for libcdio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1082877" ref_url="https://bugzilla.suse.com/1082877" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<description>
This update for libcdio fixes the following issues:

- CVE-2017-18201: Fixed a double free vulnerability (bsc#1082877).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-14"/>
	<updated date="2018-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550780" comment="libcdio14-0.90-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550781" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80295" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="1085018" ref_url="https://bugzilla.suse.com/1085018" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
              apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
              trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
              converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
              policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ02706 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ03552 Security: IBMPKCS11Impl -- Config file problem with the slot
              specification attribute
  - IJ01901 Security: IBMPKCS11Impl -- SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
              stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler

* SUSE fixes:

  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

  - Fixed symlinks to policy files on update [bsc#1085018]

  - Fixed jpackage-java-1_7_1-ibm-webstart.desktop file to allow
    Java jnlp files run from Firefox. [bsc#1057460, bsc#1076390]

  - Fix javaws segfaults when java expiration timer has elapsed. [bsc#929900]

  - Provide IBM Java updates for IBMs PMR 55931,671,760 and for SUSEs
    SR 110991601735. [bsc#966304]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085018">SUSE bug 1085018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550782" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550783" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550784" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550785" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80296" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1078431" ref_url="https://bugzilla.suse.com/1078431" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<description>

  
This update for mariadb fixes the following issues:

MariaDB was updated to 10.0.34 (bsc#1078431)

The following security vulnerabilities are fixed:

- CVE-2018-2562: Vulnerability in the MySQL Server subcomponent: Server : Partition. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
- CVE-2018-2622: Vulnerability in the MySQL Server subcomponent: Server: DDL. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2640: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2665: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2668: Vulnerability in the MySQL Server subcomponent: Server: Optimizer. Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
- CVE-2018-2612: Vulnerability in the MySQL Server subcomponent: InnoDB. Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.


The MariaDB external release notes and changelog for this release:

* https://kb.askmonty.org/en/mariadb-10034-release-notes
* https://kb.askmonty.org/en/mariadb-10034-changelog

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-15"/>
	<updated date="2018-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80297" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1085207" ref_url="https://bugzilla.suse.com/1085207" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00044.html" source="SUSE-SU"/>
		<description>

This update for ucode-intel fixes the following issues:

The Intel CPU microcode version was updated to version 20180312.

This update enables the IBPB+IBRS based mitigations of the Spectre v2 flaws (boo#1085207 CVE-2017-5715)

- New Platforms

  - BDX-DE EGW A0 6-56-5:10 e000009
  - SKX B1 6-55-3:97 1000140

- Updates

  - SNB D2 6-2a-7:12 29-&gt;2d
  - JKT C1 6-2d-6:6d 619-&gt;61c
  - JKT C2 6-2d-7:6d 710-&gt;713
  - IVB E2 6-3a-9:12 1c-&gt;1f
  - IVT C0 6-3e-4:ed 428-&gt;42c
  - IVT D1 6-3e-7:ed 70d-&gt;713
  - HSW Cx/Dx 6-3c-3:32 22-&gt;24
  - HSW-ULT Cx/Dx 6-45-1:72 20-&gt;23
  - CRW Cx 6-46-1:32 17-&gt;19
  - HSX C0 6-3f-2:6f 3a-&gt;3c
  - HSX-EX E0 6-3f-4:80 0f-&gt;11
  - BDW-U/Y E/F 6-3d-4:c0 25-&gt;2a
  - BDW-H E/G 6-47-1:22 17-&gt;1d
  - BDX-DE V0/V1 6-56-2:10 0f-&gt;15
  - BDW-DE V2 6-56-3:10 700000d-&gt;7000012
  - BDW-DE Y0 6-56-4:10 f00000a-&gt;f000011
  - SKL-U/Y D0 6-4e-3:c0 ba-&gt;c2
  - SKL R0 6-5e-3:36 ba-&gt;c2
  - KBL-U/Y H0 6-8e-9:c0 62-&gt;84
  - KBL B0 6-9e-9:2a 5e-&gt;84
  - CFL D0 6-8e-a:c0 70-&gt;84
  - CFL U0 6-9e-a:22 70-&gt;84
  - CFL B0 6-9e-b:02 72-&gt;84
  - SKX H0 6-55-4:b7 2000035-&gt;2000043
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085207">SUSE bug 1085207</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80298" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

This update is only provided as a fix update for IBM Z platform.

- CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were included but not enabled in the previous update. This update enables those fixes.
- CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were already included in the previous update. A bugfix for the patches has been applied on top.
- CVE-2017-5754: The IBM Z architecture is not affected by the 'Meltdown' attack.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-11"/>
	<updated date="2018-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550791" comment="kernel-default-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550792" comment="kernel-default-base-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550793" comment="kernel-default-devel-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550794" comment="kernel-default-man-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550795" comment="kernel-devel-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550796" comment="kernel-macros-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550797" comment="kernel-source-4.4.103-92.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550798" comment="kernel-syms-4.4.103-92.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80299" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1083247" ref_url="https://bugzilla.suse.com/1083247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="CVE-2018-0489" ref_url="https://www.suse.com/security/cve/CVE-2018-0489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003822.html" source="SUSE-SU"/>
		<description>
This update for xmltooling fixes the following issues:

- CVE-2018-0489: Fixed a security bug when xmltooling mishandled digital
  signatures of user data, which allows remote attackers to obtain
  sensitive information or conduct impersonation attacks via crafted
  XML data. NOTE: this issue exists because of an incomplete fix for
  CVE-2018-0486. (bsc#1083247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-16"/>
	<updated date="2018-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083247">SUSE bug 1083247</bugzilla>
	<cve impact="important" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0489/">CVE-2018-0489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550799" comment="libxmltooling6-1.5.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550800" comment="xmltooling-schemas-1.5.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80300" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1057460" ref_url="https://bugzilla.suse.com/1057460" source="BUGZILLA"/>
		<reference ref_id="1076390" ref_url="https://bugzilla.suse.com/1076390" source="BUGZILLA"/>
		<reference ref_id="1082810" ref_url="https://bugzilla.suse.com/1082810" source="BUGZILLA"/>
		<reference ref_id="1085018" ref_url="https://bugzilla.suse.com/1085018" source="BUGZILLA"/>
		<reference ref_id="929900" ref_url="https://bugzilla.suse.com/929900" source="BUGZILLA"/>
		<reference ref_id="955131" ref_url="https://bugzilla.suse.com/955131" source="BUGZILLA"/>
		<reference ref_id="966304" ref_url="https://bugzilla.suse.com/966304" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issue:

The version was updated to 7.1.4.20 [bsc#1082810]

* Security fixes:

  - CVE-2018-2633 CVE-2018-2637 CVE-2018-2634 CVE-2018-2582
    CVE-2018-2641 CVE-2018-2618 CVE-2018-2657 CVE-2018-2603
    CVE-2018-2599 CVE-2018-2602 CVE-2018-2678 CVE-2018-2677
    CVE-2018-2663 CVE-2018-2588 CVE-2018-2579

* Defect fixes:

  - IJ04281 Class Libraries: Startup time increase after applying
              apar IV96905
  - IJ03822 Class Libraries: Update timezone information to tzdata2017c
  - IJ03605 Java Virtual Machine: Legacy security for com.ibm.jvm.dump,
              trace, log was not enabled by default
  - IJ03607 JIT Compiler: Result String contains a redundant dot when
              converted from BigDecimal with 0 on all platforms
  - IX90185 ORB: Upgrade ibmcfw.jar to version O1800.01
  - IJ04282 Security: Change in location and default of jurisdiction
              policy files
  - IJ03853 Security: IBMCAC provider does not support SHA224
  - IJ02679 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ02706 Security: IBMPKCS11Impl -- Bad sessions are being allocated
              internally
  - IJ03552 Security: IBMPKCS11Impl -- Config file problem with the slot
              specification attribute
  - IJ01901 Security: IBMPKCS11Impl -- SecureRandom.setSeed() exception
  - IJ03801 Security: Issue with same DN certs, iKeyman GUI error with
              stash, JKS Chain issue and JVM argument parse issue with iKeyman
  - IJ03256 Security: javax.security.auth.Subject.toString() throws NPE
  - IJ02284 JIT Compiler: Division by zero in JIT compiler

* SUSE fixes:

  - Make it possible to run Java jnlp files from Firefox. (bsc#1057460)

  - Fixed jpackage-java-1_7_1-ibm-webstart.desktop file to allow
    Java jnlp files run from Firefox. [bsc#1057460, bsc#1076390]

  - Fix javaws segfaults when java expiration timer has elapsed. [bsc#929900]

  - Provide IBM Java updates for IBMs PMR 55931,671,760 and for SUSEs
    SR 110991601735. [bsc#966304]

  - Ensure that all Java policy files are symlinked into the proper file system
    locations. Without those symlinks, several OES iManager plugins did not
    function properly. [bsc#1085018]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-19"/>
	<updated date="2018-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1057460">SUSE bug 1057460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076390">SUSE bug 1076390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085018">SUSE bug 1085018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929900">SUSE bug 929900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966304">SUSE bug 966304</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80301" version="1" class="patch">
	<metadata>
		<title>Security update for crash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1013843" ref_url="https://bugzilla.suse.com/1013843" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003830.html" source="SUSE-SU"/>
		<description>

This update for crash fixes the following issues:

- Exclude openSUSE from RT KMP build (bsc#1013843)

This update also rebuilds the crash kernel module packages with retpoline support to mitigate
Spectre Variant 2. (bsc#1068032 CVE-2017-5715)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1013843">SUSE bug 1013843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550801" comment="crash-7.1.5-15.3.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550802" comment="crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80302" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003829.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.6/static/release-9-6-8.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-21"/>
	<updated date="2018-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550803" comment="libecpg6-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550804" comment="libpq5-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550805" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550806" comment="postgresql96-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550807" comment="postgresql96-contrib-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533246" comment="postgresql96-docs-9.6.8-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550808" comment="postgresql96-server-9.6.8-3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80303" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1084521" ref_url="https://bugzilla.suse.com/1084521" source="BUGZILLA"/>
		<reference ref_id="1084524" ref_url="https://bugzilla.suse.com/1084524" source="BUGZILLA"/>
		<reference ref_id="1084532" ref_url="https://bugzilla.suse.com/1084532" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Following security issues were fixed:

- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-22"/>
	<updated date="2018-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550809" comment="curl-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550810" comment="libcurl4-7.37.0-37.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550811" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80304" version="1" class="patch">
	<metadata>
		<title>Security update for libvorbis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1085687" ref_url="https://bugzilla.suse.com/1085687" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<description>
This update for libvorbis fixes the following issues:

- CVE-2018-5146: Fixed out of bounds memory write while processing Vorbis audio data (bsc#1085687).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533250" comment="libvorbis-doc-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550812" comment="libvorbis0-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550813" comment="libvorbis0-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550814" comment="libvorbisenc2-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550815" comment="libvorbisenc2-32bit-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550816" comment="libvorbisfile3-1.3.3-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550817" comment="libvorbisfile3-32bit-1.3.3-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80305" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1005776" ref_url="https://bugzilla.suse.com/1005776" source="BUGZILLA"/>
		<reference ref_id="1006867" ref_url="https://bugzilla.suse.com/1006867" source="BUGZILLA"/>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1012829" ref_url="https://bugzilla.suse.com/1012829" source="BUGZILLA"/>
		<reference ref_id="1027054" ref_url="https://bugzilla.suse.com/1027054" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1034503" ref_url="https://bugzilla.suse.com/1034503" source="BUGZILLA"/>
		<reference ref_id="1035432" ref_url="https://bugzilla.suse.com/1035432" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1043441" ref_url="https://bugzilla.suse.com/1043441" source="BUGZILLA"/>
		<reference ref_id="1045330" ref_url="https://bugzilla.suse.com/1045330" source="BUGZILLA"/>
		<reference ref_id="1062840" ref_url="https://bugzilla.suse.com/1062840" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065615" ref_url="https://bugzilla.suse.com/1065615" source="BUGZILLA"/>
		<reference ref_id="1066223" ref_url="https://bugzilla.suse.com/1066223" source="BUGZILLA"/>
		<reference ref_id="1067118" ref_url="https://bugzilla.suse.com/1067118" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068569" ref_url="https://bugzilla.suse.com/1068569" source="BUGZILLA"/>
		<reference ref_id="1069135" ref_url="https://bugzilla.suse.com/1069135" source="BUGZILLA"/>
		<reference ref_id="1071306" ref_url="https://bugzilla.suse.com/1071306" source="BUGZILLA"/>
		<reference ref_id="1071892" ref_url="https://bugzilla.suse.com/1071892" source="BUGZILLA"/>
		<reference ref_id="1072363" ref_url="https://bugzilla.suse.com/1072363" source="BUGZILLA"/>
		<reference ref_id="1072689" ref_url="https://bugzilla.suse.com/1072689" source="BUGZILLA"/>
		<reference ref_id="1072739" ref_url="https://bugzilla.suse.com/1072739" source="BUGZILLA"/>
		<reference ref_id="1072865" ref_url="https://bugzilla.suse.com/1072865" source="BUGZILLA"/>
		<reference ref_id="1073401" ref_url="https://bugzilla.suse.com/1073401" source="BUGZILLA"/>
		<reference ref_id="1074198" ref_url="https://bugzilla.suse.com/1074198" source="BUGZILLA"/>
		<reference ref_id="1074426" ref_url="https://bugzilla.suse.com/1074426" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1076282" ref_url="https://bugzilla.suse.com/1076282" source="BUGZILLA"/>
		<reference ref_id="1077285" ref_url="https://bugzilla.suse.com/1077285" source="BUGZILLA"/>
		<reference ref_id="1077513" ref_url="https://bugzilla.suse.com/1077513" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1077779" ref_url="https://bugzilla.suse.com/1077779" source="BUGZILLA"/>
		<reference ref_id="1078583" ref_url="https://bugzilla.suse.com/1078583" source="BUGZILLA"/>
		<reference ref_id="1078609" ref_url="https://bugzilla.suse.com/1078609" source="BUGZILLA"/>
		<reference ref_id="1078672" ref_url="https://bugzilla.suse.com/1078672" source="BUGZILLA"/>
		<reference ref_id="1078673" ref_url="https://bugzilla.suse.com/1078673" source="BUGZILLA"/>
		<reference ref_id="1078787" ref_url="https://bugzilla.suse.com/1078787" source="BUGZILLA"/>
		<reference ref_id="1079029" ref_url="https://bugzilla.suse.com/1079029" source="BUGZILLA"/>
		<reference ref_id="1079038" ref_url="https://bugzilla.suse.com/1079038" source="BUGZILLA"/>
		<reference ref_id="1079384" ref_url="https://bugzilla.suse.com/1079384" source="BUGZILLA"/>
		<reference ref_id="1079989" ref_url="https://bugzilla.suse.com/1079989" source="BUGZILLA"/>
		<reference ref_id="1080014" ref_url="https://bugzilla.suse.com/1080014" source="BUGZILLA"/>
		<reference ref_id="1080263" ref_url="https://bugzilla.suse.com/1080263" source="BUGZILLA"/>
		<reference ref_id="1080344" ref_url="https://bugzilla.suse.com/1080344" source="BUGZILLA"/>
		<reference ref_id="1080360" ref_url="https://bugzilla.suse.com/1080360" source="BUGZILLA"/>
		<reference ref_id="1080364" ref_url="https://bugzilla.suse.com/1080364" source="BUGZILLA"/>
		<reference ref_id="1080384" ref_url="https://bugzilla.suse.com/1080384" source="BUGZILLA"/>
		<reference ref_id="1080464" ref_url="https://bugzilla.suse.com/1080464" source="BUGZILLA"/>
		<reference ref_id="1080774" ref_url="https://bugzilla.suse.com/1080774" source="BUGZILLA"/>
		<reference ref_id="1080809" ref_url="https://bugzilla.suse.com/1080809" source="BUGZILLA"/>
		<reference ref_id="1080813" ref_url="https://bugzilla.suse.com/1080813" source="BUGZILLA"/>
		<reference ref_id="1080851" ref_url="https://bugzilla.suse.com/1080851" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1081431" ref_url="https://bugzilla.suse.com/1081431" source="BUGZILLA"/>
		<reference ref_id="1081491" ref_url="https://bugzilla.suse.com/1081491" source="BUGZILLA"/>
		<reference ref_id="1081498" ref_url="https://bugzilla.suse.com/1081498" source="BUGZILLA"/>
		<reference ref_id="1081500" ref_url="https://bugzilla.suse.com/1081500" source="BUGZILLA"/>
		<reference ref_id="1081512" ref_url="https://bugzilla.suse.com/1081512" source="BUGZILLA"/>
		<reference ref_id="1081671" ref_url="https://bugzilla.suse.com/1081671" source="BUGZILLA"/>
		<reference ref_id="1082223" ref_url="https://bugzilla.suse.com/1082223" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1082478" ref_url="https://bugzilla.suse.com/1082478" source="BUGZILLA"/>
		<reference ref_id="1082795" ref_url="https://bugzilla.suse.com/1082795" source="BUGZILLA"/>
		<reference ref_id="1082864" ref_url="https://bugzilla.suse.com/1082864" source="BUGZILLA"/>
		<reference ref_id="1082897" ref_url="https://bugzilla.suse.com/1082897" source="BUGZILLA"/>
		<reference ref_id="1082979" ref_url="https://bugzilla.suse.com/1082979" source="BUGZILLA"/>
		<reference ref_id="1082993" ref_url="https://bugzilla.suse.com/1082993" source="BUGZILLA"/>
		<reference ref_id="1083494" ref_url="https://bugzilla.suse.com/1083494" source="BUGZILLA"/>
		<reference ref_id="1083548" ref_url="https://bugzilla.suse.com/1083548" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1085053" ref_url="https://bugzilla.suse.com/1085053" source="BUGZILLA"/>
		<reference ref_id="1085107" ref_url="https://bugzilla.suse.com/1085107" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085239" ref_url="https://bugzilla.suse.com/1085239" source="BUGZILLA"/>
		<reference ref_id="863764" ref_url="https://bugzilla.suse.com/863764" source="BUGZILLA"/>
		<reference ref_id="966328" ref_url="https://bugzilla.suse.com/966328" source="BUGZILLA"/>
		<reference ref_id="975772" ref_url="https://bugzilla.suse.com/975772" source="BUGZILLA"/>
		<reference ref_id="983145" ref_url="https://bugzilla.suse.com/983145" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.120 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-13166: An elevation of privilege vulnerability in the v4l2 video driver was fixed. (bnc#1072865).
- CVE-2017-15951: The KEYS subsystem did not correctly synchronize the actions of updating versus finding a key in the 'negative' state to avoid a race condition, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls (bnc#1062840 bnc#1065615).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2017-17975: Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c allowed attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure (bnc#1074426).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c allowed local users to cause a denial of service (memory consumption) by triggering an out-of-array error case (bnc#1085053).
- CVE-2018-1000026: A insufficient input validation vulnerability in the bnx2x network card driver could result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM. (bnc#1079384).
- CVE-2018-1068: Insufficient user provided offset checking in the ebtables compat code allowed local attackers to overwrite kernel memory and potentially execute code. (bsc#1085107)

The following non-security bugs were fixed:

- acpi / bus: Leave modalias empty for devices which are not present (bnc#1012382).
- acpi: sbshc: remove raw pointer from printk() message (bnc#1012382).
- Add delay-init quirk for Corsair K70 RGB keyboards (bnc#1012382).
- add ip6_make_flowinfo helper (bsc#1042286).
- ahci: Add Intel Cannon Lake PCH-H PCI ID (bnc#1012382).
- ahci: Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI (bnc#1012382).
- ahci: Annotate PCI ids for mobile Intel chipsets as such (bnc#1012382).
- alpha: fix crash if pthread_create races with signal delivery (bnc#1012382).
- alpha: fix reboot on Avanti platform (bnc#1012382).
- alsa: hda/ca0132 - fix possible NULL pointer use (bnc#1012382).
- alsa: hda - Fix headset mic detection problem for two Dell machines (bnc#1012382).
- alsa: hda/realtek - Add headset mode support for Dell laptop (bsc#1031717).
- alsa: hda/realtek: PCI quirk for Fujitsu U7x7 (bnc#1012382).
- alsa: hda - Reduce the suspend time consumption for ALC256 (bsc#1031717).
- alsa: hda - Use IS_REACHABLE() for dependency on input (bsc#1031717).
- alsa: seq: Fix racy pool initializations (bnc#1012382).
- alsa: seq: Fix regression by incorrect ioctl_mutex usages (bnc#1012382).
- alsa: usb-audio: add implicit fb quirk for Behringer UFX1204 (bnc#1012382).
- alsa: usb-audio: Fix UAC2 get_ctl request with a RANGE attribute (bnc#1012382).
- amd-xgbe: Fix unused suspend handlers build warning (bnc#1012382).
- arm64: define BUG() instruction without CONFIG_BUG (bnc#1012382).
- arm64: Disable unhandled signal log messages by default (bnc#1012382).
- arm64: dts: add #cooling-cells to CPU nodes (bnc#1012382).
- arm64: Kconfig: select COMPAT_BINFMT_ELF only when BINFMT_ELF is set (bnc#1012382).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bnc#1012382).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bnc#1012382).
- arm: dts: am4372: Correct the interrupts_properties of McASP (bnc#1012382).
- arm: dts: Fix omap4 hang with GPS connected to USB by using wakeupgen (bnc#1012382).
- arm: dts: ls1021a: fix incorrect clock references (bnc#1012382).
- arm: dts: s5pv210: add interrupt-parent for ohci (bnc#1012382).
- arm: dts: STi: Add gpio polarity for 'hdmi,hpd-gpio' property (bnc#1012382).
- arm: kvm: Fix SMCCC handling of unimplemented SMC/HVC calls (bnc#1012382).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bnc#1012382).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (git-fixes).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bnc#1012382).
- arm: spear13xx: Fix dmas cells (bnc#1012382).
- arm: spear13xx: Fix spics gpio controller's warning (bnc#1012382).
- arm: spear600: Add missing interrupt-parent of rtc (bnc#1012382).
- arm: tegra: select USB_ULPI from EHCI rather than platform (bnc#1012382).
- asoc: au1x: Fix timeout tests in au1xac97c_ac97_read() (bsc#1031717).
- asoc: Intel: Kconfig: fix build when acpi is not enabled (bnc#1012382).
- asoc: Intel: sst: Fix the return value of 'sst_send_byte_stream_mrfld()' (bsc#1031717).
- asoc: mediatek: add i2c dependency (bnc#1012382).
- asoc: nuc900: Fix a loop timeout test (bsc#1031717).
- asoc: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- asoc: rockchip: disable clock on error (bnc#1012382).
- asoc: rockchip: use __maybe_unused to hide st_irq_syscfg_resume (bnc#1012382).
- asoc: rsnd: avoid duplicate free_irq() (bnc#1012382).
- asoc: rsnd: do not call free_irq() on Parent SSI (bnc#1012382).
- asoc: simple-card: Fix misleading error message (bnc#1012382).
- asoc: ux500: add MODULE_LICENSE tag (bnc#1012382).
- ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1082979).
- b2c2: flexcop: avoid unused function warnings (bnc#1012382).
- binder: add missing binder_unlock() (bnc#1012382).
- binder: check for binder_thread allocation failure in binder_poll() (bnc#1012382).
- binfmt_elf: compat: avoid unused function warning (bnc#1012382).
- blacklist.conf: commit fd5f7cde1b85d4c8e09 ('printk: Never set console_may_schedule in console_trylock()')
- blktrace: fix unlocked registration of tracepoints (bnc#1012382).
- bluetooth: btsdio: Do not bind to non-removable BCM43341 (bnc#1012382).
- bluetooth: btusb: Restore QCA Rome suspend/resume fix with a 'rewritten' version (bnc#1012382).
- bnx2x: Improve reliability in case of nested PCI errors (bnc#1012382).
- bnxt_en: Fix the 'Invalid VF' id check in bnxt_vf_ndo_prep routine (bnc#1012382).
- bpf: arsh is not supported in 32 bit alu thus reject it (bnc#1012382).
- bpf: avoid false sharing of map refcount with max_entries (bnc#1012382).
- bpf: fix 32-bit divide by zero (bnc#1012382).
- bpf: fix bpf_tail_call() x64 JIT (bnc#1012382).
- bpf: fix divides by zero (bnc#1012382).
- bpf: introduce BPF_JIT_ALWAYS_ON config (bnc#1012382).
- bpf: reject stores into ctx via st and xadd (bnc#1012382).
- bridge: implement missing ndo_uninit() (bsc#1042286).
- bridge: move bridge multicast cleanup to ndo_uninit (bsc#1042286).
- btrfs: copy fsid to super_block s_uuid (bsc#1080774).
- btrfs: fix crash due to not cleaning up tree log block's dirty bits (bnc#1012382).
- btrfs: fix deadlock in run_delalloc_nocow (bnc#1012382).
- btrfs: fix deadlock when writing out space cache (bnc#1012382).
- btrfs: fix kernel oops while reading compressed data (bsc#1081671).
- btrfs: Fix possible off-by-one in btrfs_search_path_in_tree (bnc#1012382).
- btrfs: Fix quota reservation leak on preallocated files (bsc#1079989).
- btrfs: fix unexpected -EEXIST when creating new inode (bnc#1012382).
- btrfs: Handle btrfs_set_extent_delalloc failure in fixup worker (bnc#1012382).
- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bnc#1012382).
- cdrom: turn off autoclose by default (bsc#1080813).
- cfg80211: check dev_set_name() return value (bnc#1012382).
- cfg80211: fix cfg80211_beacon_dup (bnc#1012382).
- cifs: dump IPC tcon in debug proc file (bsc#1071306).
- cifs: Fix autonegotiate security settings mismatch (bnc#1012382).
- cifs: Fix missing put_xid in cifs_file_strict_mmap (bnc#1012382).
- cifs: make IPC a regular tcon (bsc#1071306).
- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306).
- cifs: zero sensitive data when freeing (bnc#1012382).
- clk: fix a panic error caused by accessing NULL pointer (bnc#1012382).
- console/dummy: leave .con_font_get set to NULL (bnc#1012382).
- cpufreq: Add Loongson machine dependencies (bnc#1012382).
- crypto: aesni - handle zero length dst buffer (bnc#1012382).
- crypto: af_alg - whitelist mask and type (bnc#1012382).
- crypto: caam - fix endless loop when DECO acquire fails (bnc#1012382).
- crypto: cryptd - pass through absence of -&gt;setkey() (bnc#1012382).
- crypto: hash - introduce crypto_hash_alg_has_setkey() (bnc#1012382).
- crypto: poly1305 - remove -&gt;setkey() method (bnc#1012382).
- crypto: s5p-sss - Fix kernel Oops in AES-ECB mode (bnc#1012382).
- crypto: tcrypt - fix S/G table for test_aead_speed() (bnc#1012382).
- crypto: x86/twofish-3way - Fix %rbp usage (bnc#1012382).
- cw1200: fix bogus maybe-uninitialized warning (bnc#1012382).
- dccp: limit sk_filter trim to payload (bsc#1042286).
- dell-wmi, dell-laptop: depends DMI (bnc#1012382).
- dlm: fix double list_del() (bsc#1082795).
- dlm: fix NULL pointer dereference in send_to_sock() (bsc#1082795).
- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bnc#1012382).
- dmaengine: dmatest: fix container_of member in dmatest_callback (bnc#1012382).
- dmaengine: ioat: Fix error handling path (bnc#1012382).
- dmaengine: jz4740: disable/unprepare clk if probe fails (bnc#1012382).
- dmaengine: zx: fix build warning (bnc#1012382).
- dm: correctly handle chained bios in dec_pending() (bnc#1012382).
- dn_getsockoptdecnet: move nf_{get/set}sockopt outside sock lock (bnc#1012382).
- do not put symlink bodies in pagecache into highmem (bnc#1012382).
- dpt_i2o: fix build warning (bnc#1012382).
- driver-core: use 'dev' argument in dev_dbg_ratelimited stub (bnc#1012382).
- drivers/net: fix eisa_driver probe section mismatch (bnc#1012382).
- drm/amdgpu: Avoid leaking PM domain on driver unbind (v2) (bnc#1012382).
- drm/amdgpu: Fix SDMA load/unload sequence on HWS disabled mode (bnc#1012382).
- drm/amdkfd: Fix SDMA oversubsription handling (bnc#1012382).
- drm/amdkfd: Fix SDMA ring buffer size calculation (bnc#1012382).
- drm/armada: fix leak of crtc structure (bnc#1012382).
- drm/edid: Add 6 bpc quirk for CPT panel in Asus UX303LA (bnc#1012382).
- drm/gma500: remove helper function (bnc#1012382).
- drm/gma500: Sanity-check pipe index (bnc#1012382).
- drm/nouveau: hide gcc-4.9 -Wmaybe-uninitialized (bnc#1012382).
- drm/nouveau/pci: do a msi rearm on init (bnc#1012382).
- drm/radeon: adjust tested variable (bnc#1012382).
- drm: rcar-du: Fix race condition when disabling planes at CRTC stop (bnc#1012382).
- drm: rcar-du: Use the VBK interrupt for vblank events (bnc#1012382).
- drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all (bnc#1012382).
- drm/ttm: check the return value of kzalloc (bnc#1012382).
- drm/vmwgfx: use *_32_bits() macros (bnc#1012382).
- e1000: fix disabling already-disabled warning (bnc#1012382).
- edac, octeon: Fix an uninitialized variable warning (bnc#1012382).
- em28xx: only use mt9v011 if camera support is enabled (bnc#1012382).
- enable DST_CACHE in non-vanilla configs except s390x/zfcpdump
- ext4: correct documentation for grpid mount option (bnc#1012382).
- ext4: do not unnecessarily allocate buffer in recently_deleted() (bsc#1080344).
- ext4: Fix data exposure after failed AIO DIO (bsc#1069135 bsc#1082864).
- ext4: save error to disk in __ext4_grp_locked_error() (bnc#1012382).
- f2fs: fix a bug caused by NULL extent tree (bsc#1082478). While this fs is not supported by SLE it affects opensuse users so let's add it to our kernel for opensuse merging.
- fbdev: auo_k190x: avoid unused function warnings (bnc#1012382).
- fbdev: s6e8ax0: avoid unused function warnings (bnc#1012382).
- fbdev: sis: enforce selection of at least one backend (bnc#1012382).
- fbdev: sm712fb: avoid unused function warnings (bnc#1012382).
- flow_dissector: Check skb for VLAN only if skb specified (bsc#1042286).
- flow_dissector: fix vlan tag handling (bsc#1042286).
- flow_dissector: For stripped vlan, get vlan info from skb-&gt;vlan_tci (bsc#1042286).
- ftrace: Remove incorrect setting of glob search field (bnc#1012382).
- geneve: fix populating tclass in geneve_get_v6_dst (bsc#1042286).
- genirq/msi: Add stubs for get_cached_msi_msg/pci_write_msi_msg (bnc#1012382).
- genksyms: Fix segfault with invalid declarations (bnc#1012382).
- gianfar: fix a flooded alignment reports because of padding issue (bnc#1012382).
- go7007: add MEDIA_CAMERA_SUPPORT dependency (bnc#1012382).
- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bnc#1012382).
- gpio: intel-mid: Fix build warning when !CONFIG_PM (bnc#1012382).
- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- gpio: xgene: mark PM functions as __maybe_unused (bnc#1012382).
- grace: replace BUG_ON by WARN_ONCE in exit_net hook (bnc#1012382).
- gre: build header correctly for collect metadata tunnels (bsc#1042286).
- gre: do not assign header_ops in collect metadata mode (bsc#1042286).
- gre: do not keep the GRE header around in collect medata mode (bsc#1042286).
- gre: reject GUE and FOU in collect metadata mode (bsc#1042286).
- hdpvr: hide unused variable (bnc#1012382).
- hid: quirks: Fix keyboard + touchpad on Toshiba Click Mini not working (bnc#1012382).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bnc#1012382).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1012382).
- hwmon: (pmbus) Use 64bit math for DIRECT format values (bnc#1012382).
- hwrng: exynos - use __maybe_unused to hide pm functions (bnc#1012382).
- i2c: remove __init from i2c_register_board_info() (bnc#1012382).
- ib/ipoib: Fix race condition in neigh creation (bnc#1012382).
- ib/mlx4: Fix incorrectly releasing steerable UD QPs when have only ETH ports (bnc#1012382).
- ib/mlx4: Fix mlx4_ib_alloc_mr error flow (bnc#1012382).
- ibmvnic: Account for VLAN header length in TX buffers (bsc#1085239).
- ibmvnic: Account for VLAN tag in L2 Header descriptor (bsc#1085239).
- ibmvnic: Allocate max queues stats buffers (bsc#1081498).
- ibmvnic: Allocate statistics buffers during probe (bsc#1082993).
- ibmvnic: Check for NULL skb's in NAPI poll routine (bsc#1081134, git-fixes).
- ibmvnic: Clean RX pool buffers during device close (bsc#1081134).
- ibmvnic: Clean up device close (bsc#1084610).
- ibmvnic: Correct goto target for tx irq initialization failure (bsc#1082223).
- ibmvnic: Do not attempt to login if RX or TX queues are not allocated (bsc#1082993).
- ibmvnic: Do not disable device during failover or partition migration (bsc#1084610).
- ibmvnic: Ensure that buffers are NULL after free (bsc#1080014).
- ibmvnic: Fix early release of login buffer (bsc#1081134, git-fixes).
- ibmvnic: fix empty firmware version and errors cleanup (bsc#1079038).
- ibmvnic: fix firmware version when no firmware level has been provided by the VIOS server (bsc#1079038).
- ibmvnic: Fix login buffer memory leaks (bsc#1081134).
- ibmvnic: Fix NAPI structures memory leak (bsc#1081134).
- ibmvnic: Fix recent errata commit (bsc#1085239).
- ibmvnic: Fix rx queue cleanup for non-fatal resets (bsc#1080014).
- ibmvnic: Fix TX descriptor tracking again (bsc#1082993).
- ibmvnic: Fix TX descriptor tracking (bsc#1081491).
- ibmvnic: Free and re-allocate scrqs when tx/rx scrqs change (bsc#1081498).
- ibmvnic: Free RX socket buffer in case of adapter error (bsc#1081134).
- ibmvnic: Generalize TX pool structure (bsc#1085224).
- ibmvnic: Handle TSO backing device errata (bsc#1085239).
- ibmvnic: Harden TX/RX pool cleaning (bsc#1082993).
- ibmvnic: Improve TX buffer accounting (bsc#1085224).
- ibmvnic: Keep track of supplementary TX descriptors (bsc#1081491).
- ibmvnic: Make napi usage dynamic (bsc#1081498).
- ibmvnic: Move active sub-crq count settings (bsc#1081498).
- ibmvnic: Pad small packets to minimum MTU size (bsc#1085239).
- ibmvnic: queue reset when CRQ gets closed during reset (bsc#1080263).
- ibmvnic: Remove skb-&gt;protocol checks in ibmvnic_xmit (bsc#1080384).
- ibmvnic: Rename active queue count variables (bsc#1081498).
- ibmvnic: Reorganize device close (bsc#1084610).
- ibmvnic: Report queue stops and restarts as debug output (bsc#1082993).
- ibmvnic: Reset long term map ID counter (bsc#1080364).
- ibmvnic: Split counters for scrq/pools/napi (bsc#1082223).
- ibmvnic: Update and clean up reset TX pool routine (bsc#1085224).
- ibmvnic: Update release RX pool routine (bsc#1085224).
- ibmvnic: Update TX and TX completion routines (bsc#1085224).
- ibmvnic: Update TX pool initialization routine (bsc#1085224).
- ibmvnic: Wait until reset is complete to set carrier on (bsc#1081134).
- idle: i7300: add PCI dependency (bnc#1012382).
- igb: Free IRQs when device is hotplugged (bnc#1012382).
- iio: adc: axp288: remove redundant duplicate const on axp288_adc_channels (bnc#1012382).
- iio: adis_lib: Initialize trigger before requesting interrupt (bnc#1012382).
- iio: buffer: check if a buffer has been set up when poll is called (bnc#1012382).
- input: tca8418_keypad - hide gcc-4.9 -Wmaybe-uninitialized warning (bnc#1012382).
- input: tca8418_keypad - remove double read of key event register (git-fixes).
- iommu/amd: Add align parameter to alloc_irq_index() (bsc#975772).
- iommu/amd: Enforce alignment for MSI IRQs (bsc#975772).
- iommu/amd: Fix alloc_irq_index() increment (bsc#975772).
- iommu/vt-d: Use domain instead of cache fetching (bsc#975772).
- ip6mr: fix stale iterator (bnc#1012382).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- ip_tunnel: fix preempt warning in ip tunnel creation/updating (bnc#1012382).
- ip_tunnel: replace dst_cache with generic implementation (bnc#1012382).
- ipv4: allow local fragmentation in ip_finish_output_gso() (bsc#1042286).
- ipv4: fix checksum annotation in udp4_csum_init (bsc#1042286).
- ipv4: ipconfig: avoid unused ic_proto_used symbol (bnc#1012382).
- ipv4: update comment to document GSO fragmentation cases (bsc#1042286).
- ipv6: datagram: Refactor dst lookup and update codes to a new function (bsc#1042286).
- ipv6: datagram: Refactor flowi6 init codes to a new function (bsc#1042286).
- ipv6: datagram: Update dst cache of a connected datagram sk during pmtu update (bsc#1042286).
- ipv6: fix checksum annotation in udp6_csum_init (bsc#1042286).
- ipv6: icmp6: Allow icmp messages to be looped back (bnc#1012382).
- ipv6/ila: fix nlsize calculation for lwtunnel (bsc#1042286).
- ipv6: remove unused in6_addr struct (bsc#1042286).
- ipv6: tcp: fix endianness annotation in tcp_v6_send_response (bsc#1042286).
- ipv6: udp: Do a route lookup and update during release_cb (bsc#1042286).
- ipvlan: Add the skb-&gt;mark as flow4's member to lookup route (bnc#1012382).
- ipvlan: fix multicast processing (bsc#1042286).
- ipvlan: fix various issues in ipvlan_process_multicast() (bsc#1042286).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bnc#1012382).
- isdn: eicon: reduce stack size of sig_ind function (bnc#1012382).
- isdn: icn: remove a #warning (bnc#1012382).
- isdn: sc: work around type mismatch warning (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kABI: protect struct cpuinfo_x86 (kabi).
- kABI: protect struct ip_tunnel and reintroduce ip_tunnel_dst_reset_all (kabi).
- kABI: reintroduce crypto_poly1305_setkey (kabi).
- kabi: restore kabi after 'net: replace dst_cache ip6_tunnel implementation with the generic one' (bsc#1082897).
- kabi: restore nft_set_elem_destroy() signature (bsc#1042286).
- kabi: restore rhashtable_insert_slow() signature (bsc#1042286).
- kabi/severities: add __x86_indirect_thunk_rsp
- kabi/severities: as per bsc#1068569 we can ignore XFS kabi The gods have spoken, let there be light.
- kabi: uninline sk_receive_skb() (bsc#1042286).
- kaiser: fix compile error without vsyscall (bnc#1012382).
- kaiser: fix intel_bts perf crashes (bnc#1012382).
- kasan: rework Kconfig settings (bnc#1012382).
- kernel/async.c: revert 'async: simplify lowest_in_progress()' (bnc#1012382).
- kernel: fix rwlock implementation (bnc#1080360, LTC#164371).
- kernfs: fix regression in kernfs_fop_write caused by wrong type (bnc#1012382).
- keys: encrypted: fix buffer overread in valid_master_desc() (bnc#1012382).
- kmemleak: add scheduling point to kmemleak_scan() (bnc#1012382).
- kvm: add X86_LOCAL_APIC dependency (bnc#1012382).
- kvm: arm/arm64: Check pagesize when allocating a hugepage at Stage 2 (bsc#1079029).
- kvm: nVMX: Fix kernel panics induced by illegal INVEPT/INVVPID types (bnc#1012382).
- kvm: nVMX: Fix races when sending nested PI while dest enters/leaves L2 (bnc#1012382).
- kvm: nVMX: invvpid handling improvements (bnc#1012382).
- kvm: nVMX: kmap() can't fail (bnc#1012382).
- kvm: nVMX: vmx_complete_nested_posted_interrupt() can't fail (bnc#1012382).
- kvm: PPC: Book3S PR: Fix svcpu copying with preemption enabled (bsc#1066223).
- kvm: VMX: clean up declaration of VPID/EPT invalidation types (bnc#1012382).
- kvm: VMX: Fix rflags cache during vCPU reset (bnc#1012382).
- kvm: VMX: Make indirect call speculation safe (bnc#1012382).
- kvm: x86: Do not re-execute instruction when not passing CR2 value (bnc#1012382).
- kvm: x86: emulator: Return to user-mode on L1 CPL=0 emulation failure (bnc#1012382).
- kvm: x86: fix escape of guest dr6 to the host (bnc#1012382).
- kvm: X86: Fix operand/address-size during instruction decoding (bnc#1012382).
- kvm: x86: ioapic: Clear Remote IRR when entry is switched to edge-triggered (bnc#1012382).
- kvm: x86: ioapic: Fix level-triggered EOI and IOAPIC reconfigure race (bnc#1012382).
- kvm: x86: ioapic: Preserve read-only values in the redirection table (bnc#1012382).
- kvm: x86: Make indirect calls in emulator speculation safe (bnc#1012382).
- kvm/x86: Reduce retpoline performance impact in slot_handle_level_range(), by always inlining iterator helper methods (bnc#1012382).
- l2tp: fix use-after-free during module unload (bsc#1042286).
- led: core: Fix brightness setting when setting delay_off=0 (bnc#1012382).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- lib/mpi: Fix umul_ppmm() for MIPS64r6 (bnc#1012382).
- livepatch: introduce shadow variable API (bsc#1082299 fate#313296). Shadow variables support.
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c (bsc#1082299 fate#313296). Shadow variables support.
- lockd: fix 'list_add double add' caused by legacy signal interface (bnc#1012382).
- loop: fix concurrent lo_open/lo_release (bnc#1012382).
- mac80211: fix the update of path metric for RANN frame (bnc#1012382).
- mac80211: mesh: drop frames appearing to be from us (bnc#1012382).
- Make DST_CACHE a silent config option (bnc#1012382).
- mdio-sun4i: Fix a memory leak (bnc#1012382).
- md/raid1: Use a new variable to count flighting sync requests(bsc#1078609)
- media: cxusb, dib0700: ignore XC2028_I2C_FLUSH (bnc#1012382).
- media: dvb-usb-v2: lmedm04: Improve logic checking of warm start (bnc#1012382).
- media: dvb-usb-v2: lmedm04: move ts2020 attach to dm04_lme2510_tuner (bnc#1012382).
- media: r820t: fix r820t_write_reg for KASAN (bnc#1012382).
- media: s5k6aa: describe some function parameters (bnc#1012382).
- media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- media: ts2020: avoid integer overflows on 32 bit machines (bnc#1012382).
- media: usbtv: add a new usbid (bnc#1012382).
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix ctrl_is_pointer (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: make ctrl_is_pointer work for subdevs (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window-&gt;global_alpha (bnc#1012382).
- media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- mips: Implement __multi3 for GCC7 MIPS64r6 builds (bnc#1012382).
- mmc: bcm2835: Do not overwrite max frequency unconditionally (bsc#983145, git-fixes).
- mm/early_ioremap: Fix boot hang with earlyprintk=efi,keep (bnc#1012382).
- mm: hide a #warning for COMPILE_TEST (bnc#1012382).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (git-fixes).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1081500).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (bnc#1012382).
- mn10300/misalignment: Use SIGSEGV SEGV_MAPERR to report a failed user copy (bnc#1012382).
- modsign: hide openssl output in silent builds (bnc#1012382).
- module/retpoline: Warn about missing retpoline in module (bnc#1012382).
- mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1078583).
- mptfusion: hide unused seq_mpt_print_ioc_summary function (bnc#1012382).
- mtd: cfi: convert inline functions to macros (bnc#1012382).
- mtd: cfi: enforce valid geometry configuration (bnc#1012382).
- mtd: ichxrom: maybe-uninitialized with gcc-4.9 (bnc#1012382).
- mtd: maps: add __init attribute (bnc#1012382).
- mtd: nand: brcmnand: Disable prefetch by default (bnc#1012382).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- mtd: nand: Fix nand_do_read_oob() return value (bnc#1012382).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bnc#1012382).
- mtd: nand: sunxi: Fix ECC strength choice (bnc#1012382).
- mtd: sh_flctl: pass FIFO as physical address (bnc#1012382).
- mvpp2: fix multicast address filter (bnc#1012382).
- ncpfs: fix unused variable warning (bnc#1012382).
- ncr5380: shut up gcc indentation warning (bnc#1012382).
- net: add dst_cache support (bnc#1012382).
- net: arc_emac: fix arc_emac_rx() error paths (bnc#1012382).
- net: avoid skb_warn_bad_offload on IS_ERR (bnc#1012382).
- net: cdc_ncm: initialize drvflags before usage (bnc#1012382).
- net: dst_cache_per_cpu_dst_set() can be static (bnc#1012382).
- net: ena: add detection and recovery mechanism for handling missed/misrouted MSI-X (bsc#1083548).
- net: ena: add new admin define for future support of IPv6 RSS (bsc#1083548).
- net: ena: add power management ops to the ENA driver (bsc#1083548).
- net: ena: add statistics for missed tx packets (bsc#1083548).
- net: ena: fix error handling in ena_down() sequence (bsc#1083548).
- net: ena: fix race condition between device reset and link up setup (bsc#1083548).
- net: ena: fix rare kernel crash when bar memory remap fails (bsc#1083548).
- net: ena: fix wrong max Tx/Rx queues on ethtool (bsc#1083548).
- net: ena: improve ENA driver boot time (bsc#1083548).
- net: ena: increase ena driver version to 1.3.0 (bsc#1083548).
- net: ena: increase ena driver version to 1.5.0 (bsc#1083548).
- net: ena: reduce the severity of some printouts (bsc#1083548).
- net: ena: remove legacy suspend suspend/resume support (bsc#1083548).
- net: ena: Remove redundant unlikely() (bsc#1083548).
- net: ena: unmask MSI-X only after device initialization is completed (bsc#1083548).
- net: ethernet: xilinx: Mark XILINX_LL_TEMAC broken on 64-bit (bnc#1012382).
- netfilter: drop outermost socket lock in getsockopt() (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check() (bnc#1012382).
- netfilter: ipvs: avoid unused variable warnings (bnc#1012382).
- netfilter: nf_queue: Make the queue_handler pernet (bnc#1012382).
- netfilter: nf_tables: fix a wrong check to skip the inactive rules (bsc#1042286).
- netfilter: nf_tables: fix inconsistent element expiration calculation (bsc#1042286).
- netfilter: nf_tables: fix *leak* when expr clone fail (bsc#1042286).
- netfilter: nf_tables: fix race when create new element in dynset (bsc#1042286).
- netfilter: on sockopt() acquire sock lock only in the required scope (bnc#1012382).
- netfilter: tee: select NF_DUP_IPV6 unconditionally (bsc#1042286).
- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (bnc#1012382).
- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (bnc#1012382).
- netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert (bnc#1012382).
- netfilter: xt_socket: fix transparent match for IPv6 request sockets (bsc#1042286).
- net: gianfar_ptp: move set_fipers() to spinlock protecting area (bnc#1012382).
- net: hp100: remove unnecessary #ifdefs (bnc#1012382).
- net: igmp: add a missing rcu locking section (bnc#1012382).
- net/ipv4: Introduce IPSKB_FRAG_SEGS bit to inet_skb_parm.flags (bsc#1042286).
- netlink: fix nla_put_{u8,u16,u32} for KASAN (bnc#1012382).
- net: replace dst_cache ip6_tunnel implementation with the generic one (bnc#1012382).
- net_sched: red: Avoid devision by zero (bnc#1012382).
- net_sched: red: Avoid illegal values (bnc#1012382).
- net: vxlan: lwt: Fix vxlan local traffic (bsc#1042286).
- net: vxlan: lwt: Use source ip address during route lookup (bsc#1042286).
- nfs: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).
- nfs: commit direct writes even if they fail partially (bnc#1012382).
- nfsd: check for use of the closed special stateid (bnc#1012382).
- nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x&gt;0) (bnc#1012382).
- nfsd: Ensure we check stateid validity in the seqid operation checks (bnc#1012382).
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (git-fixes).
- nfs: fix a deadlock in nfs client initialization (bsc#1074198).
- nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds (bnc#1012382).
- nfs: reject request for id_legacy key without auxdata (bnc#1012382).
- nfs: Trunking detection should handle ERESTARTSYS/EINTR (bsc#1074198).
- nvme: Fix managing degraded controllers (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bsc#1012829).
- openvswitch: fix the incorrect flow action alloc size (bnc#1012382).
- ovl: fix failure to fsync lower dir (bnc#1012382).
- ovs/geneve: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre: fix rtnl notifications on iface deletion (bsc#1042286).
- ovs/gre,geneve: fix error path when creating an iface (bsc#1042286).
- ovs/vxlan: fix rtnl notifications on iface deletion (bsc#1042286).
- pci/ASPM: Do not retrain link if ASPM not possible (bnc#1071892).
- pci: keystone: Fix interrupt-controller-node lookup (bnc#1012382).
- perf bench numa: Fixup discontiguous/sparse numa nodes (bnc#1012382).
- perf top: Fix window dimensions change handling (bnc#1012382).
- perf/x86: Shut up false-positive -Wmaybe-uninitialized warning (bnc#1012382).
- pinctrl: sunxi: Fix A80 interrupt pin bank (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- pktcdvd: Fix pkt_setup_dev() error path (bnc#1012382).
- platform/x86: intel_mid_thermal: Fix suspend handlers unused warning (bnc#1012382).
- PM / devfreq: Propagate error from devfreq_add_device() (bnc#1012382).
- PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1031717).
- posix-timer: Properly check sigevent-&gt;sigev_notify (bnc#1012382).
- power: bq27xxx_battery: mark some symbols __maybe_unused (bnc#1012382).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (FATE#315275 LTC#103998 bnc#1012382 bnc#863764).
- powerpc/64s: Fix RFI flush dependency on HARDLOCKUP_DETECTOR (bnc#1012382).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075087).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bsc#1066223).
- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).
- powerpc/perf: Fix oops when grouping different pmu events (bnc#1012382).
- powerpc/powernv: Fix MCE handler to avoid trashing CR0/CR1 registers (bsc#1066223).
- powerpc/powernv: Move IDLE_STATE_ENTER_SEQ macro to cpuidle.h (bsc#1066223).
- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075087).
- powerpc: Simplify module TOC handling (bnc#1012382).
- power: reset: zx-reboot: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bnc#1012382).
- profile: hide unused functions when !CONFIG_PROC_FS (bnc#1012382).
- Provide a function to create a NUL-terminated string from unterminated data (bnc#1012382).
- pwc: hide unused label (bnc#1012382).
- qla2xxx: asynchronous pci probing (bsc#1034503).
- qlcnic: fix deadlock bug (bnc#1012382).
- r8169: fix RTL8168EP take too long to complete driver initialization (bnc#1012382).
- RDMA/cma: Make sure that PSN is not over max allowed (bnc#1012382).
- reiserfs: avoid a -Wmaybe-uninitialized warning (bnc#1012382).
- Revert 'Bluetooth: btusb: fix QCA Rome suspend/resume' (bnc#1012382).
- Revert 'bpf: avoid false sharing of map refcount with max_entries' (kabi).
- Revert 'netfilter: nf_queue: Make the queue_handler pernet' (kabi).
- Revert 'net: replace dst_cache ip6_tunnel implementation with the generic one' (kabi bnc#1082897).
- Revert 'power: bq27xxx_battery: Remove unneeded dependency in Kconfig' (bnc#1012382).
- Revert 'powerpc: Simplify module TOC handling' (kabi).
- Revert 'x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0' This reverts commit 89ef3e2aec59362edf7b1cd1c48acc81cd74e319.
- Revert 'x86/entry/64: Use a per-CPU trampoline stack for IDT entries' This reverts commit 5812bed1a96b27804bfd1eadbe3e263cb58aafdf.
- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1075087).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1075087).
- rhashtable: add rhashtable_lookup_get_insert_key() (bsc#1042286).
- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bnc#1012382).
- rtlwifi: fix gcc-6 indentation warning (bnc#1012382).
- rtlwifi: rtl8821ae: Fix connection lost problem correctly (bnc#1012382).
- s390/dasd: fix handling of internal requests (bsc#1080809).
- s390/dasd: fix wrongly assigned configuration data (bnc#1012382).
- s390/dasd: prevent prefix I/O error (bnc#1012382).
- s390: fix handling of -1 in set{,fs}[gu]id16 syscalls (bnc#1012382).
- sched/rt: Up the root domain ref count when passing it around via IPIs (bnc#1012382).
- sched/rt: Use container_of() to get root domain in rto_push_irq_work_func() (bnc#1012382).
- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bnc#1012382).
- scsi: aacraid: Prevent crash in case of free interrupt during scsi EH path (bnc#1012382).
- scsi: advansys: fix build warning for PCI=n (bnc#1012382).
- scsi: advansys: fix uninitialized data access (bnc#1012382).
- scsi: csiostor: fix use after free in csio_hw_use_fwconfig() (bsc#1005776).
- scsi: fdomain: drop fdomain_pci_tbl when built-in (bnc#1012382).
- scsi: ibmvfc: fix misdefined reserved field in ibmvfc_fcp_rsp_info (bnc#1012382).
- SCSI: initio: remove duplicate module device table (bnc#1012382).
- scsi: mvumi: use __maybe_unused to hide pm functions (bnc#1012382).
- scsi: qla2xxx: Fix abort command deadlock due to spinlock (FATE#320146, bsc#966328).
- scsi: qla2xxx: Remove aborting ELS IOCB call issued as part of timeout (FATE#320146, bsc#966328).
- scsi: return correct blkprep status code in case scsi_init_io() fails (bsc#1082979).
- scsi: sim710: fix build warning (bnc#1012382).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- scsi: storvsc: Fix scsi_cmd error assignments in storvsc_handle_error (bnc#1012382).
- scsi: sun_esp: fix device reference leaks (bsc#1082979).
- scsi: ufs: ufshcd: fix potential NULL pointer dereference in ufshcd_config_vreg (bnc#1012382).
- sctp: make use of pre-calculated len (bnc#1012382).
- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bnc#1012382).
- selinux: general protection fault in sock_has_perm (bnc#1012382).
- selinux: skip bounded transition processing if the policy isn't loaded (bnc#1012382).
- serial: 8250_mid: fix broken DMA dependency (bnc#1012382).
- serial: 8250_uniphier: fix error return code in uniphier_uart_probe() (bsc#1031717).
- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bnc#1012382).
- sget(): handle failures of register_shrinker() (bnc#1012382).
- signal/openrisc: Fix do_unaligned_access to send the proper signal (bnc#1012382).
- signal/sh: Ensure si_signo is initialized in do_divide_error (bnc#1012382).
- SolutionEngine771x: fix Ether platform data (bnc#1012382).
- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bnc#1012382).
- spi: imx: do not access registers while clocks disabled (bnc#1012382).
- spi: sun4i: disable clocks in the remove function (bnc#1012382).
- ssb: mark ssb_bus_register as __maybe_unused (bnc#1012382).
- staging: android: ashmem: Fix a race condition in pin ioctls (bnc#1012382).
- staging: iio: adc: ad7192: fix external frequency setting (bnc#1012382).
- staging: rtl8188eu: Fix incorrect response to SIOCGIWESSID (bnc#1012382).
- staging: ste_rmi4: avoid unused function warnings (bnc#1012382).
- staging: unisys: visorinput depends on INPUT (bnc#1012382).
- staging: wilc1000: fix kbuild test robot error (bnc#1012382).
- SUNRPC: Allow connect to return EHOSTUNREACH (bnc#1012382).
- tc1100-wmi: fix build warning when CONFIG_PM not enabled (bnc#1012382).
- tc358743: fix register i2c_rd/wr function fix (git-fixes).
- tc358743: fix register i2c_rd/wr functions (bnc#1012382).
- tcp: do not set rtt_min to 1 (bsc#1042286).
- tcp: release sk_frag.page in tcp_disconnect (bnc#1012382).
- test_bpf: fix the dummy skb after dissector changes (bsc#1042286).
- tg3: Add workaround to restrict 5762 MRRS to 2048 (bnc#1012382).
- tg3: Enable PHY reset in MTU change path for 5720 (bnc#1012382).
- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bnc#1012382).
- thermal: spear: use __maybe_unused for PM functions (bnc#1012382).
- tlan: avoid unused label with PCI=n (bnc#1012382).
- tools build: Add tools tree support for 'make -s' (bnc#1012382).
- tty: cyclades: cyz_interrupt is only used for PCI (bnc#1012382).
- tty: hvc_xen: hide xen_console_remove when unused (bnc#1012382).
- tty: mxser: Remove ASYNC_CLOSING (bnc#1072363).
- ubi: block: Fix locking for idr_alloc/idr_remove (bnc#1012382).
- udp: restore UDPlite many-cast delivery (bsc#1042286).
- usb: build drivers/usb/common/ when USB_SUPPORT is set (bnc#1012382).
- USB: cdc-acm: Do not log urb submission errors on disconnect (bnc#1012382).
- USB: cdc_subset: only build when one driver is enabled (bnc#1012382).
- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bnc#1012382).
- usb: f_fs: Prevent gadget unbind if it is already unbound (bnc#1012382).
- usb: gadget: do not dereference g until after it has been null checked (bnc#1012382).
- usb: gadget: f_fs: Process all descriptors during bind (bnc#1012382).
- usb: gadget: uvc: Missing files for configfs interface (bnc#1012382).
- usbip: fix 3eee23c3ec14 tcp_socket address still in the status file (bnc#1012382).
- usbip: keep usbip_device sockfd state in sync with tcp_socket (bnc#1012382).
- usbip: list: do not list devices attached to vhci_hcd (bnc#1012382).
- usbip: prevent bind loops on devices attached to vhci_hcd (bnc#1012382).
- usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit (bnc#1012382).
- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bnc#1012382).
- usb: musb/ux500: remove duplicate check for dma_is_compatible (bnc#1012382).
- usb: ohci: Proper handling of ed_rm_list to handle race condition between usb_kill_urb() and finish_unlinks() (bnc#1012382).
- usb: option: Add support for FS040U modem (bnc#1012382).
- usb: phy: msm add regulator dependency (bnc#1012382).
- usb: renesas_usbhs: missed the 'running' flag in usb_dmac with rx path (bnc#1012382).
- USB: serial: io_edgeport: fix possible sleep-in-atomic (bnc#1012382).
- USB: serial: pl2303: new device id for Chilitag (bnc#1012382).
- USB: serial: simple: add Motorola Tetra driver (bnc#1012382).
- usb: uas: unconditionally bring back host after reset (bnc#1012382).
- v4l: remove MEDIA_TUNER dependency for VIDEO_TUNER (bnc#1012382).
- vb2: V4L2_BUF_FLAG_DONE is set after DQBUF (bnc#1012382).
- vfs: do not do RCU lookup of empty pathnames (bnc#1012382).
- vhost_net: stop device during reset owner (bnc#1012382).
- video: fbdev: atmel_lcdfb: fix display-timings lookup (bnc#1012382).
- video: fbdev/mmp: add MODULE_LICENSE (bnc#1012382).
- video: fbdev: sis: remove unused variable (bnc#1012382).
- video: fbdev: via: remove possibly unused variables (bnc#1012382).
- video: Use bool instead int pointer for get_opt_bool() argument (bnc#1012382).
- virtio_balloon: prevent uninitialized variable use (bnc#1012382).
- vlan: Check for vlan ethernet types for 8021.q or 802.1ad (bsc#1042286).
- vmxnet3: prevent building with 64K pages (bnc#1012382).
- vxlan: consolidate csum flag handling (bsc#1042286).
- vxlan: consolidate output route calculation (bsc#1042286).
- vxlan: consolidate vxlan_xmit_skb and vxlan6_xmit_skb (bsc#1042286).
- vxlan: do not allow overwrite of config src addr (bsc#1042286).
- watchdog: imx2_wdt: restore previous timeout after suspend+resume (bnc#1012382).
- wireless: cw1200: use __maybe_unused to hide pm functions_ (bnc#1012382).
- x86: add MULTIUSER dependency for KVM (bnc#1012382).
- x86/asm: Fix inline asm call constraints for GCC 4.4 (bnc#1012382).
- x86/boot: Avoid warning for zero-filling .bss (bnc#1012382).
- x86: bpf_jit: small optimization in emit_bpf_tail_call() (bnc#1012382).
- x86/bugs: Drop one 'mitigation' from dmesg (bnc#1012382).
- x86/build: Silence the build with 'make -s' (bnc#1012382).
- x86/cpu/bugs: Make retpoline module warning conditional (bnc#1012382).
- x86/cpu: Change type of x86_cache_size variable to unsigned int (bnc#1012382).
- x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 (bsc#1077560).
- x86/entry/64: Use a per-CPU trampoline stack for IDT entries (bsc#1077560).
- x86: fix build warnign with 32-bit PAE (bnc#1012382).
- x86/fpu/math-emu: Fix possible uninitialized variable use (bnc#1012382).
- x86/kaiser: fix build error with KASAN &amp;&amp; !FUNCTION_GRAPH_TRACER (bnc#1012382).
- x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested (bsc#1081431).
- x86/mce: Pin the timer when modifying (bsc#1080851,1076282).
- x86/microcode/AMD: Change load_microcode_amd()'s param to bool to fix preemptibility bug (bnc#1012382).
- x86/microcode/AMD: Do not load when running on a hypervisor (bnc#1012382).
- x86/microcode: Do the family check first (bnc#1012382).
- x86/mm/kmmio: Fix mmiotrace for page unaligned addresses (bnc#1012382).
- x86/nospec: Fix header guards names (bnc#1012382).
- x86/oprofile: Fix bogus GCC-8 warning in nmi_setup() (bnc#1012382).
- x86/paravirt: Remove 'noreplace-paravirt' cmdline option (bnc#1012382).
- x86/platform: Add PCI dependency for PUNIT_ATOM_DEBUG (bnc#1012382).
- x86/platform/olpc: Fix resume handler build warning (bnc#1012382).
- x86/pti: Make unpoison of pgd for trusted boot work for real (bnc#1012382).
- x86/ras/inject: Make it depend on X86_LOCAL_APIC=y (bnc#1012382).
- x86/retpoline: Avoid retpolines for built-in __init functions (bnc#1012382).
- x86/retpoline: Remove the esp/rsp thunk (bnc#1012382).
- x86/spectre: Check CONFIG_RETPOLINE in command line parser (bnc#1012382).
- x86/spectre: Fix an error message (git-fixes).
- x86/spectre: Fix spelling mistake: 'vunerable'-&gt; 'vulnerable' (bnc#1012382).
- x86/spectre: Remove the out-of-tree RSB stuffing
- x86/spectre: Simplify spectre_v2 command line parsing (bnc#1012382).
- x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL (bnc#1012382).
- x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend (bnc#1065600).
- xen/gntdev: Fix off-by-one error when unmapping with holes (bnc#1012382).
- xen/gntdev: Fix partial gntdev_mmap() cleanup (bnc#1012382).
- xen-netfront: enable device after manual module load (bnc#1012382).
- xen-netfront: remove warning when unloading module (bnc#1012382).
- xen: XEN_acpi_PROCESSOR is Dom0-only (bnc#1012382).
- xfrm: check id proto in validate_tmpl() (bnc#1012382).
- xfrm: Fix stack-out-of-bounds read on socket policy lookup (bnc#1012382).
- xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies (bnc#1012382).
- xfrm_user: propagate sec ctx allocation errors (bsc#1042286).
- xfs: do not chain ioends during writepage submission (bsc#1077285 bsc#1043441).
- xfs: factor mapping out of xfs_do_writepage (bsc#1077285 bsc#1043441).
- xfs: Introduce writeback context for writepages (bsc#1077285 bsc#1043441).
- xfs: ioends require logically contiguous file offsets (bsc#1077285 bsc#1043441).
- xfs: quota: check result of register_shrinker() (bnc#1012382).
- xfs: quota: fix missed destroy of qi_tree_lock (bnc#1012382).
- xfs: reinit btree pointer on attr tree inactivation walk (bsc#1078787).
- xfs: remove nonblocking mode from xfs_vm_writepage (bsc#1077285 bsc#1043441).
- xfs: remove racy hasattr check from attr ops (bsc#1035432).
- xfs: remove xfs_cancel_ioend (bsc#1077285 bsc#1043441).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1072739).
- xfs: toggle readonly state around xfs_log_mount_finish (bsc#1073401).
- xfs: ubsan fixes (bnc#1012382).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1077513).
- xfs: write unmount record for ro mounts (bsc#1073401).
- xfs: xfs_cluster_write is redundant (bsc#1077285 bsc#1043441).
- xtensa: fix futex_atomic_cmpxchg_inatomic (bnc#1012382).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-23"/>
	<updated date="2018-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1005776">SUSE bug 1005776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006867">SUSE bug 1006867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012829">SUSE bug 1012829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027054">SUSE bug 1027054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034503">SUSE bug 1034503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035432">SUSE bug 1035432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043441">SUSE bug 1043441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045330">SUSE bug 1045330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065615">SUSE bug 1065615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066223">SUSE bug 1066223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068569">SUSE bug 1068569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069135">SUSE bug 1069135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071306">SUSE bug 1071306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071892">SUSE bug 1071892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072363">SUSE bug 1072363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072689">SUSE bug 1072689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072739">SUSE bug 1072739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073401">SUSE bug 1073401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074198">SUSE bug 1074198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074426">SUSE bug 1074426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076282">SUSE bug 1076282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077285">SUSE bug 1077285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077513">SUSE bug 1077513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077779">SUSE bug 1077779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078583">SUSE bug 1078583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078609">SUSE bug 1078609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078787">SUSE bug 1078787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079029">SUSE bug 1079029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079038">SUSE bug 1079038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079989">SUSE bug 1079989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080014">SUSE bug 1080014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080263">SUSE bug 1080263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080344">SUSE bug 1080344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080360">SUSE bug 1080360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080364">SUSE bug 1080364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080384">SUSE bug 1080384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080464">SUSE bug 1080464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080774">SUSE bug 1080774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080809">SUSE bug 1080809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080813">SUSE bug 1080813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080851">SUSE bug 1080851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081431">SUSE bug 1081431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081491">SUSE bug 1081491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081498">SUSE bug 1081498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081500">SUSE bug 1081500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081512">SUSE bug 1081512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081671">SUSE bug 1081671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082223">SUSE bug 1082223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082478">SUSE bug 1082478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082795">SUSE bug 1082795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082864">SUSE bug 1082864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082897">SUSE bug 1082897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082979">SUSE bug 1082979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082993">SUSE bug 1082993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083548">SUSE bug 1083548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085239">SUSE bug 1085239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863764">SUSE bug 863764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966328">SUSE bug 966328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975772">SUSE bug 975772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983145">SUSE bug 983145</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80306" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1045315" ref_url="https://bugzilla.suse.com/1045315" source="BUGZILLA"/>
		<reference ref_id="1049423" ref_url="https://bugzilla.suse.com/1049423" source="BUGZILLA"/>
		<reference ref_id="1052449" ref_url="https://bugzilla.suse.com/1052449" source="BUGZILLA"/>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1083915" ref_url="https://bugzilla.suse.com/1083915" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issues fixed:

- CVE-2012-6706: VMSF_DELTA filter inside the unrar implementation allows an arbitrary memory write (bsc#1045315).
- CVE-2017-6419: A heap-based buffer overflow that can lead to a denial of service in libmspack via a crafted CHM file (bsc#1052449).
- CVE-2017-11423: A stack-based buffer over-read that can lead to a denial of service in mspack via a crafted CAB file (bsc#1049423).
- CVE-2018-1000085: An out-of-bounds heap read vulnerability was found in XAR parser that can lead to a denial of service (bsc#1082858).
- CVE-2018-0202: Fixed two vulnerabilities in the PDF parsing code (bsc#1083915).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80307" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1083302" ref_url="https://bugzilla.suse.com/1083302" source="BUGZILLA"/>
		<reference ref_id="1083303" ref_url="https://bugzilla.suse.com/1083303" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

Security issues fixed:

- CVE-2018-5733: reference count overflow in dhcpd (bsc#1083303).
- CVE-2018-5732: buffer overflow in dhclient (bsc#1083302).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550824" comment="dhcp-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550825" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550826" comment="dhcp-relay-4.3.3-10.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550827" comment="dhcp-server-4.3.3-10.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80308" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1078677" ref_url="https://bugzilla.suse.com/1078677" source="BUGZILLA"/>
		<reference ref_id="1082480" ref_url="https://bugzilla.suse.com/1082480" source="BUGZILLA"/>
		<reference ref_id="1082481" ref_url="https://bugzilla.suse.com/1082481" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15706" ref_url="https://www.suse.com/security/cve/CVE-2017-15706/" source="CVE"/>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<reference ref_id="CVE-2018-1305" ref_url="https://www.suse.com/security/cve/CVE-2018-1305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2018-1305: Fixed late application of security constraints that can lead to resource exposure for unauthorised users (bsc#1082481).
- CVE-2018-1304: Fixed incorrect handling of empty string URL in security constraints that can lead to unitended exposure of resources (bsc#1082480).
- CVE-2017-15706: Fixed incorrect documentation of CGI Servlet search algorithm that may lead to misconfiguration (bsc#1078677).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1078677">SUSE bug 1078677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082481">SUSE bug 1082481</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15706/">CVE-2017-15706</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1305/">CVE-2018-1305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009533263" comment="tomcat-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533264" comment="tomcat-admin-webapps-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533265" comment="tomcat-docs-webapp-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533266" comment="tomcat-el-3_0-api-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533267" comment="tomcat-javadoc-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533268" comment="tomcat-jsp-2_3-api-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533269" comment="tomcat-lib-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533270" comment="tomcat-servlet-3_1-api-8.0.50-29.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533271" comment="tomcat-webapps-8.0.50-29.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80309" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1077080" ref_url="https://bugzilla.suse.com/1077080" source="BUGZILLA"/>
		<reference ref_id="1082692" ref_url="https://bugzilla.suse.com/1082692" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security issue fixed (bsc#1082692):

- CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05)
- CVE-2018-7321: thrift long dissector loop (dissect_thrift_map)
- CVE-2018-7322: DICOM: inifinite loop (dissect_dcm_tag)
- CVE-2018-7323: WCCP: very long loop (dissect_wccp2_alternate_mask_value_set_element)
- CVE-2018-7324: SCCP: infinite loop (dissect_sccp_optional_parameters)
- CVE-2018-7325: RPKI-Router Protocol: infinite loop (dissect_rpkirtr_pdu)
- CVE-2018-7326: LLTD: infinite loop (dissect_lltd_tlv)
- CVE-2018-7327: openflow_v6: infinite loop (dissect_openflow_bundle_control_v6)
- CVE-2018-7328: USB-DARWIN: long loop (dissect_darwin_usb_iso_transfer)
- CVE-2018-7329: S7COMM: infinite loop (s7comm_decode_ud_cpu_alarm_main)
- CVE-2018-7330: thread_meshcop: infinite loop (get_chancount)
- CVE-2018-7331: GTP: infinite loop (dissect_gprscdr_GGSNPDPRecord, dissect_ber_set)
- CVE-2018-7332: RELOAD: infinite loop (dissect_statans)
- CVE-2018-7333: RPCoRDMA: infinite loop in get_write_list_chunk_count
- CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06)
- CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07)
- CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08)
- CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09)
- CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10)
- CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11)
- CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12)
- CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13)
- CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14)
- CVE-2017-17997: Misuse of NULL pointer in MRDISC dissector (bsc#1077080).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-26"/>
	<updated date="2018-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80310" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1051042" ref_url="https://bugzilla.suse.com/1051042" source="BUGZILLA"/>
		<reference ref_id="1053188" ref_url="https://bugzilla.suse.com/1053188" source="BUGZILLA"/>
		<reference ref_id="1063675" ref_url="https://bugzilla.suse.com/1063675" source="BUGZILLA"/>
		<reference ref_id="1064569" ref_url="https://bugzilla.suse.com/1064569" source="BUGZILLA"/>
		<reference ref_id="1064580" ref_url="https://bugzilla.suse.com/1064580" source="BUGZILLA"/>
		<reference ref_id="1064583" ref_url="https://bugzilla.suse.com/1064583" source="BUGZILLA"/>
		<reference ref_id="1070905" ref_url="https://bugzilla.suse.com/1070905" source="BUGZILLA"/>
		<reference ref_id="1071319" ref_url="https://bugzilla.suse.com/1071319" source="BUGZILLA"/>
		<reference ref_id="1073231" ref_url="https://bugzilla.suse.com/1073231" source="BUGZILLA"/>
		<reference ref_id="1074293" ref_url="https://bugzilla.suse.com/1074293" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]

- A memory leak and a buffer overflow in the dynamic ELF loader has been fixed.
  [CVE-2017-1000408, CVE-2017-1000409, bsc#1071319]

- An issue in the code handling RPATHs was fixed that could have been exploited
  by an attacker to execute code loaded from arbitrary libraries.
  [CVE-2017-16997, bsc#1073231]

- A potential crash caused by a use-after-free bug in pthread_create() has been
  fixed. [bsc#1053188]

- A bug that prevented users to build shared objects which use the optimized
  libmvec.so API has been fixed. [bsc#1070905]

- A memory leak in the glob() function has been fixed. [CVE-2017-15670,
  CVE-2017-15671, CVE-2017-15804, bsc#1064569, bsc#1064580, bsc#1064583]

- A bug that would lose the syscall error code value in case of crashes has
  been fixed. [bsc#1063675]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1051042">SUSE bug 1051042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053188">SUSE bug 1053188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063675">SUSE bug 1063675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070905">SUSE bug 1070905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80311" version="1" class="patch">
	<metadata>
		<title>Security update for librelp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1086730" ref_url="https://bugzilla.suse.com/1086730" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00063.html" source="SUSE-SU"/>
		<description>
This update for librelp fixes the following issues:

  CVE-2018-1000140 (bsc#1086730):
  librelp contained a stack-based buffer overflow in the checking of x509 certificates.
  A remote attacker with an access to the rsyslog logging facility could have exploited
  it by sending a specially crafted x509 certificate.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550843" comment="librelp0-1.2.7-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80312" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017711" ref_url="https://bugzilla.suse.com/1017711" source="BUGZILLA"/>
		<reference ref_id="1017712" ref_url="https://bugzilla.suse.com/1017712" source="BUGZILLA"/>
		<reference ref_id="1081493" ref_url="https://bugzilla.suse.com/1081493" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941/" source="CVE"/>
		<reference ref_id="CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942/" source="CVE"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<description>

LibVNCServer was updated to fix two security issues.

These security issues were fixed:

- CVE-2018-7225: Missing input sanitization inside rfbserver.c rfbProcessClientNormalMessage() (bsc#1081493).
- CVE-2016-9942: Heap-based buffer overflow in ultra.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions (bsc#1017712).
- CVE-2016-9941: Heap-based buffer overflow in rfbproto.c allowed remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area (bsc#1017711).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550844" comment="libvncclient0-0.9.9-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550845" comment="libvncserver0-0.9.9-17.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80313" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1040202" ref_url="https://bugzilla.suse.com/1040202" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1068613" ref_url="https://bugzilla.suse.com/1068613" source="BUGZILLA"/>
		<reference ref_id="1070144" ref_url="https://bugzilla.suse.com/1070144" source="BUGZILLA"/>
		<reference ref_id="1071228" ref_url="https://bugzilla.suse.com/1071228" source="BUGZILLA"/>
		<reference ref_id="1073489" ref_url="https://bugzilla.suse.com/1073489" source="BUGZILLA"/>
		<reference ref_id="1076114" ref_url="https://bugzilla.suse.com/1076114" source="BUGZILLA"/>
		<reference ref_id="1076179" ref_url="https://bugzilla.suse.com/1076179" source="BUGZILLA"/>
		<reference ref_id="1076775" ref_url="https://bugzilla.suse.com/1076775" source="BUGZILLA"/>
		<reference ref_id="1076814" ref_url="https://bugzilla.suse.com/1076814" source="BUGZILLA"/>
		<reference ref_id="1082276" ref_url="https://bugzilla.suse.com/1082276" source="BUGZILLA"/>
		<reference ref_id="1083291" ref_url="https://bugzilla.suse.com/1083291" source="BUGZILLA"/>
		<reference ref_id="1085598" ref_url="https://bugzilla.suse.com/1085598" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124/" source="CVE"/>
		<reference ref_id="CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845/" source="CVE"/>
		<reference ref_id="CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381/" source="CVE"/>
		<reference ref_id="CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030/" source="CVE"/>
		<reference ref_id="CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<description>

  
This update for qemu fixes the following issues:

This update has the next round of Spectre v2 related patches, which
now integrate with corresponding changes in libvirt. (CVE-2017-5715
bsc#1068032)

The January 2018 release of qemu initially addressed the Spectre v2
vulnerability for KVM guests by exposing the spec-ctrl feature
for all x86 vcpu types, which was the quick and dirty approach,
but not the proper solution.

We replaced our initial patch by the patches from upstream.

This update defines spec_ctrl and ibpb cpu feature flags as well as new
cpu models which are clones of existing models with either -IBRS or -IBPB
added to the end of the model name. These new vcpu models explicitly
include the new feature(s), whereas the feature flags can be added
to the cpu parameter as with other features. In short, for continued
Spectre v2 protection, ensure that either the appropriate cpu feature
flag is added to the QEMU command-line, or one of the new cpu models is
used.

Although migration from older versions is supported, the new cpu
features won't be properly exposed to the guest until it is restarted
with the cpu features explicitly added. A reboot is insufficient.

A warning patch is added which attempts to detect a migration
from a qemu version which had the quick and dirty fix (it only
detects certain cases, but hopefully is helpful.)
For additional information on Spectre v2 as it relates to QEMU,
see:
	https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/

A patch is added to continue to detect Spectre v2 mitigation
features (as shown by cpuid), and if found provide that feature
to guests, even if running on older KVM (kernel) versions which
do not yet expose that feature to QEMU. (bsc#1082276)

These two patches will be removed when we can reasonably assume
everyone is running with the appropriate updates.


Also security fixes for the following CVE issues are included:

- CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU), was vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. (bsc#1070144)
- CVE-2017-15124: VNC server implementation in Quick Emulator (QEMU) was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host. (bsc#1073489)
- CVE-2017-16845: The PS2 driver in Qemu did not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access. (bsc#1068613)
- CVE-2017-17381: The Virtio Vring implementation in QEMU allowed local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings. (bsc#1071228)
- CVE-2017-18030: A problem in the Cirrus driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. (bsc#1076179)
- CVE-2017-18043: Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allowed a user to cause a denial of service (Qemu process crash). (bsc#1076775)
- CVE-2018-5683: The VGA driver in Qemu allowed local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. (bsc#1076114)
- CVE-2018-7550: The multiboot functionality in Quick Emulator (aka QEMU) allowed local guest OS users to execute arbitrary code on the QEMU host via an out-of-bounds read or write memory access. (bsc#1083291)  

Also the following bugs were fixed:

- Eliminate bogus use of CPUID_7_0_EDX_PRED_CMD which we've
  carried since the initial Spectre v2 patch was added. EDX bit
  27 of CPUID Leaf 07H, Sub-leaf 0 provides status on STIBP, and
  not the PRED_CMD MSR. Exposing the STIBP CPUID feature bit to the
  guest is wrong in general, since the VM doesn't directly control
  the scheduling of physical hyperthreads. This is left strictly to
  the L0 hypervisor.

- Spectre fixes for IBM Z series by providing more hw features to guests
  (bsc#1076814)
- Pre-add group kvm for qemu-tools (bsc#1040202)
- the qemu-tools package also needs a prerequire of group management
  tools, from the shadow package. (bsc#1085598)


		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040202">SUSE bug 1040202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071228">SUSE bug 1071228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076775">SUSE bug 1076775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076814">SUSE bug 1076814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082276">SUSE bug 1082276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085598">SUSE bug 1085598</bugzilla>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80314" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003849.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2018-1050: DOS vulnerability when SPOOLSS is run externally (bsc#1081741)
  
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-27"/>
	<updated date="2018-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550856" comment="libdcerpc-binding0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550857" comment="libdcerpc-binding0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550858" comment="libdcerpc0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550859" comment="libdcerpc0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550860" comment="libndr-krb5pac0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550861" comment="libndr-krb5pac0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550862" comment="libndr-nbt0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550863" comment="libndr-nbt0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550864" comment="libndr-standard0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550865" comment="libndr-standard0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550866" comment="libndr0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550867" comment="libndr0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550868" comment="libnetapi0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550869" comment="libnetapi0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550870" comment="libsamba-credentials0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550871" comment="libsamba-credentials0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550872" comment="libsamba-errors0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550873" comment="libsamba-errors0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550874" comment="libsamba-hostconfig0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550875" comment="libsamba-hostconfig0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550876" comment="libsamba-passdb0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550877" comment="libsamba-passdb0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550878" comment="libsamba-util0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550879" comment="libsamba-util0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550880" comment="libsamdb0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550881" comment="libsamdb0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550882" comment="libsmbclient0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550883" comment="libsmbclient0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550884" comment="libsmbconf0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550885" comment="libsmbconf0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550886" comment="libsmbldap0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550887" comment="libsmbldap0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550888" comment="libtevent-util0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550889" comment="libtevent-util0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550890" comment="libwbclient0-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550891" comment="libwbclient0-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550892" comment="samba-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550893" comment="samba-client-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550894" comment="samba-client-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519111" comment="samba-doc-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550895" comment="samba-libs-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550896" comment="samba-libs-32bit-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550897" comment="samba-winbind-4.4.2-38.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550898" comment="samba-winbind-32bit-4.4.2-38.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80315" version="1" class="patch">
	<metadata>
		<title>Security update for memcached (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056865" ref_url="https://bugzilla.suse.com/1056865" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00069.html" source="SUSE-SU"/>
		<description>
This update for memcached fixes the following issues:

- CVE-2017-9951: Fixed heap-based buffer over-read in try_read_command function which allowed remote attackers to cause a denial of service attack (bsc#1056865).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550899" comment="memcached-1.4.39-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80316" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1057662" ref_url="https://bugzilla.suse.com/1057662" source="BUGZILLA"/>
		<reference ref_id="1081725" ref_url="https://bugzilla.suse.com/1081725" source="BUGZILLA"/>
		<reference ref_id="1083926" ref_url="https://bugzilla.suse.com/1083926" source="BUGZILLA"/>
		<reference ref_id="1083927" ref_url="https://bugzilla.suse.com/1083927" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<description>
This update for krb5 provides the following fixes:

Security issues fixed:

- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).

Non-security issues fixed:

- Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with
  newer Kerberos. System administrators who are experiencing this kind of compatibility
  issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value,
  and make sure the environment variable is visible and effective to the application
  startup script. (bsc#1057662)
- Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in
  gss_indicate_mech() list. (bsc#1081725)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1057662">SUSE bug 1057662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081725">SUSE bug 1081725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550900" comment="krb5-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550901" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550902" comment="krb5-client-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550903" comment="krb5-doc-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550904" comment="krb5-plugin-kdb-ldap-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550905" comment="krb5-plugin-preauth-otp-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550906" comment="krb5-plugin-preauth-pkinit-1.12.5-40.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550907" comment="krb5-server-1.12.5-40.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80317" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1085130" ref_url="https://bugzilla.suse.com/1085130" source="BUGZILLA"/>
		<reference ref_id="1085671" ref_url="https://bugzilla.suse.com/1085671" source="BUGZILLA"/>
		<reference ref_id="1087059" ref_url="https://bugzilla.suse.com/1087059" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed in Firefox ESR 52.7.3 (bsc#1085130):

- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7
- CVE-2018-5146: Out of bounds memory write in libvorbis (bsc#1085671)
- CVE-2018-5147: Out of bounds memory write in libtremor (bsc#1085671)
- CVE-2018-5148: Use-after-free in compositor (MFSA 2018-10) (bsc#1087059)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-03-29"/>
	<updated date="2018-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80318" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1043290" ref_url="https://bugzilla.suse.com/1043290" source="BUGZILLA"/>
		<reference ref_id="1050087" ref_url="https://bugzilla.suse.com/1050087" source="BUGZILLA"/>
		<reference ref_id="1056434" ref_url="https://bugzilla.suse.com/1056434" source="BUGZILLA"/>
		<reference ref_id="1058630" ref_url="https://bugzilla.suse.com/1058630" source="BUGZILLA"/>
		<reference ref_id="1059735" ref_url="https://bugzilla.suse.com/1059735" source="BUGZILLA"/>
		<reference ref_id="1060382" ref_url="https://bugzilla.suse.com/1060382" source="BUGZILLA"/>
		<reference ref_id="1066168" ref_url="https://bugzilla.suse.com/1066168" source="BUGZILLA"/>
		<reference ref_id="1066170" ref_url="https://bugzilla.suse.com/1066170" source="BUGZILLA"/>
		<reference ref_id="1082283" ref_url="https://bugzilla.suse.com/1082283" source="BUGZILLA"/>
		<reference ref_id="1082291" ref_url="https://bugzilla.suse.com/1082291" source="BUGZILLA"/>
		<reference ref_id="1082348" ref_url="https://bugzilla.suse.com/1082348" source="BUGZILLA"/>
		<reference ref_id="1082362" ref_url="https://bugzilla.suse.com/1082362" source="BUGZILLA"/>
		<reference ref_id="1082792" ref_url="https://bugzilla.suse.com/1082792" source="BUGZILLA"/>
		<reference ref_id="1082837" ref_url="https://bugzilla.suse.com/1082837" source="BUGZILLA"/>
		<reference ref_id="1083628" ref_url="https://bugzilla.suse.com/1083628" source="BUGZILLA"/>
		<reference ref_id="1083634" ref_url="https://bugzilla.suse.com/1083634" source="BUGZILLA"/>
		<reference ref_id="1086011" ref_url="https://bugzilla.suse.com/1086011" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524/" source="CVE"/>
		<reference ref_id="CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692/" source="CVE"/>
		<reference ref_id="CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693/" source="CVE"/>
		<reference ref_id="CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768/" source="CVE"/>
		<reference ref_id="CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314/" source="CVE"/>
		<reference ref_id="CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505/" source="CVE"/>
		<reference ref_id="CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739/" source="CVE"/>
		<reference ref_id="CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016/" source="CVE"/>
		<reference ref_id="CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017/" source="CVE"/>
		<reference ref_id="CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352/" source="CVE"/>
		<reference ref_id="CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353/" source="CVE"/>
		<reference ref_id="CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209/" source="CVE"/>
		<reference ref_id="CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211/" source="CVE"/>
		<reference ref_id="CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500/" source="CVE"/>
		<reference ref_id="CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443/" source="CVE"/>
		<reference ref_id="CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a
  denial of service (double free and application crash) or possibly have
  unspecified other impact via a crafted file (bsc#1086011).
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a
  denial of service (assertion failure and application exit) via a crafted file
  (bsc#1050087).
- CVE-2017-18209: Prevent NULL pointer dereference in the
  GetOpenCLCachedFilesDirectory function caused by a memory allocation result
  that was not checked, related to GetOpenCLCacheDirectory (bsc#1083628).
- CVE-2017-18211: Prevent NULL pointer dereference in the function
  saveBinaryCLProgram caused by a program-lookup result not being checked,
  related to CacheOpenCLKernel (bsc#1083634).
- CVE-2017-9500: Prevent assertion failure in the function
  ResetImageProfileIterator, which allowed attackers to cause a denial of service
  via a crafted file (bsc#1043290).
- CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed
  memory allocation, which allowed remote attackers to cause a denial of service
  (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and
  application crash) via unspecified vectors (bsc#1060382).
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage
  function caused by a heap-based buffer over-read. The portion of the code
  containing the vulnerability is responsible for printing the IPTC Profile
  information contained in the image. This vulnerability can be triggered with a
  specially crafted MIFF file. There is an out-of-bounds buffer dereference
  because certain increments were never checked (bsc#1066170).
- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual
  image directory' feature of the DescribeImage() function. One possible way to
  trigger the vulnerability is to run the identify command on a specially crafted
  MIFF format file with the verbose flag (bsc#1066168).
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
  allowed remote attackers to cause a denial of service (DrawDashPolygon
  heap-based buffer over-read and application crash) via a crafted file
  (bsc#1058630).
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
  function that allowed an attacker to perform denial of service by sending a
  crafted image file (bsc#1056434).
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to
  perform Denial of Service (NULL pointer dereference and application crash in
  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image
  File as input (bsc#1059735).
- CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a
  denial of service (segmentation violation) via a crafted file (bsc#1082837).
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
  amount of image data in a file, which allowed remote attackers to cause a
  denial of service (memory allocation failure in the AcquireMagickMemory
  function in MagickCore/memory.c) (bsc#1082792).
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
  ReadEnhMetaFile allowing for denial of service (bsc#1082291).
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
  ReadOneMNGImage allowing for denial of service (bsc#1082283).
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause
  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362).
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a
  denial of service (memory consumption) via a crafted BMP file (bsc#1082348).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060382">SUSE bug 1060382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082837">SUSE bug 1082837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083628">SUSE bug 1083628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083634">SUSE bug 1083634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80319" version="1" class="patch">
	<metadata>
		<title>Security update for graphite2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1084850" ref_url="https://bugzilla.suse.com/1084850" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
		<description>
This update for graphite2 fixes the following issues:

- CVE-2018-7999: Fixed a NULL pointer dereference vulnerability in Segment.cpp that may cause a denial of serivce (bsc#1084850).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550912" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550913" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80320" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1078808" ref_url="https://bugzilla.suse.com/1078808" source="BUGZILLA"/>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1080042" ref_url="https://bugzilla.suse.com/1080042" source="BUGZILLA"/>
		<reference ref_id="1082041" ref_url="https://bugzilla.suse.com/1082041" source="BUGZILLA"/>
		<reference ref_id="1083625" ref_url="https://bugzilla.suse.com/1083625" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2017-5715: Fixes for speculative side channel attacks aka 'SpectreAttack' (var2) (bsc#1079869).
- CVE-2018-6764: Fixed guest executable code injection via libnss_dns.so loaded by libvirt_lxc before init (bsc#1080042).
- CVE-2018-1064: Fixed denial of service when reading from guest agent (bsc#1083625).


Non-security issues fixed:

- Error starting domain: internal error: No usable sysfs TPM cancel file could  be found (bsc#1078808).
- SUSE Linux Enterprise 11 SP4 hvm converted to pvhvm. Unless vm memory is on gig boundary, vm won't boot (bsc#1082041).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-03"/>
	<updated date="2018-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1078808">SUSE bug 1078808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082041">SUSE bug 1082041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="low" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550914" comment="libvirt-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550915" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550916" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550917" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550918" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550919" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550920" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550921" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550922" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550923" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550924" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550925" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550926" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550927" comment="libvirt-daemon-hooks-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550928" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550929" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550930" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550931" comment="libvirt-lock-sanlock-2.0.0-27.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550932" comment="libvirt-nss-2.0.0-27.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80321" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1017690" ref_url="https://bugzilla.suse.com/1017690" source="BUGZILLA"/>
		<reference ref_id="1069213" ref_url="https://bugzilla.suse.com/1069213" source="BUGZILLA"/>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="969783" ref_url="https://bugzilla.suse.com/969783" source="BUGZILLA"/>
		<reference ref_id="983436" ref_url="https://bugzilla.suse.com/983436" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<description>
This update for tiff to version 4.0.9 fixes the following issues:

Security issues fixed:

- CVE-2014-8128: Fix out-of-bounds read with malformed TIFF image in multiple tools (bsc#969783).
- CVE-2015-7554: Fix invalid write in tiffsplit / _TIFFVGetField (bsc#960341).
- CVE-2016-10095: Fix stack-based buffer overflow in _TIFFVGetField (tif_dir.c) (bsc#1017690).
- CVE-2016-5318: Fix stackoverflow in thumbnail (bsc#983436).
- CVE-2017-16232: Fix memory-based DoS in tiff2bw (bsc#1069213).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069213">SUSE bug 1069213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80322" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1081925" ref_url="https://bugzilla.suse.com/1081925" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003872.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2018-1058: Fixed uncontrolled search path element in pg_dump and other client applications (bsc#1081925).


Bug fixes:

- See release notes for details:
  * https://www.postgresql.org/docs/9.4/static/release-9-4-17.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-16.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-05"/>
	<updated date="2018-04-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550936" comment="postgresql94-9.4.17-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550937" comment="postgresql94-contrib-9.4.17-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533353" comment="postgresql94-docs-9.4.17-21.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550938" comment="postgresql94-server-9.4.17-21.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80323" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1049305" ref_url="https://bugzilla.suse.com/1049305" source="BUGZILLA"/>
		<reference ref_id="1049306" ref_url="https://bugzilla.suse.com/1049306" source="BUGZILLA"/>
		<reference ref_id="1049307" ref_url="https://bugzilla.suse.com/1049307" source="BUGZILLA"/>
		<reference ref_id="1049309" ref_url="https://bugzilla.suse.com/1049309" source="BUGZILLA"/>
		<reference ref_id="1049310" ref_url="https://bugzilla.suse.com/1049310" source="BUGZILLA"/>
		<reference ref_id="1049311" ref_url="https://bugzilla.suse.com/1049311" source="BUGZILLA"/>
		<reference ref_id="1049312" ref_url="https://bugzilla.suse.com/1049312" source="BUGZILLA"/>
		<reference ref_id="1049313" ref_url="https://bugzilla.suse.com/1049313" source="BUGZILLA"/>
		<reference ref_id="1049314" ref_url="https://bugzilla.suse.com/1049314" source="BUGZILLA"/>
		<reference ref_id="1049315" ref_url="https://bugzilla.suse.com/1049315" source="BUGZILLA"/>
		<reference ref_id="1049316" ref_url="https://bugzilla.suse.com/1049316" source="BUGZILLA"/>
		<reference ref_id="1049317" ref_url="https://bugzilla.suse.com/1049317" source="BUGZILLA"/>
		<reference ref_id="1049318" ref_url="https://bugzilla.suse.com/1049318" source="BUGZILLA"/>
		<reference ref_id="1049319" ref_url="https://bugzilla.suse.com/1049319" source="BUGZILLA"/>
		<reference ref_id="1049320" ref_url="https://bugzilla.suse.com/1049320" source="BUGZILLA"/>
		<reference ref_id="1049321" ref_url="https://bugzilla.suse.com/1049321" source="BUGZILLA"/>
		<reference ref_id="1049322" ref_url="https://bugzilla.suse.com/1049322" source="BUGZILLA"/>
		<reference ref_id="1049323" ref_url="https://bugzilla.suse.com/1049323" source="BUGZILLA"/>
		<reference ref_id="1049324" ref_url="https://bugzilla.suse.com/1049324" source="BUGZILLA"/>
		<reference ref_id="1049325" ref_url="https://bugzilla.suse.com/1049325" source="BUGZILLA"/>
		<reference ref_id="1049326" ref_url="https://bugzilla.suse.com/1049326" source="BUGZILLA"/>
		<reference ref_id="1049327" ref_url="https://bugzilla.suse.com/1049327" source="BUGZILLA"/>
		<reference ref_id="1049328" ref_url="https://bugzilla.suse.com/1049328" source="BUGZILLA"/>
		<reference ref_id="1049329" ref_url="https://bugzilla.suse.com/1049329" source="BUGZILLA"/>
		<reference ref_id="1049330" ref_url="https://bugzilla.suse.com/1049330" source="BUGZILLA"/>
		<reference ref_id="1049331" ref_url="https://bugzilla.suse.com/1049331" source="BUGZILLA"/>
		<reference ref_id="1049332" ref_url="https://bugzilla.suse.com/1049332" source="BUGZILLA"/>
		<reference ref_id="1052318" ref_url="https://bugzilla.suse.com/1052318" source="BUGZILLA"/>
		<reference ref_id="1064071" ref_url="https://bugzilla.suse.com/1064071" source="BUGZILLA"/>
		<reference ref_id="1064072" ref_url="https://bugzilla.suse.com/1064072" source="BUGZILLA"/>
		<reference ref_id="1064073" ref_url="https://bugzilla.suse.com/1064073" source="BUGZILLA"/>
		<reference ref_id="1064075" ref_url="https://bugzilla.suse.com/1064075" source="BUGZILLA"/>
		<reference ref_id="1064077" ref_url="https://bugzilla.suse.com/1064077" source="BUGZILLA"/>
		<reference ref_id="1064078" ref_url="https://bugzilla.suse.com/1064078" source="BUGZILLA"/>
		<reference ref_id="1064079" ref_url="https://bugzilla.suse.com/1064079" source="BUGZILLA"/>
		<reference ref_id="1064080" ref_url="https://bugzilla.suse.com/1064080" source="BUGZILLA"/>
		<reference ref_id="1064081" ref_url="https://bugzilla.suse.com/1064081" source="BUGZILLA"/>
		<reference ref_id="1064082" ref_url="https://bugzilla.suse.com/1064082" source="BUGZILLA"/>
		<reference ref_id="1064083" ref_url="https://bugzilla.suse.com/1064083" source="BUGZILLA"/>
		<reference ref_id="1064084" ref_url="https://bugzilla.suse.com/1064084" source="BUGZILLA"/>
		<reference ref_id="1064085" ref_url="https://bugzilla.suse.com/1064085" source="BUGZILLA"/>
		<reference ref_id="1064086" ref_url="https://bugzilla.suse.com/1064086" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed:

- CVE-2017-10356: Fix issue inside subcomponent Security (bsc#1064084).
- CVE-2017-10274: Fix issue inside subcomponent Smart Card IO (bsc#1064071).
- CVE-2017-10281: Fix issue inside subcomponent Serialization (bsc#1064072).
- CVE-2017-10285: Fix issue inside subcomponent RMI (bsc#1064073).
- CVE-2017-10295: Fix issue inside subcomponent Networking (bsc#1064075).
- CVE-2017-10388: Fix issue inside subcomponent Libraries (bsc#1064086).
- CVE-2017-10346: Fix issue inside subcomponent Hotspot (bsc#1064078).
- CVE-2017-10350: Fix issue inside subcomponent JAX-WS (bsc#1064082).
- CVE-2017-10347: Fix issue inside subcomponent Serialization (bsc#1064079).
- CVE-2017-10349: Fix issue inside subcomponent JAXP (bsc#1064081).
- CVE-2017-10345: Fix issue inside subcomponent Serialization (bsc#1064077).
- CVE-2017-10348: Fix issue inside subcomponent Libraries (bsc#1064080).
- CVE-2017-10357: Fix issue inside subcomponent Serialization (bsc#1064085).
- CVE-2017-10355: Fix issue inside subcomponent Networking (bsc#1064083).
- CVE-2017-10102: Fix incorrect handling of references in DGC (bsc#1049316).
- CVE-2017-10053: Fix reading of unprocessed image data in JPEGImageReader (bsc#1049305).
- CVE-2017-10067: Fix JAR verifier incorrect handling of missing digest (bsc#1049306).
- CVE-2017-10081: Fix incorrect bracket processing in function signature handling (bsc#1049309).
- CVE-2017-10087: Fix insufficient access control checks in ThreadPoolExecutor (bsc#1049311).
- CVE-2017-10089: Fix insufficient access control checks in ServiceRegistry (bsc#1049312).
- CVE-2017-10090: Fix insufficient access control checks in AsynchronousChannelGroupImpl (bsc#1049313).
- CVE-2017-10096: Fix insufficient access control checks in XML transformations (bsc#1049314).
- CVE-2017-10101: Fix unrestricted access to com.sun.org.apache.xml.internal.resolver (bsc#1049315).
- CVE-2017-10107: Fix insufficient access control checks in ActivationID (bsc#1049318).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10110: Fix insufficient access control checks in ImageWatched (bsc#1049321).
- CVE-2017-10108: Fix unbounded memory allocation in BasicAttribute deserialization (bsc#1049319).
- CVE-2017-10109: Fix unbounded memory allocation in CodeSource deserialization (bsc#1049320).
- CVE-2017-10115: Fix unspecified vulnerability in subcomponent JCE (bsc#1049324).
- CVE-2017-10118: Fix ECDSA implementation timing attack (bsc#1049326).
- CVE-2017-10116: Fix LDAPCertStore following referrals to non-LDAP URL (bsc#1049325).
- CVE-2017-10135: Fix PKCS#8 implementation timing attack (bsc#1049328).
- CVE-2017-10176: Fix incorrect handling of certain EC points (bsc#1049329).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10074: Fix integer overflows in range check loop predicates (bsc#1049307).
- CVE-2017-10111: Fix checks in LambdaFormEditor (bsc#1049322).
- CVE-2017-10243: Fix unspecified vulnerability in subcomponent JAX-WS (bsc#1049332).
- CVE-2017-10125: Fix unspecified vulnerability in subcomponent deployment (bsc#1049327).
- CVE-2017-10114: Fix unspecified vulnerability in subcomponent JavaFX (bsc#1049323).
- CVE-2017-10105: Fix unspecified vulnerability in subcomponent deployment (bsc#1049317).
- CVE-2017-10086: Fix unspecified in subcomponent JavaFX (bsc#1049310).
- CVE-2017-10198: Fix incorrect enforcement of certificate path restrictions (bsc#1049331).
- CVE-2017-10193: Fix incorrect key size constraint check (bsc#1049330).

Bug fixes:

- Drop Exec Shield workaround to fix crashes on recent kernels, where Exec Shield is gone (bsc#1052318).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-03"/>
	<updated date="2018-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052318">SUSE bug 1052318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80324" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1072834" ref_url="https://bugzilla.suse.com/1072834" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1080635" ref_url="https://bugzilla.suse.com/1080635" source="BUGZILLA"/>
		<reference ref_id="1080662" ref_url="https://bugzilla.suse.com/1080662" source="BUGZILLA"/>
		<reference ref_id="1087251" ref_url="https://bugzilla.suse.com/1087251" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<description>

  
This update for xen fixes the following issues:

Update to Xen 4.7.5 bug fix only release (bsc#1027519)

Security issues fixed:

- CVE-2018-7540: Fixed DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) (bsc#1080635)
- CVE-2018-7541: A grant table v2 -&gt; v1 transition may crash Xen (XSA-255) (bsc#1080662)
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 Fixed information leaks via
  side effects of speculative execution (XSA-254). Includes Spectre v2
  mitigation. (bsc#1074562)


- Preserve xen-syms from xen-dbg.gz to allow processing vmcores
  with crash(1) (bsc#1087251)
- Xen HVM: Fixed unchecked MSR access error (bsc#1072834)
- Add script, udev rule and systemd service to watch for vcpu
  online/offline events in a HVM domU They are triggered via xl vcpu-set
  domU N (fate#324965)
- Make sure tools and tools-domU require libs from the very same build

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-10"/>
	<updated date="2018-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072834">SUSE bug 1072834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087251">SUSE bug 1087251</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550943" comment="xen-doc-html-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550944" comment="xen-tools-4.7.5_02-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550945" comment="xen-tools-domU-4.7.5_02-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80325" version="1" class="patch">
	<metadata>
		<title>Security update for policycoreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1083624" ref_url="https://bugzilla.suse.com/1083624" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003887.html" source="SUSE-SU"/>
		<description>
This update for policycoreutils fixes the following issues:

- CVE-2018-1063: Fixed problem to prevent chcon from following symlinks in /tmp, /var/tmp, /var/run and /var/lib/debug (bsc#1083624).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550946" comment="policycoreutils-2.5-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550947" comment="policycoreutils-python-2.5-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80326" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1087102" ref_url="https://bugzilla.suse.com/1087102" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

    - CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) 
    could eventually exceed the stack given malicious input with excessive recursion. This could result 
    in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from 
    untrusted sources so this is considered safe. (bsc#1087102).

		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-11"/>
	<updated date="2018-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009541426" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550948" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550949" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550950" comment="libopenssl1_0_0-hmac-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550951" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550952" comment="openssl-1.0.2j-60.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533365" comment="openssl-doc-1.0.2j-60.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80327" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1062538" ref_url="https://bugzilla.suse.com/1062538" source="BUGZILLA"/>
		<reference ref_id="1067844" ref_url="https://bugzilla.suse.com/1067844" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issues fixed:

- CVE-2017-15098: Fix crash due to rowtype mismatch in json{b}_populate_recordset() (bsc#1067844).
- CVE-2017-12172: Start scripts permit database administrator to modify root-owned files. This issue did not affect SUSE (bsc#1062538).

Bug fixes:

- Update to version 9.4.15
  * https://www.postgresql.org/docs/9.4/static/release-9-4-15.html
  * https://www.postgresql.org/docs/9.4/static/release-9-4-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550953" comment="postgresql94-9.4.15-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550954" comment="postgresql94-contrib-9.4.15-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009533368" comment="postgresql94-docs-9.4.15-21.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550955" comment="postgresql94-server-9.4.15-21.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80328" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1039034" ref_url="https://bugzilla.suse.com/1039034" source="BUGZILLA"/>
		<reference ref_id="1049399" ref_url="https://bugzilla.suse.com/1049399" source="BUGZILLA"/>
		<reference ref_id="1049404" ref_url="https://bugzilla.suse.com/1049404" source="BUGZILLA"/>
		<reference ref_id="1049417" ref_url="https://bugzilla.suse.com/1049417" source="BUGZILLA"/>
		<reference ref_id="1054591" ref_url="https://bugzilla.suse.com/1054591" source="BUGZILLA"/>
		<reference ref_id="1072665" ref_url="https://bugzilla.suse.com/1072665" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes several issues.

These security issues were fixed:

- CVE-2017-3636: Client programs had an unspecified vulnerability that could
  lead to unauthorized access and denial of service (bsc#1049399)
- CVE-2017-3641: DDL unspecified vulnerability could lead to denial of service
  (bsc#1049404)
- CVE-2017-3653: DML Unspecified vulnerability could lead to unauthorized
  database access (bsc#1049417)

This non-security issues was fixed:

- Add ODBC support for Connect engine (bsc#1039034)
- Relax required version for mariadb-errormessages (bsc#1072665)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-12"/>
	<updated date="2018-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1039034">SUSE bug 1039034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072665">SUSE bug 1072665</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550956" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550957" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550958" comment="mariadb-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550959" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550960" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550961" comment="mariadb-tools-10.0.32-29.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80329" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536734" comment="kgraft-patch-4_4_59-92_24-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80330" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536735" comment="kgraft-patch-4_4_59-92_17-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80331" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536736" comment="kgraft-patch-4_4_114-92_64-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80332" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_35 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536737" comment="kgraft-patch-4_4_74-92_35-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80333" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536738" comment="kgraft-patch-4_4_74-92_29-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80334" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536739" comment="kgraft-patch-4_4_74-92_32-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80335" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536740" comment="kgraft-patch-4_4_103-92_56-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80336" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536741" comment="kgraft-patch-4_4_103-92_53-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80337" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536742" comment="kgraft-patch-4_4_114-92_67-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80338" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536743" comment="kgraft-patch-4_4_90-92_45-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80339" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536744" comment="kgraft-patch-4_4_90-92_50-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80340" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1001600" ref_url="https://bugzilla.suse.com/1001600" source="BUGZILLA"/>
		<reference ref_id="974655" ref_url="https://bugzilla.suse.com/974655" source="BUGZILLA"/>
		<reference ref_id="980722" ref_url="https://bugzilla.suse.com/980722" source="BUGZILLA"/>
		<reference ref_id="994989" ref_url="https://bugzilla.suse.com/994989" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes two security issues and two bugs.

The following vulnerabilities were fixed:

- CVE-2016-4912: A remote attacker could have crashed the server with a large
  number of packages (bsc#980722)
- CVE-2016-7567: A remote attacker could cause a memory corruption having
  unspecified impact (bsc#1001600)

The following bugfix changes are included:

- bsc#994989: Removed convenience code as changes bytes in the message buffer
  breaking the verification code
- bsc#974655: Removed no longer needed slpd init file
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-15"/>
	<updated date="2018-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1001600">SUSE bug 1001600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974655">SUSE bug 974655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980722">SUSE bug 980722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994989">SUSE bug 994989</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550962" comment="openslp-2.0.0-18.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550963" comment="openslp-32bit-2.0.0-18.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550964" comment="openslp-server-2.0.0-18.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80341" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536745" comment="kgraft-patch-4_4_59-92_20-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80342" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073230" ref_url="https://bugzilla.suse.com/1073230" source="BUGZILLA"/>
		<reference ref_id="1076017" ref_url="https://bugzilla.suse.com/1076017" source="BUGZILLA"/>
		<reference ref_id="1083488" ref_url="https://bugzilla.suse.com/1083488" source="BUGZILLA"/>
		<reference ref_id="1085114" ref_url="https://bugzilla.suse.com/1085114" source="BUGZILLA"/>
		<reference ref_id="1085447" ref_url="https://bugzilla.suse.com/1085447" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issues were fixed:

- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-04-20"/>
	<updated date="2018-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536746" comment="kgraft-patch-4_4_74-92_38-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80343" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Add microcode_amd_fam17h.bin (bsc#1068032 CVE-2017-5715)

This new firmware disables branch prediction on AMD family 17h
processor to mitigate a attack on the branch predictor that could
lead to information disclosure from e.g. kernel memory (bsc#1068032
CVE-2017-5715).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-04"/>
	<updated date="2018-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519174" comment="kernel-firmware-20170530-21.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519175" comment="ucode-amd-20170530-21.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80344" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1086774" ref_url="https://bugzilla.suse.com/1086774" source="BUGZILLA"/>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086813" ref_url="https://bugzilla.suse.com/1086813" source="BUGZILLA"/>
		<reference ref_id="1086814" ref_url="https://bugzilla.suse.com/1086814" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="1086820" ref_url="https://bugzilla.suse.com/1086820" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715/" source="CVE"/>
		<reference ref_id="CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1302" ref_url="https://www.suse.com/security/cve/CVE-2018-1302/" source="CVE"/>
		<reference ref_id="CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

  * CVE-2018-1283:  when mod_session is configured to forward its session data to CGI applications 
                    (SessionEnv on, not the default), a remote user may influence their content by 
                    using a \'Session\' header leading to unexpected behavior [bsc#1086814].

  * CVE-2018-1301: due to an out of bound access after a size limit being reached by reading the HTTP header, 
                   a specially crafted request could lead to remote denial of service. [bsc#1086817]
  
  * CVE-2018-1303: a specially crafted HTTP request header could lead to crash due to an out of bound read 
                   while preparing data to be cached in shared memory.[bsc#1086813]
  
  * CVE-2017-15715: a regular expression could match '$' to a newline character in a malicious filename, 
                    rather than matching only the end of the filename. leading to corruption of uploaded files.[bsc#1086774]
  
  * CVE-2018-1312: when generating an HTTP Digest authentication challenge, the nonce sent to prevent 
                   reply attacks was not correctly generated using a pseudo-random seed. 
                   In a cluster of servers using a common Digest authentication configuration, 
                   HTTP requests could be replayed across servers by an attacker without detection. [bsc#1086775]
  
  * CVE-2017-15710: mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, 
                    uses the Accept-Language header value to lookup the right charset encoding when verifying the 
                    user's credentials. If the header value is not present in the charset conversion table, 
                    a fallback mechanism is used to truncate it to a two characters value to allow a quick retry 
                    (for example, 'en-US' is truncated to 'en'). 
                    A header value of less than two characters forces an out of bound write of one NUL byte to a 
                   memory location that is not part of the string. In the worst case, quite unlikely, the process 
                   would crash which could be used as a Denial of Service attack. In the more likely case, this memory 
                   is already reserved for future use and the issue has no effect at all. [bsc#1086820]
  
  * CVE-2018-1302: when an HTTP/2 stream was destroyed after being handled, it 
                   could have written a NULL pointer potentially to an already freed memory. 
                   The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, 
                   the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk. 
                   [bsc#1086820]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-07"/>
	<updated date="2018-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086820">SUSE bug 1086820</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1302/">CVE-2018-1302</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80345" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1057734" ref_url="https://bugzilla.suse.com/1057734" source="BUGZILLA"/>
		<reference ref_id="1070536" ref_url="https://bugzilla.suse.com/1070536" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076847" ref_url="https://bugzilla.suse.com/1076847" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1083745" ref_url="https://bugzilla.suse.com/1083745" source="BUGZILLA"/>
		<reference ref_id="1083836" ref_url="https://bugzilla.suse.com/1083836" source="BUGZILLA"/>
		<reference ref_id="1084353" ref_url="https://bugzilla.suse.com/1084353" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1084829" ref_url="https://bugzilla.suse.com/1084829" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085402" ref_url="https://bugzilla.suse.com/1085402" source="BUGZILLA"/>
		<reference ref_id="1085404" ref_url="https://bugzilla.suse.com/1085404" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1086194" ref_url="https://bugzilla.suse.com/1086194" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087845" ref_url="https://bugzilla.suse.com/1087845" source="BUGZILLA"/>
		<reference ref_id="1088241" ref_url="https://bugzilla.suse.com/1088241" source="BUGZILLA"/>
		<reference ref_id="1088242" ref_url="https://bugzilla.suse.com/1088242" source="BUGZILLA"/>
		<reference ref_id="1088600" ref_url="https://bugzilla.suse.com/1088600" source="BUGZILLA"/>
		<reference ref_id="1088684" ref_url="https://bugzilla.suse.com/1088684" source="BUGZILLA"/>
		<reference ref_id="1089198" ref_url="https://bugzilla.suse.com/1089198" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1090643" ref_url="https://bugzilla.suse.com/1090643" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)

The following non-security bugs were fixed:

- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&amp;W PX headphones (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: Remove Other from EIAC (bsc#1075428).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- rpm/config.sh: ensure sorted patches.
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).
- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).
- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-08"/>
	<updated date="2018-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057734">SUSE bug 1057734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070536">SUSE bug 1070536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076847">SUSE bug 1076847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083745">SUSE bug 1083745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083836">SUSE bug 1083836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085402">SUSE bug 1085402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085404">SUSE bug 1085404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086194">SUSE bug 1086194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087845">SUSE bug 1087845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088242">SUSE bug 1088242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088600">SUSE bug 1088600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088684">SUSE bug 1088684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089198">SUSE bug 1089198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80346" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1028842" ref_url="https://bugzilla.suse.com/1028842" source="BUGZILLA"/>
		<reference ref_id="1062063" ref_url="https://bugzilla.suse.com/1062063" source="BUGZILLA"/>
		<reference ref_id="1066644" ref_url="https://bugzilla.suse.com/1066644" source="BUGZILLA"/>
		<reference ref_id="1071459" ref_url="https://bugzilla.suse.com/1071459" source="BUGZILLA"/>
		<reference ref_id="1071460" ref_url="https://bugzilla.suse.com/1071460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433/" source="CVE"/>
		<reference ref_id="CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes several issues.

These security issues were fixed:

- CVE-2017-17434: The daemon in rsync did not check for fnamecmp filenames in
  the daemon_filter_list data structure (in the recv_files function in
  receiver.c) and also did not apply the sanitize_paths protection mechanism to
  pathnames found in 'xname follows' strings (in the read_ndx_and_attrs function
  in rsync.c), which allowed remote attackers to bypass intended access
  restrictions' (bsc#1071460).
- CVE-2017-17433: The recv_files function in receiver.c in the daemon in rsync,
  proceeded with certain file metadata updates before checking for a filename in
  the daemon_filter_list data structure, which allowed remote attackers to bypass
  intended access restrictions (bsc#1071459).
- CVE-2017-16548: The receive_xattr function in xattrs.c in rsync did not check
  for a trailing '\\0' character in an xattr name, which allowed remote attackers
  to cause a denial of service (heap-based buffer over-read and application
  crash) or possibly have unspecified other impact by sending crafted data to the
  daemon (bsc#1066644).

This non-security issue was fixed:

- Stop file upload after errors like a full disk (bsc#1062063)
- Ensure -X flag works even when setting owner/group (bsc#1028842)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1028842">SUSE bug 1028842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062063">SUSE bug 1062063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550975" comment="rsync-3.1.0-13.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80347" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).

These non-security issues were fixed:

- bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly
- bsc#1027519: Fixed shadow mode guests
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80348" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1056127" ref_url="https://bugzilla.suse.com/1056127" source="BUGZILLA"/>
		<reference ref_id="1056128" ref_url="https://bugzilla.suse.com/1056128" source="BUGZILLA"/>
		<reference ref_id="1056129" ref_url="https://bugzilla.suse.com/1056129" source="BUGZILLA"/>
		<reference ref_id="1056131" ref_url="https://bugzilla.suse.com/1056131" source="BUGZILLA"/>
		<reference ref_id="1056132" ref_url="https://bugzilla.suse.com/1056132" source="BUGZILLA"/>
		<reference ref_id="1056136" ref_url="https://bugzilla.suse.com/1056136" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728/" source="CVE"/>
		<reference ref_id="CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729/" source="CVE"/>
		<reference ref_id="CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730/" source="CVE"/>
		<reference ref_id="CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731/" source="CVE"/>
		<reference ref_id="CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732/" source="CVE"/>
		<reference ref_id="CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

Security issues fixed:

- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550976" comment="libncurses5-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550977" comment="libncurses5-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550978" comment="libncurses6-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550979" comment="libncurses6-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009541433" comment="ncurses-devel-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550980" comment="ncurses-devel-32bit-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550981" comment="ncurses-utils-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550982" comment="tack-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550983" comment="terminfo-5.9-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550984" comment="terminfo-base-5.9-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80349" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00039.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536757" comment="kgraft-patch-4_4_120-92_70-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80350" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00041.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536758" comment="kgraft-patch-4_4_90-92_50-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80351" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00045.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536759" comment="kgraft-patch-4_4_90-92_45-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80352" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00061.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536760" comment="kgraft-patch-4_4_103-92_56-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80353" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00050.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536761" comment="kgraft-patch-4_4_103-92_53-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80354" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00074.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536762" comment="kgraft-patch-4_4_74-92_32-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80355" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00053.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536763" comment="kgraft-patch-4_4_74-92_29-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80356" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1069222" ref_url="https://bugzilla.suse.com/1069222" source="BUGZILLA"/>
		<reference ref_id="1069226" ref_url="https://bugzilla.suse.com/1069226" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2017-8816: Buffer overrun flaw in the NTLM authentication code (bsc#1069226).
- CVE-2017-8817: Read out of bounds flaw in the FTP wildcard function (bsc#1069222).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550985" comment="curl-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550986" comment="libcurl4-7.37.0-37.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550987" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80357" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00070.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536764" comment="kgraft-patch-4_4_74-92_38-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80358" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00030.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.74-92_35 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536765" comment="kgraft-patch-4_4_74-92_35-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80359" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00023.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536766" comment="kgraft-patch-4_4_114-92_67-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80360" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00056.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536767" comment="kgraft-patch-4_4_114-92_64-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80361" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00036.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536768" comment="kgraft-patch-4_4_59-92_17-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80362" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00042.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536769" comment="kgraft-patch-4_4_59-92_20-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80363" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088268" ref_url="https://bugzilla.suse.com/1088268" source="BUGZILLA"/>
		<reference ref_id="1090036" ref_url="https://bugzilla.suse.com/1090036" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00064.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.

The following security issues were fixed:

- CVE-2018-1000199: A bug in x86 debug register handling of ptrace() could lead to memory corruption, possibly a denial of service or privilege escalation (bsc#1090036). 
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allowed attackers to gain privileges via unspecified vectors (bsc#1088268).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-11"/>
	<updated date="2018-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536770" comment="kgraft-patch-4_4_59-92_24-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80364" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-LibXML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1046848" ref_url="https://bugzilla.suse.com/1046848" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-LibXML fixes the following issues:

Security issue fixed:

- CVE-2017-10672: Fix use-after-free that allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-17"/>
	<updated date="2018-01-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550988" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80365" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<description>
This update for curl fixes several issues:

Security issues fixed:

- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:

- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
  (bsc#1086825)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-17"/>
	<updated date="2018-05-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546202" comment="curl-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546203" comment="libcurl4-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546204" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80366" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to the ESR 52.8 release fixes the following issues:

Mozil to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-18"/>
	<updated date="2018-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546205" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546206" comment="MozillaFirefox-devel-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80367" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1079405" ref_url="https://bugzilla.suse.com/1079405" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

This feature was added:

- Add support for block resize support for xen disks through the monitor

This non-security issue was fixed:

- bsc#1079405: Add new look up path 'sys/class/tpm' for tpm cancel path based
  on Linux 4.0 change
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-21"/>
	<updated date="2018-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079405">SUSE bug 1079405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550989" comment="qemu-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550990" comment="qemu-block-curl-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530396" comment="qemu-block-rbd-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550991" comment="qemu-block-ssh-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550992" comment="qemu-guest-agent-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530399" comment="qemu-ipxe-1.0.0-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550993" comment="qemu-kvm-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550994" comment="qemu-lang-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536776" comment="qemu-ppc-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550995" comment="qemu-s390-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530402" comment="qemu-seabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530403" comment="qemu-sgabios-8-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550996" comment="qemu-tools-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530405" comment="qemu-vgabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530406" comment="qemu-x86-2.6.2-41.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80368" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1090953" ref_url="https://bugzilla.suse.com/1090953" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1092289" ref_url="https://bugzilla.suse.com/1092289" source="BUGZILLA"/>
		<reference ref_id="1093215" ref_url="https://bugzilla.suse.com/1093215" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

The following related and non-security bugs were fixed:

- cpuid: Fix cpuid.edx.7.0 propagation to guest
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-22"/>
	<updated date="2018-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090953">SUSE bug 1090953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092289">SUSE bug 1092289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093215">SUSE bug 1093215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009550997" comment="kernel-default-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550998" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009550999" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551000" comment="kernel-default-man-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551001" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80369" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2</platform>
		</affected>
		<reference ref_id="1047044" ref_url="https://bugzilla.suse.com/1047044" source="BUGZILLA"/>
		<reference ref_id="1047898" ref_url="https://bugzilla.suse.com/1047898" source="BUGZILLA"/>
		<reference ref_id="1050120" ref_url="https://bugzilla.suse.com/1050120" source="BUGZILLA"/>
		<reference ref_id="1050606" ref_url="https://bugzilla.suse.com/1050606" source="BUGZILLA"/>
		<reference ref_id="1051446" ref_url="https://bugzilla.suse.com/1051446" source="BUGZILLA"/>
		<reference ref_id="1052468" ref_url="https://bugzilla.suse.com/1052468" source="BUGZILLA"/>
		<reference ref_id="1052550" ref_url="https://bugzilla.suse.com/1052550" source="BUGZILLA"/>
		<reference ref_id="1052710" ref_url="https://bugzilla.suse.com/1052710" source="BUGZILLA"/>
		<reference ref_id="1052720" ref_url="https://bugzilla.suse.com/1052720" source="BUGZILLA"/>
		<reference ref_id="1052731" ref_url="https://bugzilla.suse.com/1052731" source="BUGZILLA"/>
		<reference ref_id="1052732" ref_url="https://bugzilla.suse.com/1052732" source="BUGZILLA"/>
		<reference ref_id="1055065" ref_url="https://bugzilla.suse.com/1055065" source="BUGZILLA"/>
		<reference ref_id="1055323" ref_url="https://bugzilla.suse.com/1055323" source="BUGZILLA"/>
		<reference ref_id="1055434" ref_url="https://bugzilla.suse.com/1055434" source="BUGZILLA"/>
		<reference ref_id="1055855" ref_url="https://bugzilla.suse.com/1055855" source="BUGZILLA"/>
		<reference ref_id="1058640" ref_url="https://bugzilla.suse.com/1058640" source="BUGZILLA"/>
		<reference ref_id="1059751" ref_url="https://bugzilla.suse.com/1059751" source="BUGZILLA"/>
		<reference ref_id="1074123" ref_url="https://bugzilla.suse.com/1074123" source="BUGZILLA"/>
		<reference ref_id="1074969" ref_url="https://bugzilla.suse.com/1074969" source="BUGZILLA"/>
		<reference ref_id="1074973" ref_url="https://bugzilla.suse.com/1074973" source="BUGZILLA"/>
		<reference ref_id="1074975" ref_url="https://bugzilla.suse.com/1074975" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800/" source="CVE"/>
		<reference ref_id="CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141/" source="CVE"/>
		<reference ref_id="CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529/" source="CVE"/>
		<reference ref_id="CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644/" source="CVE"/>
		<reference ref_id="CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724/" source="CVE"/>
		<reference ref_id="CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434/" source="CVE"/>
		<reference ref_id="CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564/" source="CVE"/>
		<reference ref_id="CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667/" source="CVE"/>
		<reference ref_id="CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670/" source="CVE"/>
		<reference ref_id="CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672/" source="CVE"/>
		<reference ref_id="CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675/" source="CVE"/>
		<reference ref_id="CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060/" source="CVE"/>
		<reference ref_id="CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146/" source="CVE"/>
		<reference ref_id="CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648/" source="CVE"/>
		<reference ref_id="CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658/" source="CVE"/>
		<reference ref_id="CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326/" source="CVE"/>
		<reference ref_id="CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533/" source="CVE"/>
		<reference ref_id="CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881/" source="CVE"/>
		<reference ref_id="CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022/" source="CVE"/>
		<reference ref_id="CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246/" source="CVE"/>
		<reference ref_id="CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes several issues.

These security issues were fixed:

- CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
  coders/pattern.c (bsc#1074973)
- CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand in
  MagickWand/montage.c (bsc#1074975)
- CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
  coders/rla.c (bsc#1074969)
- CVE-2017-12672: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052720)
- CVE-2017-13060: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1055065)
- CVE-2017-11724: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c involving the quantum_info and clone_info
  data structures (bsc#1051446)
- CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
  failure in the function DestroyImage in MagickCore/image.c, which
  allowed attackers to cause a denial of service (bsc#1052731)
- CVE-2017-12667: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1052732)
- CVE-2017-13146: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055323)
- CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead to a
  denial of service (OOM) in ReadMATImage() if the size specified for a
  MAT Object was larger than the actual amount of data (bsc#1047044)
- CVE-2017-13648: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1055434)
- CVE-2017-11141: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders\mat.c that could have caused memory exhaustion
  via a crafted MAT file, related to incorrect ordering of a
  SetImageExtent call (bsc#1047898)
- CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
  attackers to cause a denial of service (memory leak) via a crafted file
  (bsc#1050120)
- CVE-2017-12564: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service (bsc#1052468)
- CVE-2017-12434: Added a missing NULL check in the function ReadMATImage in
  coders/mat.c, which allowed attackers to cause a denial of service
  (assertion failure) in DestroyImageInfo in image.c (bsc#1052550)
- CVE-2017-12675: Added a missing check for multidimensional data coders/mat.c,
  that could have lead to a memory leak in the function ReadImage in
  MagickCore/constitute.c, which allowed attackers to cause a denial of
  service (bsc#1052710)
- CVE-2017-14326: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
  of service via a crafted file (bsc#1058640)
- CVE-2017-11644: Processesing a crafted file in convert could have lead to a
  memory leak in the ReadMATImage() function in coders/mat.c
  (bsc#1050606)
- CVE-2017-13658: Added a missing NULL check in the ReadMATImage function in
  coders/mat.c, which could have lead to a denial of service (assertion
  failure and application exit) in the DestroyImageInfo function in
  MagickCore/image.c (bsc#1055855)
- CVE-2017-14533: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c (bsc#1059751)
- CVE-2017-17881: Fixed a memory leak vulnerability in the function
  ReadMATImage in coders/mat.c, which allowed attackers to cause a denial of
  service via a crafted MAT image file (bsc#1074123)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-01-18"/>
	<updated date="2018-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80370" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1086247" ref_url="https://bugzilla.suse.com/1086247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

Security issues fixed:

- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:

- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
  external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086247">SUSE bug 1086247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551004" comment="bash-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551005" comment="libreadline6-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80371" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) used an integer data type
  that is inconsistent with a header file, which allowed remote attackers
  to cause a denial of service (incorrect malloc followed by invalid free)
  or possibly execute arbitrary code via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) did not properly track
  directionally isolated pieces of text, which allowed remote attackers
  to cause a denial of service (heap-based buffer overflow) or possibly
  execute arbitrary code via crafted text (bsc#929629).
- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in
  common/uloc.cpp in International Components for Unicode (ICU) for C/C++
  did not ensure that there is a '\0' character at the end of a certain
  temporary array, which allowed remote attackers to cause a denial of
  service (out-of-bounds read) or possibly have unspecified other impact
  via a call with a long httpAcceptLanguage argument (bsc#990636).
- CVE-2017-7868: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_moveIndex32* function (bsc#1034674)
- CVE-2017-7867: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_setNativeIndex* function (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International
  Components for Unicode (ICU) for C/C++ allowed remote attackers to
  execute arbitrary code via a crafted string, aka a 'redundant UVector
  entry clean up function call' issue (bnc#1067203)
- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp
  in International Components for Unicode (ICU) for C/C++ mishandled
  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote
  attackers to cause a denial of service (stack-based buffer overflow
  and application crash) or possibly have unspecified other impact via a
  crafted string, as demonstrated by ZNC  (bnc#1072193)
- CVE-2017-15422: An integer overflow in icu during persian calendar
  date processing could lead to incorrect years shown (bnc#1077999)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-05-23"/>
	<updated date="2018-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80372" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80373" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1132549" ref_url="https://bugzilla.suse.com/1132549" source="BUGZILLA"/>
		<reference ref_id="1132664" ref_url="https://bugzilla.suse.com/1132664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:

- CVE-2019-11235: Fixed an authentication bypass related to the EAP-PWD Commit frame and insufficent validation of elliptic curve points (bsc#1132549).
- CVE-2019-11234: Fixed an authentication bypass caused by reflecting privous values back to the server (bsc#1132664).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546261" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546262" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546263" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546264" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546265" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546266" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546267" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546268" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546269" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546270" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546271" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80374" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546272" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546273" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80375" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546274" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80376" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546275" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80377" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551007" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551008" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551009" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551010" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551011" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551012" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551013" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551014" comment="krb5-server-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80378" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80379" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005421.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551015" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551016" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551017" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551018" comment="libopenssl1_0_0-hmac-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551019" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551020" comment="openssl-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530435" comment="openssl-doc-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80380" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80381" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005430.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Save registry file outside share as unprivileged user (bsc#1131060).

Non-security issue fixed:

- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-08"/>
	<updated date="2019-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551028" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80382" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1087481" ref_url="https://bugzilla.suse.com/1087481" source="BUGZILLA"/>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1114459" ref_url="https://bugzilla.suse.com/1114459" source="BUGZILLA"/>
		<reference ref_id="1126463" ref_url="https://bugzilla.suse.com/1126463" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005440.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fixed an issue where the first login failed and subsequent ones work (bsc#1126463).
- Fixed winbind running out of memory with high number of domain groups (bsc#1114459).
- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087481">SUSE bug 1087481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114459">SUSE bug 1114459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126463">SUSE bug 1126463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551029" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551030" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551031" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551032" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551033" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551034" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551035" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551036" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551037" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551038" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551039" comment="libndr0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551040" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551041" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551042" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551043" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551044" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551045" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551046" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551047" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551048" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551049" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551050" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551051" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551052" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551053" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551054" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551055" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551056" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551057" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551058" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551059" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551060" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551061" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551062" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551063" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551064" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551065" comment="samba-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551066" comment="samba-client-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551067" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551068" comment="samba-libs-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551069" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551070" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551071" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80383" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005433.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80384" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80385" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80386" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551072" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551074" comment="libudev-devel-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551075" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551077" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551079" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551080" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80387" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Following security issues were fixed:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80388" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1024908" ref_url="https://bugzilla.suse.com/1024908" source="BUGZILLA"/>
		<reference ref_id="1034113" ref_url="https://bugzilla.suse.com/1034113" source="BUGZILLA"/>
		<reference ref_id="1043485" ref_url="https://bugzilla.suse.com/1043485" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1080533" ref_url="https://bugzilla.suse.com/1080533" source="BUGZILLA"/>
		<reference ref_id="1082632" ref_url="https://bugzilla.suse.com/1082632" source="BUGZILLA"/>
		<reference ref_id="1087231" ref_url="https://bugzilla.suse.com/1087231" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1087906" ref_url="https://bugzilla.suse.com/1087906" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094268" ref_url="https://bugzilla.suse.com/1094268" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1124832" ref_url="https://bugzilla.suse.com/1124832" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1129279" ref_url="https://bugzilla.suse.com/1129279" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1132673" ref_url="https://bugzilla.suse.com/1132673" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. (bnc#1096748).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. (bnc#1096748).
- CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c allowed local users to cause a denial of service (memory corruption), obtain sensitive information or possibly have unspecified other impact via a write or read request involving the 'RDMA protocol over infiniband' (aka Soft RoCE) technology (bnc#1024908).
- CVE-2017-18174: In the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c has multiple race conditions (bnc#1133188).
- CVE-2019-3882: A flaw was found in the vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS) (bsc#1131427).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2017-17741: The KVM implementation allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2019-9503, CVE-2019-8564: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828, bnc#1132673).

The following non-security bugs were fixed:

- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- add mainline tags to four hyperv patches
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- Drivers: hv: vmbus: Define an API to retrieve virtual processor index (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the event page (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the message page (bsc#1122822).++ kernel-source.spec (revision 4)Release:    &amp;lt;RELEASE&gt;.gbd4498d
- Drivers: hv: vmbus: Define APIs to manipulate the synthetic interrupt controller (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1111331).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from &lt;linux/bitops.h&gt; to a new &lt;linux/bits.h&gt; file (bsc#1111331).
- MDS: Add CVE refs
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1129279).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1129279).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1129279).
- net: ena: complete host info to match latest ENA spec (bsc#1129279).
- net: ena: enable Low Latency Queues (bsc#1129279).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1129279).
- net: ena: fix auto casting to boolean (bsc#1129279).
- net: ena: fix compilation error in xtensa architecture (bsc#1129279).
- net: ena: fix crash during ena_remove() (bsc#1129279).
- net: ena: fix crash during failed resume from hibernation (bsc#1129279).
- net: ena: fix indentations in ena_defs for better readability (bsc#1129279).
- net: ena: Fix Kconfig dependency on X86 (bsc#1129279).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1129279).
- net: ena: fix race between link up and device initalization (bsc#1129279).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1129279).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1129279).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1129279).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1129279).
- net: ena: minor performance improvement (bsc#1129279).
- net: ena: remove ndo_poll_controller (bsc#1129279).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1129279).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1129279).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129279).
- net: ena: update driver version to 2.0.1 (bsc#1129279).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1129279).
- PCI: hv: Add vPCI version protocol negotiation (bnc#1043485, bsc#1122822).
- PCI: hv: Allocate interrupt descriptors with GFP_ATOMIC (bnc#1034113, bsc#1122822).
- PCI: hv: Disable/enable IRQs rather than BH in hv_compose_msi_msg() (bnc#1094268, bsc#1122822).
- PCI: hv: Do not sleep in compose_msi_msg() (bsc#1082632, bsc#1122822).
- PCI: hv: Fix 2 hang issues in hv_compose_msi_msg() (bsc#1087659, bsc#1087906, bsc#1122822).
- PCI: hv: Fix a comment typo in _hv_pcifront_read_config() (bsc#1087659, bsc#1122822).
- PCI: hv: Fix comment formatting and use proper integer fields (bnc#1043485, bsc#1122822).
- PCI: hv: Only queue new work items in hv_pci_devices_present() if necessary (bsc#1087659, bsc#1122822).
- PCI: hv: Remove the bogus test in hv_eject_device_work() (bsc#1087659, bsc#1122822).
- PCI: hv: Serialize the present and eject work items (bsc#1087659, bsc#1122822).
- PCI: hv: Specify CPU_AFFINITY_ALL for MSI affinity when &gt;= 32 CPUs (bnc#1043485, bsc#1122822).
- PCI: hv: Temporary own CPU-number-to-vCPU-number infra (bnc#1043485, bsc#1122822).
- PCI: hv: Use effective affinity mask (bsc#1109772, bsc#1122822).
- PCI: hv: Use page allocation for hbus structure (bnc#1043485, bsc#1122822).
- PCI: hv: Use vPCI protocol version 1.2 (bnc#1043485, bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1068032).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1111331).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- Use upstream variant of two pci-hyperv patches
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382 bsc#1100152).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1111331).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#1111331).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772, bsc#1122822).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86: stop exporting msr-index.h to userland (bsc#1111331).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382 bsc#1100152).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382 bsc#1100152).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024908">SUSE bug 1024908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034113">SUSE bug 1034113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043485">SUSE bug 1043485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082632">SUSE bug 1082632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087906">SUSE bug 1087906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094268">SUSE bug 1094268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124832">SUSE bug 1124832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129279">SUSE bug 1129279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80389" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80390" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551094" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551095" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551096" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551097" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80391" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542012" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80392" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551098" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551100" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551102" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551104" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551105" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80393" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546373" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546374" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546375" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80394" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Fixed an issue with live migration when spectre is enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue with live migration (bsc#1133818).
- Added upstream bug fix (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80395" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80396" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80397" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548569" comment="bind-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548570" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548572" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548573" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80398" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005531.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes one issue.

The following security issue was fixed:

- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-05"/>
	<updated date="2019-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536890" comment="kgraft-patch-4_4_121-92_109-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80399" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1131390" ref_url="https://bugzilla.suse.com/1131390" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005529.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes one issue.

The following security issue was fixed:

- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free) (bsc#1131390).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-05"/>
	<updated date="2019-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131390">SUSE bug 1131390</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536891" comment="kgraft-patch-4_4_121-92_85-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80400" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other security issues fixed:

- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest hostname under readonly mode (bsc#1131595).
- qemu: Add support for using AES secret for SCSI hotplug
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551106" comment="libvirt-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551107" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551108" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551109" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551110" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551111" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551112" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551113" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551114" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551115" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551116" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551117" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551118" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551119" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551120" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551121" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551122" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551123" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551124" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80401" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548574" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548576" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548578" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548580" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548581" comment="python-demo-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548582" comment="python-devel-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548583" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548584" comment="python-idle-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548585" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548586" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80402" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546406" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546407" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546408" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80403" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546416" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546417" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80404" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80405" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551132" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551133" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551134" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551135" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80406" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134596" ref_url="https://bugzilla.suse.com/1134596" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel version 4.4.121 was updated to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote
  attacker such that one can trigger an integer overflow, leading to a kernel
  panic. (bsc#1137586).

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  would fragment the TCP retransmission queue. A remote attacker may have been
  able to further exploit the fragmented queue to cause an expensive linked-list
  walk for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  would fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly
  escalate privileges was found in the mwifiex kernel module while connecting
  to a malicious wireless network. (bnc#1136424)

- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in
  drivers/gpu/drm/drm_edid_load.c in the Linux kernel There is an unchecked
  kstrdup of fwstr, which may have allowed an attacker to cause a denial of service
  (NULL pointer dereference and system crash). (bnc#1136586)

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may have been possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server. (bnc#1120843)

- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the
  unused memory region in the extent tree block, which might have allowed local users
  to obtain sensitive information by reading uninitialized data in the
  filesystem. (bnc#1135281)

- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was
  not called before register_netdevice. This allowed local users to cause a denial of 
  service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev
  name containing a / character. This is similar to CVE-2013-4343. (bnc#1135603)

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  had a race condition when reading /proc/pid/stat. (bnc#1131543)

- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c
  in the Linux kernel There was a race condition leading to a use-after-free,
  related to net namespace cleanup. (bnc#1134537)

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not have ended with a '\0' character. (bnc#1134848)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents.
  (bnc#1110785)

The following non-security bugs were fixed:

- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1134596).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1134596).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134596">SUSE bug 1134596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80407" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issue:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546447" comment="dbus-1-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546448" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546449" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546450" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80408" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551141" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551142" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551143" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551144" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551145" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551146" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551147" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551148" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551149" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551150" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551151" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551152" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551153" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551154" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551155" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551156" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551157" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80409" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548609" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548610" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548611" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80410" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551158" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551159" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551160" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80411" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546463" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546464" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80412" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 35.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542060" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80413" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536962" comment="kgraft-patch-4_4_121-92_92-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80414" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80415" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536964" comment="kgraft-patch-4_4_121-92_95-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80416" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536965" comment="kgraft-patch-4_4_121-92_98-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80417" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536966" comment="kgraft-patch-4_4_121-92_109-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80418" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536967" comment="kgraft-patch-4_4_121-92_104-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80419" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536968" comment="kgraft-patch-4_4_121-92_101-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80420" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546473" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546474" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546475" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80421" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551161" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551162" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551164" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551166" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551168" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551170" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80422" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
- CVE-2018-5390: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536978" comment="kgraft-patch-4_4_121-92_114-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80423" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546508" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546509" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546510" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546511" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546512" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546513" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546514" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546515" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546516" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80424" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1134701" ref_url="https://bugzilla.suse.com/1134701" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#)
- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#)
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
- CVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#)
- CVE-2019-11487: The Linux kernel allowed page-_refcount reference count to overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (bnc#1133190)

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- x86/cpu: Unify CPU family, model, stepping calculation (bsc#1134701).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
- x86/microcode/AMD: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/AMD: Fix load of builtin microcode with randomized memory (bsc#1134701).
- x86/microcode/AMD: Reload proper initrd start address (bsc#1134701).
- x86/microcode/amd: Hand down the CPU family (bsc#1134701).
- x86/microcode/amd: Move private inlines to .c and mark local functions static (bsc#1134701).
- x86/microcode/intel: Drop stashed AP patch pointer optimization (bsc#1134701).
- x86/microcode/intel: Fix allocation size of struct ucode_patch (bsc#1134701).
- x86/microcode/intel: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/intel: Remove intel_lib.c (bsc#1134701).
- x86/microcode/intel: Remove unused arg of get_matching_model_microcode() (bsc#1134701).
- x86/microcode/intel: Rename load_microcode_early() to find_microcode_patch() (bsc#1134701).
- x86/microcode/intel: Rename local variables of type struct mc_saved_data (bsc#1134701).
- x86/microcode/intel: Rename mc_intel variable to mc (bsc#1134701).
- x86/microcode/intel: Rename mc_saved_in_initrd (bsc#1134701).
- x86/microcode/intel: Simplify generic_load_microcode() (bsc#1134701).
- x86/microcode/intel: Unexport save_mc_for_early() (bsc#1134701).
- x86/microcode/intel: Use correct buffer size for saving microcode data (bsc#1134701).
- x86/microcode: Collect CPU info on resume (bsc#1134701).
- x86/microcode: Export the microcode cache linked list (bsc#1134701).
- x86/microcode: Fix loading precedence (bsc#1134701).
- x86/microcode: Get rid of find_cpio_data()'s dummy offset arg (bsc#1134701).
- x86/microcode: Issue the debug printk on resume only on success (bsc#1134701).
- x86/microcode: Rework microcode loading (bsc#1134701).
- x86/microcode: Run the AP-loading routine only on the application processors (bsc#1134701).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134701">SUSE bug 1134701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80425" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551177" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551178" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551179" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551180" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551181" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551182" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551183" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551184" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551185" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551186" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551187" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80426" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1014524" ref_url="https://bugzilla.suse.com/1014524" source="BUGZILLA"/>
		<reference ref_id="1015567" ref_url="https://bugzilla.suse.com/1015567" source="BUGZILLA"/>
		<reference ref_id="1022098" ref_url="https://bugzilla.suse.com/1022098" source="BUGZILLA"/>
		<reference ref_id="1023988" ref_url="https://bugzilla.suse.com/1023988" source="BUGZILLA"/>
		<reference ref_id="1029912" ref_url="https://bugzilla.suse.com/1029912" source="BUGZILLA"/>
		<reference ref_id="1060644" ref_url="https://bugzilla.suse.com/1060644" source="BUGZILLA"/>
		<reference ref_id="1069591" ref_url="https://bugzilla.suse.com/1069591" source="BUGZILLA"/>
		<reference ref_id="1090174" ref_url="https://bugzilla.suse.com/1090174" source="BUGZILLA"/>
		<reference ref_id="1100453" ref_url="https://bugzilla.suse.com/1100453" source="BUGZILLA"/>
		<reference ref_id="1101506" ref_url="https://bugzilla.suse.com/1101506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927/" source="CVE"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

Security issues fixed: 

- CVE-2013-1430:  When successfully logging in using RDP into an xrdp session,
  the file ~/.vnc/sesman_${username}_passwd was created. Its content was the equivalent
  of the user's cleartext password, DES encrypted with a known key (bsc#1015567).
- CVE-2017-16927: The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager
  in xrdp through used an untrusted integer as a write length, which could lead to a
  local denial of service (bsc#1069591).
- CVE-2017-6967: Fixed call of the PAM function auth_start_session(). This lead
  to to PAM session modules not being properly initialized, with a potential
  consequence of incorrect configurations or elevation of privileges, aka a
  pam_limits.so bypass (bsc#1029912).

Other issues addressed:

- The KillDisconnected option for TigerVNC Xvnc sessions is now supported (bsc#1101506)
- Fixed an issue with delayed X KeyRelease events (bsc#1100453)
- Force xrdp-sesman.service to start after xrdp.service. (bsc#1014524)
- Avoid use of hard-coded sesman port. (bsc#1060644)
- Backport upstream commit 5575197,
  sesman should stop setting LANG and let initialization scripts
  take care of it (bsc#1023988).
- Backport upstream patches for 32bpp support (bsc#1022098).
- Fixed a regression connecting from Windows 10. (bsc#1090174)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-16"/>
	<updated date="2019-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014524">SUSE bug 1014524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022098">SUSE bug 1022098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023988">SUSE bug 1023988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060644">SUSE bug 1060644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069591">SUSE bug 1069591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090174">SUSE bug 1090174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100453">SUSE bug 1100453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101506">SUSE bug 1101506</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551188" comment="xrdp-0.9.0~git.1456906198.f422461-16.9.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80427" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548630" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548631" comment="MozillaFirefox-devel-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548632" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80428" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546528" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546529" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546530" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80429" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80430" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537014" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80431" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537015" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80432" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537016" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80433" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537017" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80434" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537018" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80435" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes one issue.

The following security issue was fixed:

This update contains a regression fix for CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537019" comment="kgraft-patch-4_4_121-92_114-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80436" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80437" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548654" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548655" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548656" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80438" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551189" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551191" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551193" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551195" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551197" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80439" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed an issue with live migrations, which used to fail when spectre is
  enabled on xen boot cmdline (bsc#1116380)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80440" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548657" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548658" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548659" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80441" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548660" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548661" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548662" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80442" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80443" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80444" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548677" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548678" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548679" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551198" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80445" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551199" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551200" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551201" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551202" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551203" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551204" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551205" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551206" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551207" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551208" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551209" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80446" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551210" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80447" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548680" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548682" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548684" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548686" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548687" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548688" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548689" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548690" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548691" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548692" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80448" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issue fixed:

- qemu: Add support for overriding max threads per process limit (bsc#1133719)
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551211" comment="libvirt-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551212" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551213" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551214" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551215" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551216" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551217" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551218" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551219" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551220" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551221" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551222" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551223" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551224" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551225" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551226" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551227" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551228" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551229" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80449" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-06"/>
	<updated date="2019-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551230" comment="qemu-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551231" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551232" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551233" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551235" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537091" comment="qemu-ppc-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551237" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80450" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548696" comment="postgresql94-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548697" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548698" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548699" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548700" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548701" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80451" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548702" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548703" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548704" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548705" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548706" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548707" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80452" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005845.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes one issue.

The following security issue was fixed:

- CVE-2018-5390: Fixed expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537105" comment="kgraft-patch-4_4_121-92_117-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80453" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548721" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548722" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548723" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80454" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551238" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551239" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551240" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551241" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551242" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80455" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1045640" ref_url="https://bugzilla.suse.com/1045640" source="BUGZILLA"/>
		<reference ref_id="1076033" ref_url="https://bugzilla.suse.com/1076033" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140012" ref_url="https://bugzilla.suse.com/1140012" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1141628" ref_url="https://bugzilla.suse.com/1141628" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142098" ref_url="https://bugzilla.suse.com/1142098" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<description>
 The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).


The following non-security bugs were fixed:

- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
- i40e: add functions to control default VSI (bsc#1141628).
- i40e: set default VSI without a reset (bsc#1141628).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045640">SUSE bug 1045640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076033">SUSE bug 1076033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140012">SUSE bug 1140012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141628">SUSE bug 1141628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142098">SUSE bug 1142098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80456" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530687" comment="libspice-server1-0.12.7-10.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80457" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80458" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548729" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548730" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548731" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80459" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80460" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80461" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551255" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551256" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551257" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551258" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551259" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80462" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551260" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551261" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551263" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551265" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80463" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546546" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546547" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546548" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551266" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80464" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548743" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548744" comment="MozillaFirefox-devel-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548745" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80465" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548746" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548747" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548748" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548749" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80466" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80467" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546549" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546550" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80468" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1052916" ref_url="https://bugzilla.suse.com/1052916" source="BUGZILLA"/>
		<reference ref_id="1086036" ref_url="https://bugzilla.suse.com/1086036" source="BUGZILLA"/>
		<reference ref_id="1100097" ref_url="https://bugzilla.suse.com/1100097" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

Security issue fixed:

- CVE-2018-12910: Fix crash when handling empty hostnames (bsc#1100097).
- CVE-2017-2885: Fix chunk decoding buffer overrun that could be exploited against either clients or servers (bsc#1052916).

Bug fixes:

- bsc#1086036: translation-update-upstream commented out for Leap
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-08"/>
	<updated date="2019-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086036">SUSE bug 1086036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551267" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551269" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80469" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548752" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548753" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548754" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548755" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80470" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005996.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537160" comment="kgraft-patch-4_4_121-92_95-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80471" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537161" comment="kgraft-patch-4_4_121-92_98-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80472" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2018-5390: Fixed a denial of service ('SegmentSmack') in tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537162" comment="kgraft-patch-4_4_121-92_120-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80473" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537163" comment="kgraft-patch-4_4_121-92_117-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80474" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537164" comment="kgraft-patch-4_4_121-92_114-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80475" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537165" comment="kgraft-patch-4_4_121-92_109-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80476" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537166" comment="kgraft-patch-4_4_121-92_104-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80477" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537167" comment="kgraft-patch-4_4_121-92_101-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80478" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80479" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80480" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges 
  that allowed them to run commands with an arbitrary uid, could 
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551270" comment="sudo-1.8.10p3-10.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80481" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548763" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548764" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80482" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551271" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551272" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551273" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80483" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:
	  
- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80484" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537180" comment="kgraft-patch-4_4_121-92_98-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80485" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537181" comment="kgraft-patch-4_4_121-92_101-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80486" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537182" comment="kgraft-patch-4_4_121-92_104-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80487" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537183" comment="kgraft-patch-4_4_121-92_109-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80488" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537184" comment="kgraft-patch-4_4_121-92_114-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80489" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537185" comment="kgraft-patch-4_4_121-92_117-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80490" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537186" comment="kgraft-patch-4_4_121-92_120-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80491" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80492" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551274" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80493" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551275" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551276" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551277" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551278" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551279" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551280" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551281" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551282" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551283" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551284" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551285" comment="libndr0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551286" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551287" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551288" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551289" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551290" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551291" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551292" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551293" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551294" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551295" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551296" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551297" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551298" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551299" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551300" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551301" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551302" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551303" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551304" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551305" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551306" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551307" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551308" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551309" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551310" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551311" comment="samba-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551312" comment="samba-client-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551313" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551314" comment="samba-libs-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551315" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551316" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551317" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80494" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006096.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]

- Add gdb-s390-handle-arch13.diff to handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548818" comment="gdb-8.3.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80495" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548819" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548820" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80496" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551318" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551319" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80497" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80498" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548826" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548827" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548828" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548829" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548830" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548831" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548832" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80499" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548836" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548837" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80500" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139550" ref_url="https://bugzilla.suse.com/1139550" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1144338" ref_url="https://bugzilla.suse.com/1144338" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1149849" ref_url="https://bugzilla.suse.com/1149849" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150223" ref_url="https://bugzilla.suse.com/1150223" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)

- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)

- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)

The following non-security bugs were fixed:

- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)
- ipv6: Update ipv6 defrag code (add bsc#1141054).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm kABI Fix for NX patches (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- mm: use upstream patch for bsc#1106913
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).
- x86/mitigations: Backport the STIBP pile See bsc#1139550
- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139550">SUSE bug 1139550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144338">SUSE bug 1144338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149849">SUSE bug 1149849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150223">SUSE bug 1150223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80501" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80502" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548838" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548839" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548840" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80503" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548841" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548842" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548843" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80504" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548845" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80505" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548846" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80506" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80507" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:
	  
Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-09"/>
	<updated date="2019-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546552" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546553" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80508" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548851" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80509" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551325" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80510" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). 
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by 
  leveraging certain scenarios with a parent-child process relationship (bsc#1156321). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537243" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80511" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). 
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging 
  certain scenarios with a parent-child process relationship (bsc#1156321). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537244" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). 
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537245" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80513" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537246" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80514" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537247" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80515" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537248" comment="kgraft-patch-4_4_121-92_120-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80516" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548852" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548853" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548854" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548855" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80517" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80518" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80519" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546570" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546571" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546572" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546573" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546574" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546576" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546578" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546580" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546582" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546584" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546587" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546589" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80520" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005115.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537265" comment="kgraft-patch-4_4_121-92_80-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80521" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537266" comment="kgraft-patch-4_4_121-92_85-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80522" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537267" comment="kgraft-patch-4_4_120-92_70-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80523" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537268" comment="kgraft-patch-4_4_121-92_73-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80524" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537269" comment="kgraft-patch-4_4_121-92_92-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80525" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537270" comment="kgraft-patch-4_4_114-92_64-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80526" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537271" comment="kgraft-patch-4_4_114-92_67-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80527" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537272" comment="kgraft-patch-4_4_121-92_98-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80528" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537273" comment="kgraft-patch-4_4_121-92_95-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80529" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005118.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551326" comment="libblkid1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551327" comment="libblkid1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551328" comment="libfdisk1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551329" comment="libmount1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551330" comment="libmount1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551331" comment="libsmartcols1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551332" comment="libuuid1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551333" comment="libuuid1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551334" comment="python-libmount-2.28-44.18.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551335" comment="util-linux-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530805" comment="util-linux-lang-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551336" comment="util-linux-systemd-2.28-44.18.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551337" comment="uuidd-2.28-44.18.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80530" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005135.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551338" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551339" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551340" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551341" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551342" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551343" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551344" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551345" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80531" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086535" ref_url="https://bugzilla.suse.com/1086535" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091197" ref_url="https://bugzilla.suse.com/1091197" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1110837" ref_url="https://bugzilla.suse.com/1110837" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1113192" ref_url="https://bugzilla.suse.com/1113192" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117187" ref_url="https://bugzilla.suse.com/1117187" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).

The following non-security bugs were fixed:

- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ata: Fix racy link clearance (bsc#1107866).
- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ip: hash fragments consistently (bsc#1042286 bsc#1108145).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- libfc: sync strings with upstream versions (bsc#1114763).
- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.
- mm: add support for releasing multiple instances of a page (bsc#1100105).
- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- NFS: add nostatflush mount option (bsc#1065726).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bsc#1114648).
- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bsc#1105931).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086535">SUSE bug 1086535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091197">SUSE bug 1091197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110837">SUSE bug 1110837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113192">SUSE bug 1113192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117187">SUSE bug 1117187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80532" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546605" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546606" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80533" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005144.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-21"/>
	<updated date="2019-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546621" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80534" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104301" ref_url="https://bugzilla.suse.com/1104301" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:
  
Security issue fixed:

- CVE-2018-5383: Fixed an implementation issue in Bluetooth where the eliptic curve parameters 
  were not sufficiently validated during Diffie-Hellman key exchange (bsc#1104301).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-22"/>
	<updated date="2019-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80535" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548896" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548898" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548900" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548902" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548903" comment="python-demo-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548905" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548906" comment="python-idle-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548907" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548908" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80536" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).
- CVE-2018-7858: Fixed a denial of service which could occur while updating the VGA display, after guest has adjusted the display dimensions (bsc#1084604).
- CVE-2017-13673: Fixed a denial of service in the cpu_physical_memory_snapshot_get_dirty function.
- CVE-2017-13672: Fixed a denial of service via vectors involving display update.

Non-security issues fixed:

- Fixed bad guest time after migration (bsc#1113231).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80537" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80538" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80539" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1104662" ref_url="https://bugzilla.suse.com/1104662" source="BUGZILLA"/>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005299.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could
  have resulted in a remote denial of service via the guest agent (bsc#1127458).

Other issues fixed:   

- libxl: save current memory value after successful balloon (bsc#1120813).
- spec: Don't restart libvirt-guests when updating libvirt-client (bsc#1104662).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104662">SUSE bug 1104662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551366" comment="libvirt-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551367" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551368" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551369" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551370" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551371" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551372" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551373" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551374" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551375" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551376" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551377" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551378" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551379" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551380" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551381" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551382" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551383" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551384" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80540" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80541" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80542" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120119" ref_url="https://bugzilla.suse.com/1120119" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80543" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	  

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546656" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542123" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546657" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80544" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128158" ref_url="https://bugzilla.suse.com/1128158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:

Security issues fixed:

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). 

More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548942" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542124" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80545" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80546" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80547" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80548" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80549" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80550" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537363" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80551" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80552" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546672" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546673" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80553" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537367" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80554" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005232.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80555" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548943" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548944" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80556" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537370" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80557" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551390" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551391" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551392" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551393" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551394" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551395" comment="openssl-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80558" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1010700" ref_url="https://bugzilla.suse.com/1010700" source="BUGZILLA"/>
		<reference ref_id="1072728" ref_url="https://bugzilla.suse.com/1072728" source="BUGZILLA"/>
		<reference ref_id="1080156" ref_url="https://bugzilla.suse.com/1080156" source="BUGZILLA"/>
		<reference ref_id="1087320" ref_url="https://bugzilla.suse.com/1087320" source="BUGZILLA"/>
		<reference ref_id="1098377" ref_url="https://bugzilla.suse.com/1098377" source="BUGZILLA"/>
		<reference ref_id="1101877" ref_url="https://bugzilla.suse.com/1101877" source="BUGZILLA"/>
		<reference ref_id="1110299" ref_url="https://bugzilla.suse.com/1110299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<description>
This update for sssd provides the following fixes:

This security issue was fixed:

- CVE-2018-10852: Set stricter permissions on /var/lib/sss/pipes/sudo to prevent the disclosure of sudo rules for arbitrary users (bsc#1098377)

These non-security issues were fixed:

- Fix a segmentation fault in sss_cache command. (bsc#1072728)
- Fix a failure in autofs initialisation sequence upon system boot. (bsc#1010700)
- Fix race condition on boot between SSSD and autofs. (bsc#1010700)
- Fix a bug where file descriptors were not closed (bsc#1080156)
- Fix an issue where sssd logs were not rotated properly (bsc#1080156)
- Remove whitespaces from netgroup entries (bsc#1087320)
- Remove misleading log messages (bsc#1101877)
- exit() the forked process if exec()-ing a child process fails (bsc#1110299)
- Do not schedule the machine renewal task if adcli is not executable (bsc#1110299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-11"/>
	<updated date="2019-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010700">SUSE bug 1010700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072728">SUSE bug 1072728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080156">SUSE bug 1080156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087320">SUSE bug 1087320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101877">SUSE bug 1101877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110299">SUSE bug 1110299</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551396" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551397" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551398" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551399" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551400" comment="sssd-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551401" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551402" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551403" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551404" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551405" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551406" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551407" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551408" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80559" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1105402" ref_url="https://bugzilla.suse.com/1105402" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1121698" ref_url="https://bugzilla.suse.com/1121698" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1122821" ref_url="https://bugzilla.suse.com/1122821" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127758" ref_url="https://bugzilla.suse.com/1127758" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).
- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).

The following non-security bugs were fixed:

- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).
- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105402">SUSE bug 1105402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121698">SUSE bug 1121698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122821">SUSE bug 1122821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127758">SUSE bug 1127758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80560" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0838-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005665.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-05"/>
	<updated date="2019-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551414" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551415" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551416" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80561" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80562" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1131233" ref_url="https://bugzilla.suse.com/1131233" source="BUGZILLA"/>
		<reference ref_id="1131237" ref_url="https://bugzilla.suse.com/1131237" source="BUGZILLA"/>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="1131245" ref_url="https://bugzilla.suse.com/1131245" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551417" comment="apache2-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551418" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551419" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551420" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551421" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80563" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546692" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80564" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111789" ref_url="https://bugzilla.suse.com/1111789" source="BUGZILLA"/>
		<reference ref_id="1123022" ref_url="https://bugzilla.suse.com/1123022" source="BUGZILLA"/>
		<reference ref_id="1130116" ref_url="https://bugzilla.suse.com/1130116" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issues fixed: 

- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing 
  local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).

Other issue fixed: 
- Fixed handling of command continuation(bsc#1111789)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111789">SUSE bug 1111789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546696" comment="dovecot22-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546697" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546698" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546699" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80565" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548950" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548952" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80566" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)

Other issue addressed: 

- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-10"/>
	<updated date="2019-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80567" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005341.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes one issue.

The following security issue was fixed:

- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537409" comment="kgraft-patch-4_4_121-92_104-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80568" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546709" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80569" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546710" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546711" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546712" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551422" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80570" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009546716" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546717" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009546718" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80571" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548953" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548954" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548955" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548956" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80572" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548962" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548963" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80573" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80574" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548964" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548965" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548966" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80575" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548967" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548968" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80576" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548969" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548970" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548971" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548972" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80577" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551430" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551431" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551432" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551433" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551434" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551435" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80578" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551436" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551437" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551438" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551439" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551440" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551441" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551442" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80579" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548978" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548979" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548980" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80580" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80581" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551443" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80582" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1037216" ref_url="https://bugzilla.suse.com/1037216" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1099279" ref_url="https://bugzilla.suse.com/1099279" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155311" ref_url="https://bugzilla.suse.com/1155311" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1156060" ref_url="https://bugzilla.suse.com/1156060" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158381" ref_url="https://bugzilla.suse.com/1158381" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158427" ref_url="https://bugzilla.suse.com/1158427" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162298" ref_url="https://bugzilla.suse.com/1162298" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).
- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).
- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).
- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).
- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).
- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).
- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).
- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).
- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).
- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1155311).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).
- cgroup: avoid copying strings longer than the buffers (bsc#1146544).
- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037216">SUSE bug 1037216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099279">SUSE bug 1099279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155311">SUSE bug 1155311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156060">SUSE bug 1156060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162298">SUSE bug 1162298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80583" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551449" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551450" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551451" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551452" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551453" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80584" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548984" comment="git-core-2.26.2-27.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80585" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548985" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80586" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537467" comment="kgraft-patch-4_4_121-92_125-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80587" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537468" comment="kgraft-patch-4_4_121-92_120-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80588" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537469" comment="kgraft-patch-4_4_121-92_117-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80589" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537470" comment="kgraft-patch-4_4_121-92_114-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80590" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537471" comment="kgraft-patch-4_4_121-92_109-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80591" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
- CVE-2020-1749: Fixed an improper implementation in some IPsec protocols where the data were sent unencrypted allowing an attacker to read them (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-27"/>
	<updated date="2020-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537472" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80592" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80593" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009548994" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548996" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548998" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549000" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549001" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549002" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549003" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549004" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549005" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549006" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80594" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80595" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551462" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551463" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80596" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80597" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551464" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551465" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80598" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551466" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551467" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551468" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80599" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80600" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80601" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551477" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551478" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551479" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80602" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80603" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- KEYS: allow reaching the keys quotas exactly (bsc#1171689).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80604" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551485" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80605" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80606" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551487" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551489" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80607" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80608" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80609" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80610" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551497" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551498" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551499" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80611" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007032.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537529" comment="kgraft-patch-4_4_121-92_129-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80612" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537530" comment="kgraft-patch-4_4_121-92_125-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80613" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537531" comment="kgraft-patch-4_4_121-92_120-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80614" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537532" comment="kgraft-patch-4_4_121-92_117-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80615" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537533" comment="kgraft-patch-4_4_121-92_114-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80616" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80617" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80618" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551500" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80619" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551501" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80620" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551502" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551503" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80621" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551504" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551506" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551508" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551510" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551512" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551514" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551516" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551518" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551520" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80622" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551521" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551522" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551523" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551524" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551525" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551526" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80623" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80624" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551531" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551532" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551533" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551535" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80625" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537561" comment="kgraft-patch-4_4_121-92_125-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80626" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537562" comment="kgraft-patch-4_4_121-92_120-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80627" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1138954" ref_url="https://bugzilla.suse.com/1138954" source="BUGZILLA"/>
		<reference ref_id="1144327" ref_url="https://bugzilla.suse.com/1144327" source="BUGZILLA"/>
		<reference ref_id="1144379" ref_url="https://bugzilla.suse.com/1144379" source="BUGZILLA"/>
		<reference ref_id="1150584" ref_url="https://bugzilla.suse.com/1150584" source="BUGZILLA"/>
		<reference ref_id="1152711" ref_url="https://bugzilla.suse.com/1152711" source="BUGZILLA"/>
		<reference ref_id="1153471" ref_url="https://bugzilla.suse.com/1153471" source="BUGZILLA"/>
		<reference ref_id="1155789" ref_url="https://bugzilla.suse.com/1155789" source="BUGZILLA"/>
		<reference ref_id="1155952" ref_url="https://bugzilla.suse.com/1155952" source="BUGZILLA"/>
		<reference ref_id="1157860" ref_url="https://bugzilla.suse.com/1157860" source="BUGZILLA"/>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
		<description>
This update for xrdp provides the following fix:

- CVE-2020-4044: xrdp-sesman can be crashed remotely over port 3350 (bsc#1173580).
- Fixed an issue where xrdp-sesman could not restart (bsc#1155952).	  
- Fixed an issue where xrdp could not start due to an error in the service file use absolute path in ExecStart (bsc#1155789).
- Fixed a PAM error after 2nd xrdp session after logout (bsc#1153471).
- Fixed a crash in xrdp-sesman, caused by terminating and reconnecting an xrdp session (bsc#1152711).
- Fixed a failure in RDP session recovery (bsc#1150584).
- Fixed a process leak (bsc#1144379).  
- Let systemd handle the daemons, fixing daemon start failures. (bsc#1138954, bsc#1144327)
- Don't try to create .vnc directory if it already exists. (bsc#1157860)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138954">SUSE bug 1138954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144327">SUSE bug 1144327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144379">SUSE bug 1144379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150584">SUSE bug 1150584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152711">SUSE bug 1152711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153471">SUSE bug 1153471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155789">SUSE bug 1155789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155952">SUSE bug 1155952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157860">SUSE bug 1157860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551536" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80628" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551537" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80629" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537565" comment="kgraft-patch-4_4_121-92_117-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80630" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537566" comment="kgraft-patch-4_4_121-92_114-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80631" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537567" comment="kgraft-patch-4_4_121-92_109-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80632" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537568" comment="kgraft-patch-4_4_121-92_104-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80633" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537569" comment="kgraft-patch-4_4_121-92_101-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80634" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551538" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80635" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80636" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
- Backport gcc-7 build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80637" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551548" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551549" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80638" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80639" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551553" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551554" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551555" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551556" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551557" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551558" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551559" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551560" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551561" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551562" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551563" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551564" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551565" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551566" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551567" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551568" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551569" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551570" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551571" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551572" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551573" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551574" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551575" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551576" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551577" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551578" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551579" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551580" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551581" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80640" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80641" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80642" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80643" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551589" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551590" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551591" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551592" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80644" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551593" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551594" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80645" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80646" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: Multiple xenoprof issues
- bsc#1168142 - CVE-2020-11739: Missing memory barriers in read-write unlock paths
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80647" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551602" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551603" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551604" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551605" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80648" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551606" comment="grub2-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537624" comment="grub2-powerpc-ieee1275-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551607" comment="grub2-s390x-emu-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80649" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007296.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551608" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551609" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551610" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551611" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551612" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551613" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551614" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551615" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551616" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551617" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551618" comment="libndr0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551619" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551620" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551621" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551622" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551623" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551624" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551625" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551626" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551627" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551628" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551629" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551630" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551631" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551632" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551633" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551634" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551635" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551636" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551637" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551638" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551639" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551640" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551641" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551642" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551643" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551644" comment="samba-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551645" comment="samba-client-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551646" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551647" comment="samba-libs-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551648" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551649" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551650" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80650" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551651" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551652" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80651" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-31"/>
	<updated date="2020-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551653" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551654" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551655" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551656" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551657" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551658" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551659" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551660" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551661" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551662" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551663" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80652" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80653" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551664" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551665" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80654" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551666" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551667" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551668" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551669" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551670" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80655" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80656" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551672" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80657" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551673" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551674" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551675" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551676" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80658" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80659" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173663" ref_url="https://bugzilla.suse.com/1173663" source="BUGZILLA"/>
		<reference ref_id="1173664" ref_url="https://bugzilla.suse.com/1173664" source="BUGZILLA"/>
		<reference ref_id="1173665" ref_url="https://bugzilla.suse.com/1173665" source="BUGZILLA"/>
		<reference ref_id="1173666" ref_url="https://bugzilla.suse.com/1173666" source="BUGZILLA"/>
		<reference ref_id="1173867" ref_url="https://bugzilla.suse.com/1173867" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14816: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173666).
- CVE-2019-14814: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173664).
- CVE-2019-14815: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173665).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80660" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80661" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537679" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80662" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537680" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80663" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537681" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80664" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551679" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551680" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551681" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80665" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.

The following security bugs were fixed:


- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bug was fixed:

- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551682" comment="kernel-default-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551683" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551684" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551686" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537689" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80666" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80667" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80668" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537694" comment="shim-15+git47-22.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80669" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551687" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80670" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80671" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551693" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551694" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551695" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551696" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551697" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551698" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551699" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551700" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551701" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551702" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551703" comment="libndr0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551704" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551705" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551706" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551707" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551708" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551709" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551710" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551711" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551712" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551713" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551714" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551715" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551716" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551717" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551718" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551719" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551720" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551721" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551722" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551723" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551724" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551725" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551726" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551727" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551728" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551729" comment="samba-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551730" comment="samba-client-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551731" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551732" comment="samba-libs-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551733" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551734" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551735" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80672" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551736" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551737" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551738" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80673" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551739" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551740" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551741" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551742" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551743" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551744" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551745" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551746" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551747" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551748" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551749" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551750" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551751" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551752" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551753" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80674" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic  modification of live EPT PTE (bsc#1173380,XSA-328)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-01"/>
	<updated date="2020-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80675" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551754" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80676" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80677" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551759" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551760" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551761" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80678" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551762" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551764" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551766" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551767" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80679" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551768" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551769" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551770" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80680" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551771" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551772" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551773" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551774" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551775" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551776" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551777" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551778" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551779" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80681" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551780" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551781" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551782" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80682" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551783" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551784" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551785" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551786" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551787" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551788" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551789" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551790" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551791" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551792" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551793" comment="libndr0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551794" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551795" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551796" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551797" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551798" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551799" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551800" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551801" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551802" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551803" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551804" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551805" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551806" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551807" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551808" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551809" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551810" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551811" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551812" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551813" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551814" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551815" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551816" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551817" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551818" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551819" comment="samba-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551820" comment="samba-client-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551821" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551822" comment="samba-libs-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551823" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551824" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551825" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80683" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80684" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1175476" ref_url="https://bugzilla.suse.com/1175476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14562: Fixed an overflow in DxeImageVerificationHandler (bsc#1175476).  
- CVE-2019-14559: Fixed a memory leak in ArpOnFrameRcvdDpc() (bsc#1163927).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531453" comment="ovmf-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531454" comment="ovmf-tools-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531455" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80685" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-15708: Added a  note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551827" comment="libvirt-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551828" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551829" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551830" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551831" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551832" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551833" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551834" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551835" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551836" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551837" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551838" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551839" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551840" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551841" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551842" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551843" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551844" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551845" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80686" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80687" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issue:
	  
Security issue fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).

Other issue addressed: 

- Fixed an issue with rendering animated gifs (QTBUG-55141).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551846" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551847" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551848" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551849" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551850" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551851" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551852" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551853" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551854" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551855" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551856" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551857" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551858" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551859" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551860" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80688" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80689" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).
- CVE-2020-1749: A flaw was found in the implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link, rather sending the data unencrypted. This would have allowed anyone in between the two endpoints to read the traffic unencrypted. (bsc#1165629)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80690" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537826" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80691" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537827" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80692" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537828" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80693" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537829" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80694" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551865" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551866" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551867" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551868" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551869" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551870" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551871" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551872" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551873" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551874" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551875" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551876" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551877" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551878" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537837" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551879" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551880" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537839" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551881" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551882" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551883" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551884" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525349" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537843" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551885" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551886" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80695" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80696" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551887" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551888" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551889" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551890" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551891" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551892" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551893" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551894" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551895" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80697" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80698" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551900" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551901" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551902" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551903" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551904" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551905" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80699" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551906" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551907" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551908" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80700" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host (bsc#1161181).
- CVE-2019-19579: Device quarantine for alternate pci assignment methods (bsc#1157888).
- CVE-2019-19581: find_next_bit() issues (bsc#1158003).
- CVE-2019-19583: VMentry failure with debug exceptions and blocked states (bsc#1158004).
- CVE-2019-19578: Linear pagetable use / entry miscounts (bsc#1158005).
- CVE-2019-19580: Further issues with restartable PV type change operations (bsc#1158006).
- CVE-2019-19577: dynamic height for the IOMMU pagetables (bsc#1158007).
- CVE-2019-18420: VCPUOP_initialise DoS (bsc#1154448).
- CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation (bsc#1154456).
- CVE-2019-18421: Issues with restartable PV type change operations (bsc#1154458).
- CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment (bsc#1154461).
- CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue) (bsc#1155945).
- CVE-2019-11135: TSX Asynchronous Abort (TAA) issue (bsc#1152497).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-06"/>
	<updated date="2020-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80701" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551909" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551910" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551911" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551912" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551913" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551914" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551915" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551916" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551917" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551918" comment="postgresql94-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551919" comment="postgresql94-contrib-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531565" comment="postgresql94-docs-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551920" comment="postgresql94-plperl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551921" comment="postgresql94-plpython-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551922" comment="postgresql94-pltcl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551923" comment="postgresql94-server-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551924" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551925" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551926" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551927" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551928" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551929" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80702" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551930" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80703" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80704" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="1169947" ref_url="https://bugzilla.suse.com/1169947" source="BUGZILLA"/>
		<reference ref_id="1178038" ref_url="https://bugzilla.suse.com/1178038" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper fixes the following issues:

libzypp fixes the following security issue:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).

zypper was updated to fix the following issues:

- Fixed an issue, where zypper crashed when the system language is set to Spanish and the user
  tried to patch their system with 'zypper patch --category security' (bsc#1178038)
- Fixed a typo in man page (bsc#1169947)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-18"/>
	<updated date="2020-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169947">SUSE bug 1169947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178038">SUSE bug 1178038</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551931" comment="libzypp-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551932" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551933" comment="zypper-1.13.57-18.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80705" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551934" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551935" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551936" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551937" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551938" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551939" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551940" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551941" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80706" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537895" comment="kgraft-patch-4_4_121-92_141-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80707" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537896" comment="kgraft-patch-4_4_121-92_138-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80708" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537897" comment="kgraft-patch-4_4_121-92_135-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80709" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537898" comment="kgraft-patch-4_4_121-92_129-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80710" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537899" comment="kgraft-patch-4_4_121-92_125-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80711" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551942" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551943" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551944" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551945" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551946" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551947" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80712" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551948" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551949" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551950" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551951" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551952" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551953" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80713" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1131277" ref_url="https://bugzilla.suse.com/1131277" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176922" ref_url="https://bugzilla.suse.com/1176922" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).

The following non-security bugs were fixed:

- btrfs: fix race with relocation recovery and fs_root setup (bsc#1131277).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277).
- btrfs: btrfs_init_new_device should use fs_info-&gt;dev_root (bsc#1131277, bsc#1176922).
- btrfs: btrfs_test_opt and friends should take a btrfs_fs_info (bsc#1131277, bsc#1176922).
- btrfs: call functions that always use the same root with fs_info instead (bsc#1131277, bsc#1176922).
- btrfs: call functions that overwrite their root parameter with fs_info (bsc#1131277, bsc#1176922).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277, bsc#1176922).
- btrfs: pull node/sector/stripe sizes out of root and into fs_info (bsc#1131277, bsc#1176922).
- btrfs: Remove fs_info argument of btrfs_write_and_wait_transaction (bsc#1131277, bsc#1176922).
- btrfs: remove root parameter from transaction commit/end routines (bsc#1131277, bsc#1176922).
- btrfs: remove root usage from can_overcommit (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, access fs_info-&gt;delayed_root directly (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, add fs_info convenience variables (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, btrfs_calc_{trans,trunc}_metadata_size (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, update_block_group{,flags} (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, use fs_info-&gt;dev_root everywhere (bsc#1131277, bsc#1176922).
- btrfs: split btrfs_wait_marked_extents into normal and tree log functions (bsc#1131277, bsc#1176922).
- btrfs: struct btrfsic_state-&gt;root should be an fs_info (bsc#1131277, bsc#1176922).
- btrfs: take an fs_info directly when the root is not used otherwise (bsc#1131277, bsc#1176922).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131277">SUSE bug 1131277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176922">SUSE bug 1176922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80714" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80715" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551959" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551960" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80716" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80717" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551964" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551965" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80718" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551966" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551967" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80719" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80720" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551968" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551969" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551970" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551971" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551972" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80721" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551973" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551974" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551975" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80722" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551976" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551977" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80723" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551978" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551979" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80724" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551981" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80725" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537939" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80726" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537940" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80727" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537941" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80728" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537942" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80729" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_146 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a memory corruption due to a use after free which could have led to to local privilege escalation (bsc#1176931).
- CVE-2020-11668: Fixed an issue where the Xirlink camera USB driver mishandled invalid descriptors (bsc#1173942).
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of  ip6_dst_lookup (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537943" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80730" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80731" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551982" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551983" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551984" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551985" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551987" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80732" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009551988" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551989" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551990" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551991" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551992" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551993" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551994" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551995" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551996" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551997" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551998" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009551999" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552000" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80733" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549026" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549027" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549028" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80734" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552001" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552002" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552003" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552004" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552005" comment="libspice-controller0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552006" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552007" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80735" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80736" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80737" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80738" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80739" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552012" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552013" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552014" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552015" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552016" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552017" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552018" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552019" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552020" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552021" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552022" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552023" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552024" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80740" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549030" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549032" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549034" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549036" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549038" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549040" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549042" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537986" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537987" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549044" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549046" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537990" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549047" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80741" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issue:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552025" comment="sudo-1.8.10p3-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80742" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549059" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542713" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549060" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80743" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549061" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549062" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80744" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552026" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552027" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552028" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552029" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552030" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552031" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80745" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549063" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80746" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1077330" ref_url="https://bugzilla.suse.com/1077330" source="BUGZILLA"/>
		<reference ref_id="1094291" ref_url="https://bugzilla.suse.com/1094291" source="BUGZILLA"/>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1163959" ref_url="https://bugzilla.suse.com/1163959" source="BUGZILLA"/>
		<reference ref_id="1163969" ref_url="https://bugzilla.suse.com/1163969" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2018-0739: Update openssl to 1.0.2o to limit ASN.1 constructed types recursive definition depth (bsc#1094291).
- CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
- CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
- CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).

Bug fixes:

- Only use SLES-UEFI-CA-Certificate-2048.crt for the SUSE flavor to provide the better compatibility. (bsc#1077330)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077330">SUSE bug 1077330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163959">SUSE bug 1163959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163969">SUSE bug 1163969</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538002" comment="ovmf-2015+git1462940744.321151f-19.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538003" comment="ovmf-tools-2015+git1462940744.321151f-19.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538004" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80747" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80748" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549070" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549071" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549075" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549076" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549077" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549078" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80749" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80750" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1015203" ref_url="https://bugzilla.suse.com/1015203" source="BUGZILLA"/>
		<reference ref_id="1022804" ref_url="https://bugzilla.suse.com/1022804" source="BUGZILLA"/>
		<reference ref_id="1084682" ref_url="https://bugzilla.suse.com/1084682" source="BUGZILLA"/>
		<reference ref_id="1087920" ref_url="https://bugzilla.suse.com/1087920" source="BUGZILLA"/>
		<reference ref_id="1153451" ref_url="https://bugzilla.suse.com/1153451" source="BUGZILLA"/>
		<reference ref_id="1153459" ref_url="https://bugzilla.suse.com/1153459" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

Security issues fixed:

- CVE-2019-17041: Fixed a heap overflow in the parser for AIX log messages (bsc#1153451).
- CVE-2019-17042: Fixed a heap overflow in the parser for Cisco log messages (bsc#1153459).

Non-security issues fixed:

- Handle multiline messages correctly when using the imfile module. (bsc#1015203)
- Fix a race condition in the shutdown sequence in wtp that was causing rsyslog not to
  shutdown properly. (bsc#1022804)
- Fixed a rsyslogd SIGABORT crash if a path does not exists (bsc#1087920).
- Fixed an issue where configuration templates where not consistently flushed (bsc#1084682).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015203">SUSE bug 1015203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022804">SUSE bug 1022804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084682">SUSE bug 1084682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087920">SUSE bug 1087920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552032" comment="rsyslog-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552033" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552034" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552035" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552036" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552037" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552038" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552039" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552040" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552041" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80751" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80752" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80753" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552042" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80754" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522746" comment="python-pyparsing-2.2.0-7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522749" comment="python3-pyparsing-2.2.0-7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80755" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549087" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80756" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549089" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549090" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549091" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549092" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549093" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549094" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80757" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80758" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80759" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80760" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549102" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549103" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549104" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549105" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549106" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549107" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549108" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549109" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549110" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80761" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80762" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80763" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552044" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552045" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552046" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552047" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552048" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80764" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549119" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549120" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80765" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549121" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549122" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549123" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549124" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549125" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80766" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538069" comment="kgraft-patch-4_4_121-92_125-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80767" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538070" comment="kgraft-patch-4_4_121-92_120-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80768" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538071" comment="kgraft-patch-4_4_121-92_117-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80769" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538072" comment="kgraft-patch-4_4_121-92_114-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80770" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538073" comment="kgraft-patch-4_4_121-92_109-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80771" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538074" comment="kgraft-patch-4_4_121-92_104-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80772" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549126" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549127" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549128" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549129" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549130" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549131" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549132" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549133" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549134" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549135" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549137" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549138" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549139" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549140" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549142" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549143" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549144" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80773" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552049" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552050" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552051" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80774" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549145" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549146" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549147" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80775" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549148" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549149" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549150" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80776" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009549151" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531809" comment="git-doc-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549152" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549153" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549154" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009549155" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80777" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-09"/>
	<updated date="2021-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531815" comment="fwupdate-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531816" comment="fwupdate-efi-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531817" comment="libfwup0-0.5-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80778" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431)	  
- Fixed  an issue where xenstored was crashing with segfault (bsc#1182155).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531818" comment="xen-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531819" comment="xen-doc-html-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531820" comment="xen-libs-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531821" comment="xen-libs-32bit-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531822" comment="xen-tools-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531823" comment="xen-tools-domU-4.7.6_14-43.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80779" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80780" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552053" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552054" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552055" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80781" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552056" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552057" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552058" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552059" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80782" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80783" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80784" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552066" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552067" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80785" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552069" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552070" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552071" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552072" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80786" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-27"/>
	<updated date="2021-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552073" comment="sudo-1.8.10p3-10.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80787" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552074" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552075" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552076" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80788" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008269.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.5.11 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
- datapath: Clear the L4 portion of the key for 'later' fragments
- datapath: Properly set L4 keys on 'later' IP fragments
- ofproto-dpif: Fix using uninitialised memory in user_action_cookie.
- stream-ssl: Fix crash on NULL private key and valid certificate.
- datapath: fix flow actions reallocation
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-03"/>
	<updated date="2021-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552077" comment="openvswitch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552078" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80789" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80790" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552080" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552081" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552082" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552083" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552084" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80791" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_146 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80792" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80793" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80794" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80795" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80796" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552085" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552087" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552089" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552091" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552092" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552093" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552094" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552095" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552096" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552097" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80797" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1070943" ref_url="https://bugzilla.suse.com/1070943" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could eventually have allowed attackers to cause a denial of service (memory consumption) (bnc#1157298 ).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80798" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008322.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552103" comment="openvswitch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552104" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80799" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552105" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80800" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552106" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80801" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552108" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80802" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552109" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552110" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552111" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552112" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552113" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80803" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552114" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543223" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552115" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80804" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552116" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552117" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80805" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552118" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552119" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552120" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552121" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80806" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552122" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009543254" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80807" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80808" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552123" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552124" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552125" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80809" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552126" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552127" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80810" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

grub2 was bumped to version 2.02, same as SUSE Linux Enterprise 12 SP3.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80811" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80812" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bug was fixed:

- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552136" comment="kernel-default-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552137" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552138" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552140" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538188" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80813" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552141" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80814" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552142" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552143" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552144" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552145" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552146" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552147" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552148" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552149" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552150" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80815" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552151" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552153" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552155" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552157" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552158" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552159" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552160" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552161" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552162" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552163" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80816" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552164" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552165" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552166" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80817" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552167" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552168" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552170" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552172" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552174" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552176" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80818" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_149 fixes several issues.

The following security issues were fixed:

- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2020-25645: Fixed an issue where the traffic between two Geneve endpoints may have been unencrypted when IPsec was configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a potential memory corruption due to a use after free which could have led local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749: Fixed an issue in some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6 where the kernel was not correctly routing tunneled data over the encrypted link rather sending the data unencrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538219" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80819" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 4.4.121-92_146 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538220" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80820" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538221" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80821" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538222" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80822" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538223" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80823" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538224" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80824" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- Fixed a potential crash on exit as a result of the fix of CVE-2021-3156 [bsc#1181090]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552178" comment="sudo-1.8.10p3-10.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80825" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552179" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80826" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552180" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80827" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552181" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552182" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552184" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552186" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80828" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552187" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552188" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552189" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80829" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094150" ref_url="https://bugzilla.suse.com/1094150" source="BUGZILLA"/>
		<reference ref_id="1094154" ref_url="https://bugzilla.suse.com/1094154" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<description>

  
This update for glibc fixes the following issues:

- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:

- Fix crash in resolver on memory allocation failure (bsc#1086690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530086" comment="glibc-profile-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530087" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80830" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1566-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004708.html" source="SUSE-SU"/>
		<description>
This update for git fixes several issues.

These security issues were fixed:

- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)
- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530088" comment="git-core-2.12.3-27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80831" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1571-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004688.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

This security issue was fixed:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80832" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through (bsc#1092885)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530090" comment="libvirt-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530091" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530092" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530093" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530094" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530095" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530097" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530098" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530099" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530100" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530101" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530102" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530103" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530104" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530105" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530106" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530108" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530109" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530110" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80833" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1091836" ref_url="https://bugzilla.suse.com/1091836" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:1661-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004698.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Update to version 20180425 (bsc#1091836)

Fix provided for:

- GLK          B0       6-7a-1/01 0000001e-&gt;00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx

- Name microcodes which are not allowed to load late
  with a *.early suffix
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091836">SUSE bug 1091836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519666" comment="ucode-intel-20180425-13.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80834" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1087066" ref_url="https://bugzilla.suse.com/1087066" source="BUGZILLA"/>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:

These security issues were fixed:

- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For other changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087066">SUSE bug 1087066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80835" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u181 fixes the following issues:

+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80836" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1698-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004689.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following security issue:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519719" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80837" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

This feature was added:

- Added support for qemu monitor command 

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

- bsc#1086039 - Dom0 does not represent DomU cpu flags
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80838" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to version 8.0.5.15 [bsc#1093311, bsc#1085449]

Security fixes:

- CVE-2018-2826 CVE-2018-2825 CVE-2018-2814 CVE-2018-2794
  CVE-2018-2783 CVE-2018-2799 CVE-2018-2798 CVE-2018-2797
  CVE-2018-2796 CVE-2018-2795 CVE-2018-2800 CVE-2018-2790
  CVE-2018-1417

- Removed translations in the java-1_8_0-ibm-devel-32bit package
  as they conflict with those in java-1_8_0-ibm-devel.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80839" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]:

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80840" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80841" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1090518" ref_url="https://bugzilla.suse.com/1090518" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<description>


MariaDB was updated to 10.0.35 (bsc#1090518)

Notable changes:

* PCRE updated to 8.42
* XtraDB updated to 5.6.39-83.1
* TokuDB updated to 5.6.39-83.1
* InnoDB updated to 5.6.40
* The embedded server library now supports SSL when connecting
  to remote servers [bsc#1088681], [CVE-2018-2767]
* MDEV-15249 - Crash in MVCC read after IMPORT TABLESPACE
* MDEV-14988 - innodb_read_only tries to modify files if
  transactions were recovered in COMMITTED state
* MDEV-14773 - DROP TABLE hangs for InnoDB table with FULLTEXT index
* MDEV-15723 - Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES when
  accessing corrupted record
* fixes for the following security vulnerabilities:
  CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
  CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761,
  CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
* Release notes and changelog:

    * https://kb.askmonty.org/en/mariadb-10035-release-notes
    * https://kb.askmonty.org/en/mariadb-10035-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80842" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004719.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519747" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530131" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80843" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083650" ref_url="https://bugzilla.suse.com/1083650" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1086400" ref_url="https://bugzilla.suse.com/1086400" source="BUGZILLA"/>
		<reference ref_id="1087007" ref_url="https://bugzilla.suse.com/1087007" source="BUGZILLA"/>
		<reference ref_id="1087012" ref_url="https://bugzilla.suse.com/1087012" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087095" ref_url="https://bugzilla.suse.com/1087095" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090534" ref_url="https://bugzilla.suse.com/1090534" source="BUGZILLA"/>
		<reference ref_id="1090955" ref_url="https://bugzilla.suse.com/1090955" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092552" ref_url="https://bugzilla.suse.com/1092552" source="BUGZILLA"/>
		<reference ref_id="1092813" ref_url="https://bugzilla.suse.com/1092813" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094033" ref_url="https://bugzilla.suse.com/1094033" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1095042" ref_url="https://bugzilla.suse.com/1095042" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241/" source="CVE"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092/" source="CVE"/>
		<reference ref_id="CVE-2018-1093" ref_url="https://www.suse.com/security/cve/CVE-2018-1093/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
  not handle unsigned integer overflow properly. As a result, a large value of
  the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
  ioctl (bsc#1096728).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
  nid, which allowed local users to cause a denial of service (race condition) or
  possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
  option that triggers a NULL value for a flush_cmd_control data structure
  (bnc#1086400)
- CVE-2017-13305: Prevent information disclosure vulnerability in
  encrypted-keys (bsc#1094353).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
  cause a denial of service (out-of-bounds read and system crash) via a crafted
  ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers
  (bsc#1087095).
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
  crc32c checksum driver, which allowed attackers to cause a denial of service
  (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
  ext4 image (bsc#1087007).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
  with a zero i_links_count, which allowed attackers to cause a denial of service
  (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
  image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
  allowed a local user to cause a denial of service by a number of certain
  crafted system calls (bsc#1092904).
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
  that contains a jump but lacks a user-defined chain, which allowed local users
  to cause a denial of service (NULL pointer dereference) by leveraging the
  CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
  handling SCTP packets length that could have been exploited to cause a kernel
  crash (bnc#1083900).
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
  __rds_rdma_map() function that allowed local attackers to cause a system panic
  and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
  (bsc#1082962).
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
  could have caused a crash and possibly memory corruption (bsc#1089895).

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fix the patch content (bsc#1085185)
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087012">SUSE bug 1087012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087095">SUSE bug 1087095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090534">SUSE bug 1090534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090955">SUSE bug 1090955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092552">SUSE bug 1092552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092813">SUSE bug 1092813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094033">SUSE bug 1094033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095042">SUSE bug 1095042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1093/">CVE-2018-1093</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80844" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1887-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004687.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519760" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519761" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519762" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530140" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530141" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519763" comment="openssl-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80845" version="1" class="patch">
	<metadata>
		<title>Recommended update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1096141" ref_url="https://bugzilla.suse.com/1096141" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<description>


The Intel CPU microcode bundle was updated to the 20180703 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx

- Add a new style supplements for the recent kernels. (bsc#1096141)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096141">SUSE bug 1096141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519785" comment="ucode-intel-20180703-13.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80846" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1068565" ref_url="https://bugzilla.suse.com/1068565" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

These security issue were fixed: 

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)

This non-security issue was fixed: 

- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068565">SUSE bug 1068565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80847" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1997-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004730.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519796" comment="shadow-4.2.1-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80848" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1087289" ref_url="https://bugzilla.suse.com/1087289" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1097523" ref_url="https://bugzilla.suse.com/1097523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12891: Fix preemption checks bypass in x86 PV MM handling (XSA-264) (bsc#1097521).
- CVE-2018-12892: Fix libxl failure to honour readonly flag on HVM emulated SCSI disks (XSA-266) (bsc#1097523).
- CVE-2018-12893: Fix #DB exception safety check that could be triggered by a guest (XSA-265) (bsc#1097522).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-3665: Fix lazy FP Save/Restore (XSA-267) (bsc#1095242).

Bug fixes:

- bsc#1027519: Update to Xen 4.7.6 bug fix only release.
- bsc#1087289: Xen BUG at sched_credit.c:1663.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087289">SUSE bug 1087289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80849" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1054849" ref_url="https://bugzilla.suse.com/1054849" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2320-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004733.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

The following other bugs were fixed:

- Fix libnss_wins.so.2 link libreplace with rpath (bsc#1054849)		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054849">SUSE bug 1054849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530149" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530150" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530151" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530152" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530153" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530154" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530155" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530156" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530157" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530158" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530159" comment="libndr0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530160" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530161" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530162" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530163" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530164" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530165" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530166" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530167" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530168" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530169" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530170" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530171" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530172" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530173" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530174" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530175" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530176" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530177" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530178" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530179" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530180" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530181" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530182" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530183" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530184" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530185" comment="samba-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530186" comment="samba-client-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530187" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530189" comment="samba-libs-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530190" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530191" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530192" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80850" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80851" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80852" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80853" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-1050: Fixed denial of service vulnerability when SPOOLSS is run externally (bsc#1081741). 
- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530194" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80854" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1083635" ref_url="https://bugzilla.suse.com/1083635" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1094248" ref_url="https://bugzilla.suse.com/1094248" source="BUGZILLA"/>
		<reference ref_id="1096130" ref_url="https://bugzilla.suse.com/1096130" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097140" ref_url="https://bugzilla.suse.com/1097140" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098435" ref_url="https://bugzilla.suse.com/1098435" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1100491" ref_url="https://bugzilla.suse.com/1100491" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).

The following non-security bugs were fixed:

- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc-&gt;writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083635">SUSE bug 1083635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094248">SUSE bug 1094248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096130">SUSE bug 1096130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097140">SUSE bug 1097140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098435">SUSE bug 1098435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80855" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2410-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004734.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80856" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2530-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004727.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530211" comment="openssh-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530212" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530213" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530214" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80857" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1091427" ref_url="https://bugzilla.suse.com/1091427" source="BUGZILLA"/>
		<reference ref_id="1094325" ref_url="https://bugzilla.suse.com/1094325" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1100112" ref_url="https://bugzilla.suse.com/1100112" source="BUGZILLA"/>
		<reference ref_id="959329" ref_url="https://bugzilla.suse.com/959329" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2631-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004709.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

This new feature was added:

- bsc#1094325, bsc#1094725: libxl: Enable virsh blockresize for XEN guests

This security issue was fixed:

- CVE-2017-5715: Additional fixes for the Spectre patches (bsc#1079869)

These non-security issues were fixed:

- bsc#1100112: schema: allow any strings in smbios entry qemu: escape smbios entry strings 
- bsc#1091427: libxl: fix segfault in libxlReconnectDomain 
- bsc#959329: libxl: don't set hasManagedSave when performing save 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091427">SUSE bug 1091427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094325">SUSE bug 1094325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100112">SUSE bug 1100112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959329">SUSE bug 959329</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530215" comment="libvirt-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530216" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530217" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530218" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530219" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530220" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530222" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530223" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530224" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530225" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530226" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530227" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530228" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530229" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530230" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530231" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530233" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530234" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530235" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80858" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1082828" ref_url="https://bugzilla.suse.com/1082828" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2632-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004697.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issue fixed:

- CVE-2017-15130: Fixed a potential denial of service via TLS SNI config
  lookups, which would slow the process down and could have led to exhaustive
  memory allocation and/or process restarts (bsc#1082828)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530236" comment="dovecot22-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530237" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530238" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530239" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80859" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80860" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1079334" ref_url="https://bugzilla.suse.com/1079334" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper provides the following fixes:

Update libzypp to version 16.17.20

Security issues fixed:

- PackageProvider: Validate delta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45

Security issue fixed:
- Improve signature check callback messages
  (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- do not recommend cron (bsc#1079334)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079334">SUSE bug 1079334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530245" comment="libzypp-16.17.20-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530246" comment="zypper-1.13.45-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80861" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2779-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004710.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520063" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520064" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530248" comment="openslp-server-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80862" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1104826" ref_url="https://bugzilla.suse.com/1104826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2815-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004718.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530249" comment="apache2-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530251" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530252" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530253" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530254" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80863" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
- 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
- HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
- HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530255" comment="gnutls-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530256" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530257" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530258" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80864" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:

- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1104668)
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1104668)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1104668)
- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE. Successful attacks require human
  interaction from a person other than the attacker. Successful attacks of this
  vulnerability can result in takeover of Java SE. (bsc#1104668)
- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that
  allowed remote attackers to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a malformed DSA private key
  (bsc#1104668)
- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)
- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)
- CVE-2018-12539: Users other than the process owner might have been able to
  use Java Attach API to connect to an IBM JVM on the same machine and use Attach
  API operations, which includes the ability to execute untrusted native code
  (bsc#1104668)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80865" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80866" version="1" class="patch">
	<metadata>
		<title>Security update for smt, yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1006984" ref_url="https://bugzilla.suse.com/1006984" source="BUGZILLA"/>
		<reference ref_id="1006989" ref_url="https://bugzilla.suse.com/1006989" source="BUGZILLA"/>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="1097824" ref_url="https://bugzilla.suse.com/1097824" source="BUGZILLA"/>
		<reference ref_id="1103809" ref_url="https://bugzilla.suse.com/1103809" source="BUGZILLA"/>
		<reference ref_id="1103810" ref_url="https://bugzilla.suse.com/1103810" source="BUGZILLA"/>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470/" source="CVE"/>
		<reference ref_id="CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471/" source="CVE"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004724.html" source="SUSE-SU"/>
		<description>
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006984">SUSE bug 1006984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006989">SUSE bug 1006989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097824">SUSE bug 1097824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530263" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530264" comment="smt-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530265" comment="smt-support-3.0.37-52.23.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80867" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:2902-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004686.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues in yast2-smt:

- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Added missing translation marks (bsc#1037811)
- Remove cron job rescheduling (bsc#1097560)

This update is a requirement for the security update for SMT. Because of that it is
tagged as security to ensure that all users, even those that only install security updates,
install it.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530266" comment="yast2-smt-3.0.14-17.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80868" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2928-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004729.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520119" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520120" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520121" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530267" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530268" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520122" comment="openssl-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80869" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530270" comment="qemu-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530271" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530273" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530274" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530276" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530277" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530280" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80870" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80871" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:2991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004735.html" source="SUSE-SU"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520128" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520129" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530283" comment="openslp-server-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80872" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80873" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80874" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2018:3074-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004711.html" source="SUSE-SU"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520151" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520152" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520153" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530291" comment="postgresql-init-10-17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520154" comment="postgresql10-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530292" comment="postgresql10-contrib-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530293" comment="postgresql10-docs-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530294" comment="postgresql10-server-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80875" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1088810" ref_url="https://bugzilla.suse.com/1088810" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1094466" ref_url="https://bugzilla.suse.com/1094466" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="1108239" ref_url="https://bugzilla.suse.com/1108239" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14678" ref_url="https://www.suse.com/security/cve/CVE-2018-14678/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw (bnc#1106016).
- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allowed local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bnc#1092903).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).
- CVE-2018-13093: There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation (bnc#1100001).
- CVE-2018-13094: An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-13095: A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork (bnc#1099999).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-14678: The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S did not properly maintain RBX, which allowed local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges (bnc#1102715).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bnc#1107689).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following security bugs were fixed:
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).

The following non-security bugs were fixed:

- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- kABI: protect struct x86_emulate_ops (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kvm: MMU: always terminate page walks at level 1 (bsc#1062604).
- kvm: MMU: simplify last_pte_bitmap (bsc#1062604).
- kvm: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- kvm: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- kvm: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108239).
- net: ena: fix device destruction to gracefully free resources (bsc#1108239).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108239).
- net: ena: fix incorrect usage of memory barriers (bsc#1108239).
- net: ena: fix missing calls to READ_ONCE (bsc#1108239).
- net: ena: fix missing lock during device destruction (bsc#1108239).
- net: ena: fix potential double ena_destroy_device() (bsc#1108239).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108239).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1108239).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382 bsc#1100152).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- provide special timeout module parameters for EC2 (bsc#1065364).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86: Drop kernel trampoline stack. It is involved in breaking kdump/kexec infrastucture. (bsc#1099597)
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key &amp; ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088810">SUSE bug 1088810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094466">SUSE bug 1094466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108239">SUSE bug 1108239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14678/">CVE-2018-14678</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80876" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80877" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) could have locked up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)

Non security issues fixed:

- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80878" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80879" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80880" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520274" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520275" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520276" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520277" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520278" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80881" version="1" class="patch">
	<metadata>
		<title>Security update for smt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="1111056" ref_url="https://bugzilla.suse.com/1111056" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004795.html" source="SUSE-SU"/>
		<description>


SMT was updated to version 3.0.38.

Following security issue was fixed:

- CVE-2018-12472: Harden hostname check during sibling check by forcing double
  reverse lookup (bsc#1104076)

Following non security issues were fixed:

- Add migration path check when registration sharing is enabled
- Fix sibling sync errors (bsc#1111056):
  - Synchronize all registered products
  - Handle duplicate registrations when syncing
  - Force resync to the sibling instance in `upgrade` and
    `synchronize` API calls
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111056">SUSE bug 1111056</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530314" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530315" comment="smt-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530316" comment="smt-support-3.0.38-52.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80882" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1109961" ref_url="https://bugzilla.suse.com/1109961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004815.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-11763: In Apache HTTP Server by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. (bsc#1109961)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530317" comment="apache2-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530319" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530320" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530321" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530322" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80883" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80884" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80885" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80886" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530330" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530331" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80887" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80888" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530337" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80889" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80890" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80891" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<description>

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)

* Class Libraries:

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10930 CVE-2018-3183
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
  - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

  - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
  - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
  - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
  - IJ10931 CVE-2018-3169
  - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
  - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
  - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
  - IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

  - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
  - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
  - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

  - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

  - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
  - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
  - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
  - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER

* z/OS Extentions

  - PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM

* Java Virtual Machine

  - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
  - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

  - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE
  - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
  - IJ08205 CRASH WHILE COMPILING
  - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80892" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80893" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530347" comment="git-core-2.12.3-27.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80894" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530349" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530350" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530351" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530352" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530353" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530354" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530355" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530356" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530357" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530358" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530359" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530360" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530361" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530362" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530363" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80895" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80896" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-22"/>
	<updated date="2018-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80897" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1077358" ref_url="https://bugzilla.suse.com/1077358" source="BUGZILLA"/>
		<reference ref_id="1099510" ref_url="https://bugzilla.suse.com/1099510" source="BUGZILLA"/>
		<reference ref_id="1101288" ref_url="https://bugzilla.suse.com/1101288" source="BUGZILLA"/>
		<reference ref_id="925502" ref_url="https://bugzilla.suse.com/925502" source="BUGZILLA"/>
		<reference ref_id="995352" ref_url="https://bugzilla.suse.com/995352" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following security vulnerabilities:

- Fixed a XSS vulnerability and information leak in user options CGI, which
  could be used to execute arbitrary scripts in the user's browser via
  specially encoded URLs (bsc#1077358 CVE-2018-5950)
- Fixed a directory traversal vulnerability in MTA transports when using the
  recommended Mailman Transport for Exim (bsc#925502 CVE-2015-2775)
- Fixed a XSS vulnerability, which allowed malicious listowners to inject
  scripts into the listinfo pages (bsc#1099510 CVE-2018-0618)
- Fixed arbitrary text injection vulnerability in several mailman CGIs
  (CVE-2018-13796 bsc#1101288)
- Fixed a CSRF vulnerability on the user options page (CVE-2016-6893 bsc#995352)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-28"/>
	<updated date="2018-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80898" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1086774" ref_url="https://bugzilla.suse.com/1086774" source="BUGZILLA"/>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086813" ref_url="https://bugzilla.suse.com/1086813" source="BUGZILLA"/>
		<reference ref_id="1086814" ref_url="https://bugzilla.suse.com/1086814" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="1086820" ref_url="https://bugzilla.suse.com/1086820" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715/" source="CVE"/>
		<reference ref_id="CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1302" ref_url="https://www.suse.com/security/cve/CVE-2018-1302/" source="CVE"/>
		<reference ref_id="CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

  * CVE-2018-1283:  when mod_session is configured to forward its session data to CGI applications 
                    (SessionEnv on, not the default), a remote user may influence their content by 
                    using a \'Session\' header leading to unexpected behavior [bsc#1086814].

  * CVE-2018-1301: due to an out of bound access after a size limit being reached by reading the HTTP header, 
                   a specially crafted request could lead to remote denial of service. [bsc#1086817]
  
  * CVE-2018-1303: a specially crafted HTTP request header could lead to crash due to an out of bound read 
                   while preparing data to be cached in shared memory.[bsc#1086813]
  
  * CVE-2017-15715: a regular expression could match '$' to a newline character in a malicious filename, 
                    rather than matching only the end of the filename. leading to corruption of uploaded files.[bsc#1086774]
  
  * CVE-2018-1312: when generating an HTTP Digest authentication challenge, the nonce sent to prevent 
                   reply attacks was not correctly generated using a pseudo-random seed. 
                   In a cluster of servers using a common Digest authentication configuration, 
                   HTTP requests could be replayed across servers by an attacker without detection. [bsc#1086775]
  
  * CVE-2017-15710: mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, 
                    uses the Accept-Language header value to lookup the right charset encoding when verifying the 
                    user's credentials. If the header value is not present in the charset conversion table, 
                    a fallback mechanism is used to truncate it to a two characters value to allow a quick retry 
                    (for example, 'en-US' is truncated to 'en'). 
                    A header value of less than two characters forces an out of bound write of one NUL byte to a 
                   memory location that is not part of the string. In the worst case, quite unlikely, the process 
                   would crash which could be used as a Denial of Service attack. In the more likely case, this memory 
                   is already reserved for future use and the issue has no effect at all. [bsc#1086820]
  
  * CVE-2018-1302: when an HTTP/2 stream was destroyed after being handled, it 
                   could have written a NULL pointer potentially to an already freed memory. 
                   The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, 
                   the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk. 
                   [bsc#1086820]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086820">SUSE bug 1086820</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1302/">CVE-2018-1302</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80899" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1057734" ref_url="https://bugzilla.suse.com/1057734" source="BUGZILLA"/>
		<reference ref_id="1070536" ref_url="https://bugzilla.suse.com/1070536" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076847" ref_url="https://bugzilla.suse.com/1076847" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1083745" ref_url="https://bugzilla.suse.com/1083745" source="BUGZILLA"/>
		<reference ref_id="1083836" ref_url="https://bugzilla.suse.com/1083836" source="BUGZILLA"/>
		<reference ref_id="1084353" ref_url="https://bugzilla.suse.com/1084353" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1084829" ref_url="https://bugzilla.suse.com/1084829" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085402" ref_url="https://bugzilla.suse.com/1085402" source="BUGZILLA"/>
		<reference ref_id="1085404" ref_url="https://bugzilla.suse.com/1085404" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1086194" ref_url="https://bugzilla.suse.com/1086194" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087845" ref_url="https://bugzilla.suse.com/1087845" source="BUGZILLA"/>
		<reference ref_id="1088241" ref_url="https://bugzilla.suse.com/1088241" source="BUGZILLA"/>
		<reference ref_id="1088242" ref_url="https://bugzilla.suse.com/1088242" source="BUGZILLA"/>
		<reference ref_id="1088600" ref_url="https://bugzilla.suse.com/1088600" source="BUGZILLA"/>
		<reference ref_id="1088684" ref_url="https://bugzilla.suse.com/1088684" source="BUGZILLA"/>
		<reference ref_id="1089198" ref_url="https://bugzilla.suse.com/1089198" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1090643" ref_url="https://bugzilla.suse.com/1090643" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)

The following non-security bugs were fixed:

- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&amp;W PX headphones (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: Remove Other from EIAC (bsc#1075428).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- rpm/config.sh: ensure sorted patches.
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).
- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).
- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057734">SUSE bug 1057734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070536">SUSE bug 1070536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076847">SUSE bug 1076847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083745">SUSE bug 1083745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083836">SUSE bug 1083836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085402">SUSE bug 1085402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085404">SUSE bug 1085404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086194">SUSE bug 1086194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087845">SUSE bug 1087845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088242">SUSE bug 1088242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088600">SUSE bug 1088600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088684">SUSE bug 1088684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089198">SUSE bug 1089198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80900" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).

These non-security issues were fixed:

- bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly
- bsc#1027519: Fixed shadow mode guests
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80901" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004707.html" source="SUSE-SU"/>
		<description>
This update for curl fixes several issues:

Security issues fixed:

- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:

- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
  (bsc#1086825)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520965" comment="curl-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520966" comment="libcurl4-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520967" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80902" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to the ESR 52.8 release fixes the following issues:

Mozil to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530393" comment="MozillaFirefox-devel-52.8.0esr-109.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80903" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1079405" ref_url="https://bugzilla.suse.com/1079405" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1362-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes several issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

This feature was added:

- Add support for block resize support for xen disks through the monitor

This non-security issue was fixed:

- bsc#1079405: Add new look up path 'sys/class/tpm' for tpm cancel path based
  on Linux 4.0 change
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079405">SUSE bug 1079405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530394" comment="qemu-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530395" comment="qemu-block-curl-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530396" comment="qemu-block-rbd-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530397" comment="qemu-block-ssh-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530398" comment="qemu-guest-agent-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530399" comment="qemu-ipxe-1.0.0-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530400" comment="qemu-kvm-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530401" comment="qemu-lang-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530402" comment="qemu-seabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530403" comment="qemu-sgabios-8-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530404" comment="qemu-tools-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530405" comment="qemu-vgabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530406" comment="qemu-x86-2.6.2-41.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80904" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1090953" ref_url="https://bugzilla.suse.com/1090953" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1092289" ref_url="https://bugzilla.suse.com/1092289" source="BUGZILLA"/>
		<reference ref_id="1093215" ref_url="https://bugzilla.suse.com/1093215" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1377-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

The following related and non-security bugs were fixed:

- cpuid: Fix cpuid.edx.7.0 propagation to guest
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090953">SUSE bug 1090953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092289">SUSE bug 1092289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093215">SUSE bug 1093215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530407" comment="kernel-default-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530408" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530409" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530413" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80905" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1086247" ref_url="https://bugzilla.suse.com/1086247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:

Security issues fixed:

- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:

- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
  external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086247">SUSE bug 1086247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80906" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) used an integer data type
  that is inconsistent with a header file, which allowed remote attackers
  to cause a denial of service (incorrect malloc followed by invalid free)
  or possibly execute arbitrary code via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) did not properly track
  directionally isolated pieces of text, which allowed remote attackers
  to cause a denial of service (heap-based buffer overflow) or possibly
  execute arbitrary code via crafted text (bsc#929629).
- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in
  common/uloc.cpp in International Components for Unicode (ICU) for C/C++
  did not ensure that there is a '\0' character at the end of a certain
  temporary array, which allowed remote attackers to cause a denial of
  service (out-of-bounds read) or possibly have unspecified other impact
  via a call with a long httpAcceptLanguage argument (bsc#990636).
- CVE-2017-7868: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_moveIndex32* function (bsc#1034674)
- CVE-2017-7867: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_setNativeIndex* function (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International
  Components for Unicode (ICU) for C/C++ allowed remote attackers to
  execute arbitrary code via a crafted string, aka a 'redundant UVector
  entry clean up function call' issue (bnc#1067203)
- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp
  in International Components for Unicode (ICU) for C/C++ mishandled
  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote
  attackers to cause a denial of service (stack-based buffer overflow
  and application crash) or possibly have unspecified other impact via a
  crafted string, as demonstrated by ZNC  (bnc#1072193)
- CVE-2017-15422: An integer overflow in icu during persian calendar
  date processing could lead to incorrect years shown (bnc#1077999)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80907" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80908" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1132549" ref_url="https://bugzilla.suse.com/1132549" source="BUGZILLA"/>
		<reference ref_id="1132664" ref_url="https://bugzilla.suse.com/1132664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:

- CVE-2019-11235: Fixed an authentication bypass related to the EAP-PWD Commit frame and insufficent validation of elliptic curve points (bsc#1132549).
- CVE-2019-11234: Fixed an authentication bypass caused by reflecting privous values back to the server (bsc#1132664).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530416" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530417" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530418" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530419" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530420" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530421" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530422" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530423" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530424" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530425" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530426" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80909" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80910" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80911" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80912" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530427" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530428" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530429" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530430" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530431" comment="krb5-server-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80913" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80914" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005421.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521132" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521133" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521134" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530433" comment="libopenssl1_0_0-hmac-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530434" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521135" comment="openssl-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530435" comment="openssl-doc-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80915" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80916" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005430.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Save registry file outside share as unprivileged user (bsc#1131060).

Non-security issue fixed:

- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-08"/>
	<updated date="2019-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530438" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80917" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1087481" ref_url="https://bugzilla.suse.com/1087481" source="BUGZILLA"/>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1114459" ref_url="https://bugzilla.suse.com/1114459" source="BUGZILLA"/>
		<reference ref_id="1126463" ref_url="https://bugzilla.suse.com/1126463" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005440.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fixed an issue where the first login failed and subsequent ones work (bsc#1126463).
- Fixed winbind running out of memory with high number of domain groups (bsc#1114459).
- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087481">SUSE bug 1087481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114459">SUSE bug 1114459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126463">SUSE bug 1126463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530439" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530440" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530441" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530442" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530443" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530444" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530445" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530446" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530447" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530448" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530449" comment="libndr0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530450" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530451" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530452" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530453" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530454" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530455" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530456" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530457" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530458" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530459" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530460" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530461" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530462" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530463" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530464" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530465" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530466" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530467" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530468" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530469" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530470" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530471" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530472" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530473" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530474" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530475" comment="samba-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530476" comment="samba-client-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530477" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530479" comment="samba-libs-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530480" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530481" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530482" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80918" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005433.html" source="SUSE-SU"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80919" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80920" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80921" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80922" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Following security issues were fixed:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80923" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1024908" ref_url="https://bugzilla.suse.com/1024908" source="BUGZILLA"/>
		<reference ref_id="1034113" ref_url="https://bugzilla.suse.com/1034113" source="BUGZILLA"/>
		<reference ref_id="1043485" ref_url="https://bugzilla.suse.com/1043485" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1080533" ref_url="https://bugzilla.suse.com/1080533" source="BUGZILLA"/>
		<reference ref_id="1082632" ref_url="https://bugzilla.suse.com/1082632" source="BUGZILLA"/>
		<reference ref_id="1087231" ref_url="https://bugzilla.suse.com/1087231" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1087906" ref_url="https://bugzilla.suse.com/1087906" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094268" ref_url="https://bugzilla.suse.com/1094268" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1124832" ref_url="https://bugzilla.suse.com/1124832" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1129279" ref_url="https://bugzilla.suse.com/1129279" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1132673" ref_url="https://bugzilla.suse.com/1132673" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. (bnc#1096748).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. (bnc#1096748).
- CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c allowed local users to cause a denial of service (memory corruption), obtain sensitive information or possibly have unspecified other impact via a write or read request involving the 'RDMA protocol over infiniband' (aka Soft RoCE) technology (bnc#1024908).
- CVE-2017-18174: In the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c has multiple race conditions (bnc#1133188).
- CVE-2019-3882: A flaw was found in the vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS) (bsc#1131427).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2017-17741: The KVM implementation allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2019-9503, CVE-2019-8564: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828, bnc#1132673).

The following non-security bugs were fixed:

- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- add mainline tags to four hyperv patches
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- Drivers: hv: vmbus: Define an API to retrieve virtual processor index (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the event page (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the message page (bsc#1122822).++ kernel-source.spec (revision 4)Release:    &amp;lt;RELEASE&gt;.gbd4498d
- Drivers: hv: vmbus: Define APIs to manipulate the synthetic interrupt controller (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1111331).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from &lt;linux/bitops.h&gt; to a new &lt;linux/bits.h&gt; file (bsc#1111331).
- MDS: Add CVE refs
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1129279).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1129279).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1129279).
- net: ena: complete host info to match latest ENA spec (bsc#1129279).
- net: ena: enable Low Latency Queues (bsc#1129279).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1129279).
- net: ena: fix auto casting to boolean (bsc#1129279).
- net: ena: fix compilation error in xtensa architecture (bsc#1129279).
- net: ena: fix crash during ena_remove() (bsc#1129279).
- net: ena: fix crash during failed resume from hibernation (bsc#1129279).
- net: ena: fix indentations in ena_defs for better readability (bsc#1129279).
- net: ena: Fix Kconfig dependency on X86 (bsc#1129279).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1129279).
- net: ena: fix race between link up and device initalization (bsc#1129279).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1129279).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1129279).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1129279).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1129279).
- net: ena: minor performance improvement (bsc#1129279).
- net: ena: remove ndo_poll_controller (bsc#1129279).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1129279).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1129279).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129279).
- net: ena: update driver version to 2.0.1 (bsc#1129279).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1129279).
- PCI: hv: Add vPCI version protocol negotiation (bnc#1043485, bsc#1122822).
- PCI: hv: Allocate interrupt descriptors with GFP_ATOMIC (bnc#1034113, bsc#1122822).
- PCI: hv: Disable/enable IRQs rather than BH in hv_compose_msi_msg() (bnc#1094268, bsc#1122822).
- PCI: hv: Do not sleep in compose_msi_msg() (bsc#1082632, bsc#1122822).
- PCI: hv: Fix 2 hang issues in hv_compose_msi_msg() (bsc#1087659, bsc#1087906, bsc#1122822).
- PCI: hv: Fix a comment typo in _hv_pcifront_read_config() (bsc#1087659, bsc#1122822).
- PCI: hv: Fix comment formatting and use proper integer fields (bnc#1043485, bsc#1122822).
- PCI: hv: Only queue new work items in hv_pci_devices_present() if necessary (bsc#1087659, bsc#1122822).
- PCI: hv: Remove the bogus test in hv_eject_device_work() (bsc#1087659, bsc#1122822).
- PCI: hv: Serialize the present and eject work items (bsc#1087659, bsc#1122822).
- PCI: hv: Specify CPU_AFFINITY_ALL for MSI affinity when &gt;= 32 CPUs (bnc#1043485, bsc#1122822).
- PCI: hv: Temporary own CPU-number-to-vCPU-number infra (bnc#1043485, bsc#1122822).
- PCI: hv: Use effective affinity mask (bsc#1109772, bsc#1122822).
- PCI: hv: Use page allocation for hbus structure (bnc#1043485, bsc#1122822).
- PCI: hv: Use vPCI protocol version 1.2 (bnc#1043485, bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1068032).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1111331).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- Use upstream variant of two pci-hyperv patches
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382 bsc#1100152).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1111331).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#1111331).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772, bsc#1122822).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86: stop exporting msr-index.h to userland (bsc#1111331).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382 bsc#1100152).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382 bsc#1100152).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024908">SUSE bug 1024908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034113">SUSE bug 1034113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043485">SUSE bug 1043485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082632">SUSE bug 1082632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087906">SUSE bug 1087906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094268">SUSE bug 1094268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124832">SUSE bug 1124832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129279">SUSE bug 1129279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80924" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80925" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530509" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80926" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80927" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80928" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521212" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521213" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521214" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80929" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Fixed an issue with live migration when spectre is enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue with live migration (bsc#1133818).
- Added upstream bug fix (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80930" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80931" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80932" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80933" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other security issues fixed:

- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest hostname under readonly mode (bsc#1131595).
- qemu: Add support for using AES secret for SCSI hotplug
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80934" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80935" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80936" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80937" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80938" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530557" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80939" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134596" ref_url="https://bugzilla.suse.com/1134596" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel version 4.4.121 was updated to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote
  attacker such that one can trigger an integer overflow, leading to a kernel
  panic. (bsc#1137586).

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  would fragment the TCP retransmission queue. A remote attacker may have been
  able to further exploit the fragmented queue to cause an expensive linked-list
  walk for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  would fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly
  escalate privileges was found in the mwifiex kernel module while connecting
  to a malicious wireless network. (bnc#1136424)

- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in
  drivers/gpu/drm/drm_edid_load.c in the Linux kernel There is an unchecked
  kstrdup of fwstr, which may have allowed an attacker to cause a denial of service
  (NULL pointer dereference and system crash). (bnc#1136586)

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may have been possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server. (bnc#1120843)

- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the
  unused memory region in the extent tree block, which might have allowed local users
  to obtain sensitive information by reading uninitialized data in the
  filesystem. (bnc#1135281)

- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was
  not called before register_netdevice. This allowed local users to cause a denial of 
  service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev
  name containing a / character. This is similar to CVE-2013-4343. (bnc#1135603)

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  had a race condition when reading /proc/pid/stat. (bnc#1131543)

- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c
  in the Linux kernel There was a race condition leading to a use-after-free,
  related to net namespace cleanup. (bnc#1134537)

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not have ended with a '\0' character. (bnc#1134848)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents.
  (bnc#1110785)

The following non-security bugs were fixed:

- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1134596).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1134596).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134596">SUSE bug 1134596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80940" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issue:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530566" comment="dbus-1-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530567" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530568" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530569" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80941" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80942" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80943" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521520" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521523" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521525" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80944" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80945" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 35.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80946" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530574" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80947" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1061599" ref_url="https://bugzilla.suse.com/1061599" source="BUGZILLA"/>
		<reference ref_id="1107116" ref_url="https://bugzilla.suse.com/1107116" source="BUGZILLA"/>
		<reference ref_id="1107121" ref_url="https://bugzilla.suse.com/1107121" source="BUGZILLA"/>
		<reference ref_id="1137001" ref_url="https://bugzilla.suse.com/1137001" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<description>
This update for glib2 provides the following fix:


Security issues fixed:

- CVE-2019-12450: Fixed an improper file permission when copy operation
  takes place (bsc#1137001).     
- CVE-2018-16428: Avoid a null pointer dereference that could crash glib2 users in markup processing (bnc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).

Non-security issues fixed:

- Install dummy *-mimeapps.list files to prevent dead symlinks. (bsc#1061599)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-02"/>
	<updated date="2019-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1061599">SUSE bug 1061599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80948" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530577" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530578" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530579" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80949" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1134701" ref_url="https://bugzilla.suse.com/1134701" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#)
- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#)
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
- CVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#)
- CVE-2019-11487: The Linux kernel allowed page-_refcount reference count to overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (bnc#1133190)

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- x86/cpu: Unify CPU family, model, stepping calculation (bsc#1134701).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
- x86/microcode/AMD: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/AMD: Fix load of builtin microcode with randomized memory (bsc#1134701).
- x86/microcode/AMD: Reload proper initrd start address (bsc#1134701).
- x86/microcode/amd: Hand down the CPU family (bsc#1134701).
- x86/microcode/amd: Move private inlines to .c and mark local functions static (bsc#1134701).
- x86/microcode/intel: Drop stashed AP patch pointer optimization (bsc#1134701).
- x86/microcode/intel: Fix allocation size of struct ucode_patch (bsc#1134701).
- x86/microcode/intel: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/intel: Remove intel_lib.c (bsc#1134701).
- x86/microcode/intel: Remove unused arg of get_matching_model_microcode() (bsc#1134701).
- x86/microcode/intel: Rename load_microcode_early() to find_microcode_patch() (bsc#1134701).
- x86/microcode/intel: Rename local variables of type struct mc_saved_data (bsc#1134701).
- x86/microcode/intel: Rename mc_intel variable to mc (bsc#1134701).
- x86/microcode/intel: Rename mc_saved_in_initrd (bsc#1134701).
- x86/microcode/intel: Simplify generic_load_microcode() (bsc#1134701).
- x86/microcode/intel: Unexport save_mc_for_early() (bsc#1134701).
- x86/microcode/intel: Use correct buffer size for saving microcode data (bsc#1134701).
- x86/microcode: Collect CPU info on resume (bsc#1134701).
- x86/microcode: Export the microcode cache linked list (bsc#1134701).
- x86/microcode: Fix loading precedence (bsc#1134701).
- x86/microcode: Get rid of find_cpio_data()'s dummy offset arg (bsc#1134701).
- x86/microcode: Issue the debug printk on resume only on success (bsc#1134701).
- x86/microcode: Rework microcode loading (bsc#1134701).
- x86/microcode: Run the AP-loading routine only on the application processors (bsc#1134701).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134701">SUSE bug 1134701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80950" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80951" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530589" comment="MozillaFirefox-devel-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80952" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80953" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80954" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80955" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80956" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed an issue with live migrations, which used to fail when spectre is
  enabled on xen boot cmdline (bsc#1116380)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80957" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80958" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80959" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80960" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80961" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80962" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80963" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80964" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80965" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issue fixed:

- qemu: Add support for overriding max threads per process limit (bsc#1133719)
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530630" comment="libvirt-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530631" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530632" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530633" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530634" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530635" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530637" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530638" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530639" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530640" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530641" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530642" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530643" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530644" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530645" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530646" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530648" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530649" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530650" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80966" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-06"/>
	<updated date="2019-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530651" comment="qemu-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530652" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530654" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530655" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530657" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530658" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530661" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80967" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530664" comment="postgresql94-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530665" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530667" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530668" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530669" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530670" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80968" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80969" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80970" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80971" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1045640" ref_url="https://bugzilla.suse.com/1045640" source="BUGZILLA"/>
		<reference ref_id="1076033" ref_url="https://bugzilla.suse.com/1076033" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140012" ref_url="https://bugzilla.suse.com/1140012" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1141628" ref_url="https://bugzilla.suse.com/1141628" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142098" ref_url="https://bugzilla.suse.com/1142098" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<description>
 The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).


The following non-security bugs were fixed:

- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
- i40e: add functions to control default VSI (bsc#1141628).
- i40e: set default VSI without a reset (bsc#1141628).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045640">SUSE bug 1045640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076033">SUSE bug 1076033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140012">SUSE bug 1140012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141628">SUSE bug 1141628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142098">SUSE bug 1142098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80972" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530687" comment="libspice-server1-0.12.7-10.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80973" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80974" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80975" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80976" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80977" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80978" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80979" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80980" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530709" comment="MozillaFirefox-devel-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80981" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80982" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80983" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80984" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80985" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80986" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80987" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges 
  that allowed them to run commands with an arbitrary uid, could 
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530718" comment="sudo-1.8.10p3-10.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80988" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80989" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530719" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80990" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:
	  
- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80991" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80992" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530727" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80993" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530728" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530729" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530730" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530731" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530732" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530733" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530734" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530735" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530736" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530737" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530738" comment="libndr0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530739" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530740" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530741" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530742" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530743" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530744" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530745" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530746" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530747" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530748" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530749" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530750" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530751" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530752" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530753" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530754" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530755" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530756" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530757" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530758" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530759" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530760" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530761" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530762" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530763" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530764" comment="samba-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530765" comment="samba-client-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530766" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530768" comment="samba-libs-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530769" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530770" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530771" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80994" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006096.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]

- Add gdb-s390-handle-arch13.diff to handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530772" comment="gdb-8.3.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80995" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80996" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80997" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80998" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80999" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81000" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139550" ref_url="https://bugzilla.suse.com/1139550" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1144338" ref_url="https://bugzilla.suse.com/1144338" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1149849" ref_url="https://bugzilla.suse.com/1149849" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150223" ref_url="https://bugzilla.suse.com/1150223" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)

- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)

- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)

The following non-security bugs were fixed:

- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)
- ipv6: Update ipv6 defrag code (add bsc#1141054).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm kABI Fix for NX patches (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- mm: use upstream patch for bsc#1106913
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).
- x86/mitigations: Backport the STIBP pile See bsc#1139550
- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139550">SUSE bug 1139550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144338">SUSE bug 1144338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149849">SUSE bug 1149849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150223">SUSE bug 1150223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81001" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81002" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81003" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81004" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81005" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81006" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81007" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:
	  
Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-09"/>
	<updated date="2019-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530784" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530785" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81008" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81009" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81010" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1009254" ref_url="https://bugzilla.suse.com/1009254" source="BUGZILLA"/>
		<reference ref_id="1071853" ref_url="https://bugzilla.suse.com/1071853" source="BUGZILLA"/>
		<reference ref_id="1093536" ref_url="https://bugzilla.suse.com/1093536" source="BUGZILLA"/>
		<reference ref_id="1094462" ref_url="https://bugzilla.suse.com/1094462" source="BUGZILLA"/>
		<reference ref_id="1107874" ref_url="https://bugzilla.suse.com/1107874" source="BUGZILLA"/>
		<reference ref_id="1109845" ref_url="https://bugzilla.suse.com/1109845" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<description>
This update for strongswan provides the following fixes:
	  
Security issues fixed: 

- CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker 
  with local user credentials to resource exhaustion and denial of service while 
  reading from the socket (bsc#1094462).
- CVE-2018-10811: Fixed a denial of service during  the IKEv2 key derivation if 
  the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF 
  (bsc#1093536).
- CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which 
  might lead to authorization bypass (bsc#1107874).
- CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).  

Other issues addressed:

- Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853).
- Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit.
- Handle unexpected informational message from SonicWall. (bsc#1009254)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1009254">SUSE bug 1009254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071853">SUSE bug 1071853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81011" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81012" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81013" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530790" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530791" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530792" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530793" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530794" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81014" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1072947" ref_url="https://bugzilla.suse.com/1072947" source="BUGZILLA"/>
		<reference ref_id="1078662" ref_url="https://bugzilla.suse.com/1078662" source="BUGZILLA"/>
		<reference ref_id="1080740" ref_url="https://bugzilla.suse.com/1080740" source="BUGZILLA"/>
		<reference ref_id="1084300" ref_url="https://bugzilla.suse.com/1084300" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005118.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

This non-security issue was fixed:

- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
  by embedding shell commands in a mountpoint name, which was mishandled during a
  umount command by a different user (bsc#1084300).

These non-security issues were fixed:

- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-14"/>
	<updated date="2019-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1072947">SUSE bug 1072947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078662">SUSE bug 1078662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530795" comment="libblkid1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530796" comment="libblkid1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530797" comment="libfdisk1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530798" comment="libmount1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530799" comment="libmount1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530800" comment="libsmartcols1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530801" comment="libuuid1-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530802" comment="libuuid1-32bit-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530803" comment="python-libmount-2.28-44.18.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530804" comment="util-linux-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530805" comment="util-linux-lang-2.28-44.18.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530806" comment="util-linux-systemd-2.28-44.18.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530807" comment="uuidd-2.28-44.18.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81015" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005135.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521621" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521622" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521623" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521624" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521625" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521626" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521628" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521629" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81016" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086535" ref_url="https://bugzilla.suse.com/1086535" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091197" ref_url="https://bugzilla.suse.com/1091197" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1110837" ref_url="https://bugzilla.suse.com/1110837" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1113192" ref_url="https://bugzilla.suse.com/1113192" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117187" ref_url="https://bugzilla.suse.com/1117187" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).

The following non-security bugs were fixed:

- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ata: Fix racy link clearance (bsc#1107866).
- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ip: hash fragments consistently (bsc#1042286 bsc#1108145).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- libfc: sync strings with upstream versions (bsc#1114763).
- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.
- mm: add support for releasing multiple instances of a page (bsc#1100105).
- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- NFS: add nostatflush mount option (bsc#1065726).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bsc#1114648).
- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bsc#1105931).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086535">SUSE bug 1086535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091197">SUSE bug 1091197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110837">SUSE bug 1110837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113192">SUSE bug 1113192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117187">SUSE bug 1117187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81017" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81018" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005144.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-21"/>
	<updated date="2019-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520140" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81019" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104301" ref_url="https://bugzilla.suse.com/1104301" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:
  
Security issue fixed:

- CVE-2018-5383: Fixed an implementation issue in Bluetooth where the eliptic curve parameters 
  were not sufficiently validated during Diffie-Hellman key exchange (bsc#1104301).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-22"/>
	<updated date="2019-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81020" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530816" comment="python-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530817" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530818" comment="python-demo-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530821" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530822" comment="python-idle-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81021" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).
- CVE-2018-7858: Fixed a denial of service which could occur while updating the VGA display, after guest has adjusted the display dimensions (bsc#1084604).
- CVE-2017-13673: Fixed a denial of service in the cpu_physical_memory_snapshot_get_dirty function.
- CVE-2017-13672: Fixed a denial of service via vectors involving display update.

Non-security issues fixed:

- Fixed bad guest time after migration (bsc#1113231).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81022" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81023" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81024" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1104662" ref_url="https://bugzilla.suse.com/1104662" source="BUGZILLA"/>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005299.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could
  have resulted in a remote denial of service via the guest agent (bsc#1127458).

Other issues fixed:   

- libxl: save current memory value after successful balloon (bsc#1120813).
- spec: Don't restart libvirt-guests when updating libvirt-client (bsc#1104662).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104662">SUSE bug 1104662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530840" comment="libvirt-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530841" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530842" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530843" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530844" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530845" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530847" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530848" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530849" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530850" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530851" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530852" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530853" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530854" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530855" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530856" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530858" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530859" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530860" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81025" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81026" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81027" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120119" ref_url="https://bugzilla.suse.com/1120119" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81028" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	  

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530865" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81029" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128158" ref_url="https://bugzilla.suse.com/1128158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:

Security issues fixed:

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). 

More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530870" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530872" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81030" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81031" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81032" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2019:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005232.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81033" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81034" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521711" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521712" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521713" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530874" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530875" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521714" comment="openssl-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81035" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1105402" ref_url="https://bugzilla.suse.com/1105402" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1121698" ref_url="https://bugzilla.suse.com/1121698" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1122821" ref_url="https://bugzilla.suse.com/1122821" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127758" ref_url="https://bugzilla.suse.com/1127758" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).
- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).

The following non-security bugs were fixed:

- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).
- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105402">SUSE bug 1105402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121698">SUSE bug 1121698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122821">SUSE bug 1122821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127758">SUSE bug 1127758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81036" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0838-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005665.html" source="SUSE-SU"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-05"/>
	<updated date="2019-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81037" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81038" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1131233" ref_url="https://bugzilla.suse.com/1131233" source="BUGZILLA"/>
		<reference ref_id="1131237" ref_url="https://bugzilla.suse.com/1131237" source="BUGZILLA"/>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="1131245" ref_url="https://bugzilla.suse.com/1131245" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81039" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81040" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111789" ref_url="https://bugzilla.suse.com/1111789" source="BUGZILLA"/>
		<reference ref_id="1123022" ref_url="https://bugzilla.suse.com/1123022" source="BUGZILLA"/>
		<reference ref_id="1130116" ref_url="https://bugzilla.suse.com/1130116" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issues fixed: 

- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing 
  local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).

Other issue fixed: 
- Fixed handling of command continuation(bsc#1111789)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111789">SUSE bug 1111789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530892" comment="dovecot22-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530893" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530894" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530895" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81041" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81042" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)

Other issue addressed: 

- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-10"/>
	<updated date="2019-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81043" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81044" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81045" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521781" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521782" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521783" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81046" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81047" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81048" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81049" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81050" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81051" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81052" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81053" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530937" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530939" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81054" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81055" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81056" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81057" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1037216" ref_url="https://bugzilla.suse.com/1037216" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1099279" ref_url="https://bugzilla.suse.com/1099279" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155311" ref_url="https://bugzilla.suse.com/1155311" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1156060" ref_url="https://bugzilla.suse.com/1156060" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158381" ref_url="https://bugzilla.suse.com/1158381" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158427" ref_url="https://bugzilla.suse.com/1158427" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162298" ref_url="https://bugzilla.suse.com/1162298" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).
- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).
- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).
- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).
- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).
- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).
- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).
- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).
- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).
- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1155311).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).
- cgroup: avoid copying strings longer than the buffers (bsc#1146544).
- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037216">SUSE bug 1037216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099279">SUSE bug 1099279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155311">SUSE bug 1155311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156060">SUSE bug 1156060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162298">SUSE bug 1162298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81058" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81059" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81060" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81061" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81062" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81063" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81064" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81065" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81066" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81067" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531011" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81068" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81069" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81070" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81071" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81072" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- KEYS: allow reaching the keys quotas exactly (bsc#1171689).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81073" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81074" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81075" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81076" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81077" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81078" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81079" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81080" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81081" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81082" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81083" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81084" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81085" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81086" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81087" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81088" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81089" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1138954" ref_url="https://bugzilla.suse.com/1138954" source="BUGZILLA"/>
		<reference ref_id="1144327" ref_url="https://bugzilla.suse.com/1144327" source="BUGZILLA"/>
		<reference ref_id="1144379" ref_url="https://bugzilla.suse.com/1144379" source="BUGZILLA"/>
		<reference ref_id="1150584" ref_url="https://bugzilla.suse.com/1150584" source="BUGZILLA"/>
		<reference ref_id="1152711" ref_url="https://bugzilla.suse.com/1152711" source="BUGZILLA"/>
		<reference ref_id="1153471" ref_url="https://bugzilla.suse.com/1153471" source="BUGZILLA"/>
		<reference ref_id="1155789" ref_url="https://bugzilla.suse.com/1155789" source="BUGZILLA"/>
		<reference ref_id="1155952" ref_url="https://bugzilla.suse.com/1155952" source="BUGZILLA"/>
		<reference ref_id="1157860" ref_url="https://bugzilla.suse.com/1157860" source="BUGZILLA"/>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
		<description>
This update for xrdp provides the following fix:

- CVE-2020-4044: xrdp-sesman can be crashed remotely over port 3350 (bsc#1173580).
- Fixed an issue where xrdp-sesman could not restart (bsc#1155952).	  
- Fixed an issue where xrdp could not start due to an error in the service file use absolute path in ExecStart (bsc#1155789).
- Fixed a PAM error after 2nd xrdp session after logout (bsc#1153471).
- Fixed a crash in xrdp-sesman, caused by terminating and reconnecting an xrdp session (bsc#1152711).
- Fixed a failure in RDP session recovery (bsc#1150584).
- Fixed a process leak (bsc#1144379).  
- Let systemd handle the daemons, fixing daemon start failures. (bsc#1138954, bsc#1144327)
- Don't try to create .vnc directory if it already exists. (bsc#1157860)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138954">SUSE bug 1138954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144327">SUSE bug 1144327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144379">SUSE bug 1144379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150584">SUSE bug 1150584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152711">SUSE bug 1152711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153471">SUSE bug 1153471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155789">SUSE bug 1155789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155952">SUSE bug 1155952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157860">SUSE bug 1157860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531102" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81090" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81091" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81092" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81093" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
- Backport gcc-7 build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81094" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81095" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81096" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531124" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531127" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81097" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81098" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81099" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81100" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81101" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531170" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531171" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81102" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81103" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: Multiple xenoprof issues
- bsc#1168142 - CVE-2020-11739: Missing memory barriers in read-write unlock paths
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81104" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81105" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531190" comment="grub2-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81106" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007296.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531196" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531197" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531198" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531199" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531200" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531201" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531202" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531203" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531204" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531205" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531206" comment="libndr0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531207" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531208" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531209" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531210" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531211" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531212" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531213" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531214" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531215" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531216" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531217" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531218" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531219" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531220" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531221" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531222" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531223" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531224" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531225" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531226" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531227" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531228" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531229" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531230" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531231" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531232" comment="samba-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531233" comment="samba-client-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531234" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531236" comment="samba-libs-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531237" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531238" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531239" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81107" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81108" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-31"/>
	<updated date="2020-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531242" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531243" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531244" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531245" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531246" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531247" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531248" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531249" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531250" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531251" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531252" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81109" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81110" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81111" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81112" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81113" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81114" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81115" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81116" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81117" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.

The following security bugs were fixed:


- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bug was fixed:

- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81118" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81119" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81120" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary from SUSE Linux Enterprise 15-SP1 (bsc#1168994)

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.

Additional fixes:

+ shim-install: install MokManager to \EFI\boot to process the pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537694" comment="shim-15+git47-22.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81121" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81122" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81123" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531308" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531309" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531310" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531311" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531312" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531313" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531314" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531315" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531316" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531317" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531318" comment="libndr0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531319" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531320" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531321" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531322" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531323" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531324" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531325" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531326" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531327" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531328" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531329" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531330" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531331" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531332" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531333" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531334" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531335" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531336" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531337" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531338" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531339" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531340" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531341" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531342" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531343" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531344" comment="samba-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531345" comment="samba-client-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531346" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531348" comment="samba-libs-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531349" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531350" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531351" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81124" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81125" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531355" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531356" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531357" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531358" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531359" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531360" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531361" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531362" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531363" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531364" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531365" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531366" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531367" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531368" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531369" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81126" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic  modification of live EPT PTE (bsc#1173380,XSA-328)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-01"/>
	<updated date="2020-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81127" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81128" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81129" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81130" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81131" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81132" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81133" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81134" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531408" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531409" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531410" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531411" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531412" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531413" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531414" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531415" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531416" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531417" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531418" comment="libndr0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531419" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531420" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531421" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531422" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531423" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531424" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531425" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531426" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531427" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531428" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531429" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531430" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531431" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531432" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531433" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531434" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531435" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531436" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531437" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531438" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531439" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531440" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531441" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531442" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531443" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531444" comment="samba-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531445" comment="samba-client-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531446" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531448" comment="samba-libs-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531449" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531450" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531451" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81135" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81136" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1175476" ref_url="https://bugzilla.suse.com/1175476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14562: Fixed an overflow in DxeImageVerificationHandler (bsc#1175476).  
- CVE-2019-14559: Fixed a memory leak in ArpOnFrameRcvdDpc() (bsc#1163927).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531453" comment="ovmf-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531454" comment="ovmf-tools-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531455" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81137" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-15708: Added a  note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531456" comment="libvirt-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531457" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531458" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531459" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531460" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531461" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531463" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531464" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531465" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531466" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531467" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531468" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531469" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531470" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531471" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531472" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531474" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531475" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531476" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81138" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81139" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issue:
	  
Security issue fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).

Other issue addressed: 

- Fixed an issue with rendering animated gifs (QTBUG-55141).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531478" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531479" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531480" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531481" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531482" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531483" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531484" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531485" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531486" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531487" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531488" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531489" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531490" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531491" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531492" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81140" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81141" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531512" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81142" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81143" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81144" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81145" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81146" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81147" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host (bsc#1161181).
- CVE-2019-19579: Device quarantine for alternate pci assignment methods (bsc#1157888).
- CVE-2019-19581: find_next_bit() issues (bsc#1158003).
- CVE-2019-19583: VMentry failure with debug exceptions and blocked states (bsc#1158004).
- CVE-2019-19578: Linear pagetable use / entry miscounts (bsc#1158005).
- CVE-2019-19580: Further issues with restartable PV type change operations (bsc#1158006).
- CVE-2019-19577: dynamic height for the IOMMU pagetables (bsc#1158007).
- CVE-2019-18420: VCPUOP_initialise DoS (bsc#1154448).
- CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation (bsc#1154456).
- CVE-2019-18421: Issues with restartable PV type change operations (bsc#1154458).
- CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment (bsc#1154461).
- CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue) (bsc#1155945).
- CVE-2019-11135: TSX Asynchronous Abort (TAA) issue (bsc#1152497).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-06"/>
	<updated date="2020-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81148" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007780.html" source="SUSE-SU"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531546" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531547" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531556" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531557" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531559" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531560" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531561" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531562" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531563" comment="postgresql94-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531564" comment="postgresql94-contrib-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531565" comment="postgresql94-docs-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531566" comment="postgresql94-plperl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531567" comment="postgresql94-plpython-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531568" comment="postgresql94-pltcl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531569" comment="postgresql94-server-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531570" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531571" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531573" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531574" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531575" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531576" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81149" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81150" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81151" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="1169947" ref_url="https://bugzilla.suse.com/1169947" source="BUGZILLA"/>
		<reference ref_id="1178038" ref_url="https://bugzilla.suse.com/1178038" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper fixes the following issues:

libzypp fixes the following security issue:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).

zypper was updated to fix the following issues:

- Fixed an issue, where zypper crashed when the system language is set to Spanish and the user
  tried to patch their system with 'zypper patch --category security' (bsc#1178038)
- Fixed a typo in man page (bsc#1169947)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-18"/>
	<updated date="2020-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169947">SUSE bug 1169947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178038">SUSE bug 1178038</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531580" comment="libzypp-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531581" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531582" comment="zypper-1.13.57-18.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81152" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81153" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81154" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81155" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1131277" ref_url="https://bugzilla.suse.com/1131277" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176922" ref_url="https://bugzilla.suse.com/1176922" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).

The following non-security bugs were fixed:

- btrfs: fix race with relocation recovery and fs_root setup (bsc#1131277).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277).
- btrfs: btrfs_init_new_device should use fs_info-&gt;dev_root (bsc#1131277, bsc#1176922).
- btrfs: btrfs_test_opt and friends should take a btrfs_fs_info (bsc#1131277, bsc#1176922).
- btrfs: call functions that always use the same root with fs_info instead (bsc#1131277, bsc#1176922).
- btrfs: call functions that overwrite their root parameter with fs_info (bsc#1131277, bsc#1176922).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277, bsc#1176922).
- btrfs: pull node/sector/stripe sizes out of root and into fs_info (bsc#1131277, bsc#1176922).
- btrfs: Remove fs_info argument of btrfs_write_and_wait_transaction (bsc#1131277, bsc#1176922).
- btrfs: remove root parameter from transaction commit/end routines (bsc#1131277, bsc#1176922).
- btrfs: remove root usage from can_overcommit (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, access fs_info-&gt;delayed_root directly (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, add fs_info convenience variables (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, btrfs_calc_{trans,trunc}_metadata_size (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, update_block_group{,flags} (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, use fs_info-&gt;dev_root everywhere (bsc#1131277, bsc#1176922).
- btrfs: split btrfs_wait_marked_extents into normal and tree log functions (bsc#1131277, bsc#1176922).
- btrfs: struct btrfsic_state-&gt;root should be an fs_info (bsc#1131277, bsc#1176922).
- btrfs: take an fs_info directly when the root is not used otherwise (bsc#1131277, bsc#1176922).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131277">SUSE bug 1131277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176922">SUSE bug 1176922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81156" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81157" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81158" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81159" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81160" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81161" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81162" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531624" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531625" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531626" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531627" comment="python3-curses-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81163" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81164" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81165" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81166" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81167" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81168" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81169" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531653" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531655" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531657" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531659" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531660" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531664" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531665" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531666" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531667" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81170" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81171" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531669" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531670" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531671" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531672" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531673" comment="libspice-controller0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531674" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531675" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81172" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81173" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81174" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81175" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81176" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81177" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81178" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issue:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531723" comment="sudo-1.8.10p3-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81179" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81180" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81181" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81182" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81183" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1077330" ref_url="https://bugzilla.suse.com/1077330" source="BUGZILLA"/>
		<reference ref_id="1094291" ref_url="https://bugzilla.suse.com/1094291" source="BUGZILLA"/>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1163959" ref_url="https://bugzilla.suse.com/1163959" source="BUGZILLA"/>
		<reference ref_id="1163969" ref_url="https://bugzilla.suse.com/1163969" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

Security issues fixed:

- CVE-2018-0739: Update openssl to 1.0.2o to limit ASN.1 constructed types recursive definition depth (bsc#1094291).
- CVE-2019-14563: Fixed a memory corruption caused by insufficient numeric truncation (bsc#1163959).
- CVE-2019-14559: Fixed a remotely exploitable memory leak in the ARP handling code (bsc#1163927).
- CVE-2019-14575: Fixed an insufficient signature check in the DxeImageVerificationHandler (bsc#1163969).

Bug fixes:

- Only use SLES-UEFI-CA-Certificate-2048.crt for the SUSE flavor to provide the better compatibility. (bsc#1077330)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077330">SUSE bug 1077330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163959">SUSE bug 1163959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163969">SUSE bug 1163969</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538002" comment="ovmf-2015+git1462940744.321151f-19.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538003" comment="ovmf-tools-2015+git1462940744.321151f-19.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538004" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81184" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81185" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81186" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81187" version="1" class="patch">
	<metadata>
		<title>Security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1015203" ref_url="https://bugzilla.suse.com/1015203" source="BUGZILLA"/>
		<reference ref_id="1022804" ref_url="https://bugzilla.suse.com/1022804" source="BUGZILLA"/>
		<reference ref_id="1084682" ref_url="https://bugzilla.suse.com/1084682" source="BUGZILLA"/>
		<reference ref_id="1087920" ref_url="https://bugzilla.suse.com/1087920" source="BUGZILLA"/>
		<reference ref_id="1153451" ref_url="https://bugzilla.suse.com/1153451" source="BUGZILLA"/>
		<reference ref_id="1153459" ref_url="https://bugzilla.suse.com/1153459" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<description>
This update for rsyslog fixes the following issues:

Security issues fixed:

- CVE-2019-17041: Fixed a heap overflow in the parser for AIX log messages (bsc#1153451).
- CVE-2019-17042: Fixed a heap overflow in the parser for Cisco log messages (bsc#1153459).

Non-security issues fixed:

- Handle multiline messages correctly when using the imfile module. (bsc#1015203)
- Fix a race condition in the shutdown sequence in wtp that was causing rsyslog not to
  shutdown properly. (bsc#1022804)
- Fixed a rsyslogd SIGABORT crash if a path does not exists (bsc#1087920).
- Fixed an issue where configuration templates where not consistently flushed (bsc#1084682).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-27"/>
	<updated date="2020-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015203">SUSE bug 1015203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022804">SUSE bug 1022804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084682">SUSE bug 1084682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087920">SUSE bug 1087920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552196" comment="rsyslog-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552197" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552198" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552199" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552200" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552201" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552202" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552203" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552204" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552205" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81188" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81189" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81190" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81191" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522746" comment="python-pyparsing-2.2.0-7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522749" comment="python3-pyparsing-2.2.0-7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81192" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81193" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81194" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81195" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81196" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81197" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531767" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531768" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531769" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81198" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81199" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81200" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81201" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81202" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81203" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81204" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81205" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531803" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81206" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81207" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531808" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531809" comment="git-doc-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81208" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008609.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-09"/>
	<updated date="2021-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531815" comment="fwupdate-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531816" comment="fwupdate-efi-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531817" comment="libfwup0-0.5-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81209" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- spamassassin was updated to version 3.4.5
- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-12"/>
	<updated date="2021-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81210" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552208" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552209" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81211" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81212" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008659.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552211" comment="sudo-1.8.10p3-10.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81213" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008658.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431)	  
- Fixed  an issue where xenstored was crashing with segfault (bsc#1182155).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531818" comment="xen-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531819" comment="xen-doc-html-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531820" comment="xen-libs-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531821" comment="xen-libs-32bit-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531822" comment="xen-tools-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531823" comment="xen-tools-domU-4.7.6_14-43.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81214" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172478" ref_url="https://bugzilla.suse.com/1172478" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access in sm501 device emulation (CVE-2020-12829, bsc#1172385)
- Fix OOB access possibility in MegaRAID SAS 8708EM2 emulation (CVE-2020-13362 bsc#1172383)
- Fix use-after-free in usb xhci packet handling (CVE-2020-25723, bsc#1178934)
- Fix use-after-free in usb ehci packet handling (CVE-2020-25084, bsc#1176673)
- Fix OOB access in usb hcd-ohci emulation (CVE-2020-25624, bsc#1176682)
- Fix infinite loop (DoS) in usb hcd-ohci emulation (CVE-2020-25625, bsc#1176684)
- Fix guest triggerable assert in shared network handling code (CVE-2020-27617, bsc#1178174)
- Fix OOB access in atapi emulation (CVE-2020-29443, bsc#1181108)
- Fix null pointer deref. (DoS) in mmio ops (CVE-2020-15469, bsc#1173612)
- Fix infinite loop (DoS) in e1000 device emulation (CVE-2021-20257, bsc#1182577)
- Fix OOB access (stack overflow) in rtl8139 NIC emulation (CVE-2021-3416, bsc#1182968)
- Fix OOB access (stack overflow) in other NIC emulations (CVE-2021-3416)
- Fix OOB access in SLIRP ARP packet processing (CVE-2020-29130, bsc#1179467)
- Fix null pointer dereference possibility (DoS) in MegaRAID SAS 8708EM2 emulation (CVE-2020-13659 bsc#1172386
- Fix OOB access in iscsi (CVE-2020-11947 bsc#1180523)
- Fix OOB access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fix buffer overflow in the XGMAC device (CVE-2020-15863 bsc#1174386)
- Fix DoS in packet processing of various emulated NICs (CVE-2020-16092 bsc#1174641)
- Fix OOB access while processing USB packets (CVE-2020-14364 bsc#1175441)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Fix potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fix OOB access possibility in ES1370 audio device emulation (CVE-2020-13361 bsc#1172384)
- Fix OOB access in ROM loading (CVE-2020-13765 bsc#1172478)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-22"/>
	<updated date="2021-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81215" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-27"/>
	<updated date="2021-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81216" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183835" ref_url="https://bugzilla.suse.com/1183835" source="BUGZILLA"/>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401, bsc#1183835).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552228" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552229" comment="libnettle4-2.7.1-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81217" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184456" ref_url="https://bugzilla.suse.com/1184456" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008681.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

-  Avoid the signal SIGTRAP when gdm exits (bsc#1184456).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184456">SUSE bug 1184456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552230" comment="gdm-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538880" comment="gdm-lang-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538881" comment="gdmflexiserver-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552231" comment="libgdm1-3.10.0.1-54.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552232" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81218" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81219" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008701.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.25 - OpenJDK 7u291 (January 2021 CPU, bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters
  * Import of OpenJDK 7 u291 build 1
    + JDK-8254177: (tz) Upgrade time-zone data to tzdata2020b
    + JDK-8254982: (tz) Upgrade time-zone data to tzdata2020c
    + JDK-8255226: (tz) Upgrade time-zone data to tzdata2020d
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552233" comment="java-1_7_0-openjdk-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552234" comment="java-1_7_0-openjdk-demo-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552235" comment="java-1_7_0-openjdk-devel-1.7.0.291-43.47.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552236" comment="java-1_7_0-openjdk-headless-1.7.0.291-43.47.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81220" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008706.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552237" comment="libdcerpc-binding0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552238" comment="libdcerpc-binding0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552239" comment="libdcerpc0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552240" comment="libdcerpc0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552241" comment="libndr-krb5pac0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552242" comment="libndr-krb5pac0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552243" comment="libndr-nbt0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552244" comment="libndr-nbt0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552245" comment="libndr-standard0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552246" comment="libndr-standard0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552247" comment="libndr0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552248" comment="libndr0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552249" comment="libnetapi0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552250" comment="libnetapi0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552251" comment="libsamba-credentials0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552252" comment="libsamba-credentials0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552253" comment="libsamba-errors0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552254" comment="libsamba-errors0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552255" comment="libsamba-hostconfig0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552256" comment="libsamba-hostconfig0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552257" comment="libsamba-passdb0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552258" comment="libsamba-passdb0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552259" comment="libsamba-util0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552260" comment="libsamba-util0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552261" comment="libsamdb0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552262" comment="libsamdb0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552263" comment="libsmbclient0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552264" comment="libsmbclient0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552265" comment="libsmbconf0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552266" comment="libsmbconf0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552267" comment="libsmbldap0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552268" comment="libsmbldap0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552269" comment="libtevent-util0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552270" comment="libtevent-util0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552271" comment="libwbclient0-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552272" comment="libwbclient0-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552273" comment="samba-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552274" comment="samba-client-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552275" comment="samba-client-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552276" comment="samba-doc-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552277" comment="samba-libs-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552278" comment="samba-libs-32bit-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552279" comment="samba-winbind-4.4.2-38.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552280" comment="samba-winbind-32bit-4.4.2-38.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81221" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008708.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552281" comment="libdcerpc-atsvc0-4.2.4-28.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81222" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552282" comment="cups-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552283" comment="cups-client-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552284" comment="cups-libs-1.7.5-20.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81223" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181495" ref_url="https://bugzilla.suse.com/1181495" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).
- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181495">SUSE bug 1181495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81224" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552289" comment="avahi-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552290" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552291" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552292" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552293" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552294" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552295" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81225" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1165629" ref_url="https://bugzilla.suse.com/1165629" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1176720" ref_url="https://bugzilla.suse.com/1176720" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183069" ref_url="https://bugzilla.suse.com/1183069" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184397" ref_url="https://bugzilla.suse.com/1184397" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1185555" ref_url="https://bugzilla.suse.com/1185555" source="BUGZILLA"/>
		<reference ref_id="1185556" ref_url="https://bugzilla.suse.com/1185556" source="BUGZILLA"/>
		<reference ref_id="1185557" ref_url="https://bugzilla.suse.com/1185557" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211 bnc#1184952).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022 bnc#1183069 ).
- CVE-2020-1749: Fixed a flaw with some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).

The following non-security bugs were fixed:

- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185555">SUSE bug 1185555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185556">SUSE bug 1185556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185557">SUSE bug 1185557</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81226" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008779.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security issues fixed:

- CVE-2020-27619: where Lib/test/multibytecodec_support calls eval() on content retrieved via HTTP. (bsc#1178009)

Other fixes:

- Make sure to close the 'import_failed.map' file after the exception
  has been raised in order to avoid ResourceWarnings when the
  failing import is part of a try...except block
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552303" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552304" comment="python3-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552305" comment="python3-base-3.4.10-25.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552306" comment="python3-curses-3.4.10-25.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81227" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

Security issues fixed:

- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81228" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552308" comment="graphviz-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552309" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552310" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552311" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81229" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

Security issues fixed:

CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81230" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81231" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81232" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81233" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552315" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81234" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552316" comment="dhcp-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552317" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552318" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552319" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81235" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1031692" ref_url="https://bugzilla.suse.com/1031692" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1126455" ref_url="https://bugzilla.suse.com/1126455" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1172382" ref_url="https://bugzilla.suse.com/1172382" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fix OOB access during mmio operations (CVE-2020-13754, bsc#1172382)
- Fix sPAPR emulator leaks the host hardware identity (CVE-2019-8934, bsc#1126455)
- Fix out-of-bounds read information disclosure in icmp6_send_echoreply (CVE-2020-10756, bsc#1172380)
- Fix out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221, bsc#1181933)
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25723, bsc#1178935,
  CVE-2020-29130, bsc#1179477, CVE-2021-20257, bsc#1182846,
  CVE-2021-3419, bsc#1182975, bsc#1031692, bsc#1094725)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1031692">SUSE bug 1031692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81236" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81237" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552335" comment="libpolkit0-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552336" comment="polkit-0.113-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552337" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81238" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008941.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552338" comment="libgstegl-1_0-0-1.2.4-3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81239" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2021-3185: Fixed buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking (bsc#1181255).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552339" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552340" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552341" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552342" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552343" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552344" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552345" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552346" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552347" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552348" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552349" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81240" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81241" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552353" comment="libX11-6-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552354" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81242" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81243" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC decoding code (bsc#1177158)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552355" comment="libspice-server1-0.12.7-10.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81244" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1905-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019242.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC decoding code (bsc#1177158)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552356" comment="libspice-client-glib-2_0-8-0.31-9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552357" comment="libspice-client-glib-helper-0.31-9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552358" comment="libspice-client-gtk-2_0-4-0.31-9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552359" comment="libspice-client-gtk-3_0-4-0.31-9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552360" comment="libspice-controller0-0.31-9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552361" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552362" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81245" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)

  See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

  See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81246" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552363" comment="caribou-common-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552364" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552365" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81247" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-15"/>
	<updated date="2021-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552366" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552367" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552368" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552369" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81248" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81249" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.1:
  + Improve handling of Media Capture devices.
  + Improve WebAudio playback.
  + Improve video orientation handling.
  + Improve seeking support for MSE playback.
  + Improve flush support in EME decryptors.
  + Fix HTTP status codes for requests done through a custom URI handler.
  + Fix the Bubblewrap sandbox in certain 32-bit systems.
  + Fix inconsistencies between the WebKitWebView.is-muted property
    state and values returned by
    webkit_web_view_is_playing_audio().
  + Fix the build with ENABLE_VIDEO=OFF.
  + Fix wrong timestamps for long-lived cookies.
  + Fix UI process crash when failing to load favicons.
  + Fix several crashes and rendering issues.
- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,
    CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, 
    CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81250" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81251" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552382" comment="xterm-308-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81252" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177789" ref_url="https://bugzilla.suse.com/1177789" source="BUGZILLA"/>
		<reference ref_id="1183578" ref_url="https://bugzilla.suse.com/1183578" source="BUGZILLA"/>
		<reference ref_id="1183579" ref_url="https://bugzilla.suse.com/1183579" source="BUGZILLA"/>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible buffer overflow in IScsiDxe (bsc#1186151)
- CVE-2021-28211: ovmf: edk2: possible heap corruption with LzmaUefiDecompressGetInfo (bsc#1183578)
- CVE-2021-28210: ovmf: unlimited FV recursion, round 2 (bsc#1183579)
- CVE-2019-14584: ovmf,shim: NULL pointer dereference in AuthenticodeVerify() (bsc#1177789)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183578">SUSE bug 1183578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183579">SUSE bug 1183579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552383" comment="ovmf-2015+git1462940744.321151f-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552384" comment="ovmf-tools-2015+git1462940744.321151f-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552385" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81253" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552386" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552387" comment="libnettle4-2.7.1-13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81254" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1161510" ref_url="https://bugzilla.suse.com/1161510" source="BUGZILLA"/>
		<reference ref_id="1186229" ref_url="https://bugzilla.suse.com/1186229" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009080.html" source="SUSE-SU"/>
		<description>
This update for libsolv fixes the following issues:

Security issues fixed:

- CVE-2019-20387: Fixed heap-buffer-overflow in repodata_schema2id (bsc#1161510)
- CVE-2021-3200: testcase_read: error out if repos are added or the system is changed too late (bsc#1186229)

Other issues fixed:

- backport support for blacklisted packages to support ptf packages and retracted patches
- fix ruleinfo of complex dependencies returning the wrong origin
- fix SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- fix add_complex_recommends() selecting conflicted packages in rare cases
- fix potential segfault in resolve_jobrules
- fix solv_zchunk decoding error if large chunks are used
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552388" comment="libsolv-devel-0.6.37-2.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552389" comment="libsolv-tools-0.6.37-2.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552390" comment="libzypp-16.21.4-27.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552391" comment="libzypp-devel-16.21.4-27.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552392" comment="perl-solv-0.6.37-2.27.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552393" comment="python-solv-0.6.37-2.27.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81255" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552394" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552395" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81256" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3479 [bsc#1184354]: Out-of-memory caused by allocation of a very large buffer
- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81257" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81258" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615943" comment="arpwatch-2.1a15-159.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81259" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81260" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-27"/>
	<updated date="2021-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531855" comment="sudo-1.8.10p3-10.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81261" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81262" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187934" ref_url="https://bugzilla.suse.com/1187934" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)
- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)
- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)
- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)
- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)
- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)
- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)
- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)
- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)
- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)

The following non-security bugs were fixed:

- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187934">SUSE bug 1187934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81263" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81264" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178561" ref_url="https://bugzilla.suse.com/1178561" source="BUGZILLA"/>
		<reference ref_id="1184761" ref_url="https://bugzilla.suse.com/1184761" source="BUGZILLA"/>
		<reference ref_id="1184967" ref_url="https://bugzilla.suse.com/1184967" source="BUGZILLA"/>
		<reference ref_id="1185046" ref_url="https://bugzilla.suse.com/1185046" source="BUGZILLA"/>
		<reference ref_id="1185331" ref_url="https://bugzilla.suse.com/1185331" source="BUGZILLA"/>
		<reference ref_id="1185807" ref_url="https://bugzilla.suse.com/1185807" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2021-33910: Fixed a denial of service (stack exhaustion) in systemd (PID 1) (bsc#1188063)

Other fixes:

- mount-util: shorten the loop a bit (#7545)
- mount-util: do not use the official MAX_HANDLE_SZ (#7523)
- mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
- mount-util: fix bad indenting
- mount-util: EOVERFLOW might have other causes than buffer size issues
- mount-util: fix error propagation in fd_fdinfo_mnt_id()
- mount-util: drop exponential buffer growing in name_to_handle_at_loop()
- udev: port udev_has_devtmpfs() to use path_get_mnt_id()
- mount-util: add new path_get_mnt_id() call that queries the mnt ID of a path
- mount-util: add name_to_handle_at_loop() wrapper around name_to_handle_at()
- mount-util: accept that name_to_handle_at() might fail with EPERM (#5499)
- basic: fallback to the fstat if we don't have access to the /proc/self/fdinfo
- sysusers: use the usual comment style
- test/TEST-21-SYSUSERS: add tests for new functionality
- sysusers: allow admin/runtime overrides to command-line config
- basic/strv: add function to insert items at position
- sysusers: allow the shell to be specified
- sysusers: move various user credential validity checks to src/basic/
- man: reformat table in sysusers.d(5)
- sysusers: take configuration as positional arguments
- sysusers: emit a bit more info at debug level when locking fails
- sysusers: allow force reusing existing user/group IDs (#8037)
- sysusers: ensure GID in uid:gid syntax exists
- sysusers: make ADD_GROUP always create a group
- test: add TEST-21-SYSUSERS test
- sysuser: use OrderedHashmap
- sysusers: allow uid:gid in sysusers.conf files
- sysusers: fix memleak (#4430)
- These commits implement the option '--replace' for systemd-sysusers
  so %sysusers_create_package can be introduced in SLE and packages
  can rely on this rpm macro without wondering whether the macro is
  available on the different target the package is submitted to.
- Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
- systemctl: add --value option
- execute: make sure to call into PAM after initializing resource limits (bsc#1184967)
- rlimit-util: introduce setrlimit_closest_all()
- system-conf: drop reference to ShutdownWatchdogUsec=
- core: rename ShutdownWatchdogSec to RebootWatchdogSec (bsc#1185331)
- Return -EAGAIN instead of -EALREADY from unit_reload (bsc#1185046)
- rules: don't ignore Xen virtual interfaces anymore (bsc#1178561)
- write_net_rules: set execute bits (bsc#1178561)
- udev: rework network device renaming
- Revert 'Revert 'udev: network device renaming - immediately give up if the target name isn't available''
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178561">SUSE bug 1178561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184761">SUSE bug 1184761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184967">SUSE bug 1184967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185046">SUSE bug 1185046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185331">SUSE bug 1185331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185807">SUSE bug 1185807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625777" comment="libsystemd0-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625778" comment="libudev1-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625779" comment="systemd-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625780" comment="systemd-devel-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625781" comment="systemd-sysvinit-228-150.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625782" comment="udev-228-150.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81265" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3595: Fixed an invalid pointer initialization may lead to information disclosure (tftp). (bsc#1187366)
- CVE-2021-3592: Fixed an invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3594: Fixed an invalid pointer initialization may lead to information disclosure (udp). (bsc#1187367)
- CVE-2021-3593: Fixed an invalid pointer initialization may lead to information disclosure (udp6). (bsc#1187365)
- CVE-2021-3611: Fixed a segmentation fault due to stack overflow. (bsc#1187529)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625003" comment="qemu-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625004" comment="qemu-block-curl-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625005" comment="qemu-block-rbd-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625006" comment="qemu-block-ssh-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625007" comment="qemu-guest-agent-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625008" comment="qemu-ipxe-1.0.0-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625009" comment="qemu-kvm-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625010" comment="qemu-lang-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625011" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625012" comment="qemu-sgabios-8-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625013" comment="qemu-tools-2.6.2-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625014" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625015" comment="qemu-x86-2.6.2-41.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81266" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626114" comment="linuxptp-1.4-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81267" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.3:

- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81268" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81269" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627946" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81270" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

  It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-14"/>
	<updated date="2021-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630615" comment="cpio-2.11-36.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630610" comment="cpio-lang-2.11-36.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81271" version="1" class="patch">
	<metadata>
		<title>Security update for libcares2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<description>
This update for libcares2 fixes the following issues:

- CVE-2021-3672: Fixed input validation on hostnames (bsc#1188881).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630393" comment="libcares2-1.9.1-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81272" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630616" comment="MozillaFirefox-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630617" comment="MozillaFirefox-devel-78.13.0-112.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630618" comment="MozillaFirefox-translations-common-78.13.0-112.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81273" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1033081" ref_url="https://bugzilla.suse.com/1033081" source="BUGZILLA"/>
		<reference ref_id="1182807" ref_url="https://bugzilla.suse.com/1182807" source="BUGZILLA"/>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009308.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: DoS or information disclosure in some configurations (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 [bsc#1188034]
- Set the hostname for SNI when using TLS [bsc#1182807]
- Allow --syslog option in daemon mode. (bsc#1033081)
- Set the hostname for SNI when using TLS. (bsc#1182807)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1033081">SUSE bug 1033081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182807">SUSE bug 1182807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630872" comment="fetchmail-6.3.26-13.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630873" comment="fetchmailconf-6.3.26-13.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81274" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81275" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189465" ref_url="https://bugzilla.suse.com/1189465" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- A patch previously applied to remedy CVE-2021-38185 introduced a regression
  that had the potential to cause a segmentation fault in cpio. [bsc#1189465]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189465">SUSE bug 1189465</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631542" comment="cpio-2.11-36.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81276" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631696" comment="libopenssl-devel-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631697" comment="libopenssl1_0_0-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631678" comment="libopenssl1_0_0-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631698" comment="libopenssl1_0_0-hmac-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631680" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631699" comment="openssl-1.0.2j-60.69.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631682" comment="openssl-doc-1.0.2j-60.69.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81277" version="1" class="patch">
	<metadata>
		<title>Security update for unrar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1046882" ref_url="https://bugzilla.suse.com/1046882" source="BUGZILLA"/>
		<reference ref_id="1054038" ref_url="https://bugzilla.suse.com/1054038" source="BUGZILLA"/>
		<reference ref_id="1187974" ref_url="https://bugzilla.suse.com/1187974" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938/" source="CVE"/>
		<reference ref_id="CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940/" source="CVE"/>
		<reference ref_id="CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941/" source="CVE"/>
		<reference ref_id="CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942/" source="CVE"/>
		<reference ref_id="CVE-2017-20006" ref_url="https://www.suse.com/security/cve/CVE-2017-20006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
		<description>
This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

- CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
  protection mechanism via vectors involving a symlink to the . directory, a
  symlink to the .. directory, and a regular file (bsc#1054038).
- CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call
  within the Archive::ReadHeader15 function (bsc#1054038).
- CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
  function (bsc#1054038).
- CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
  (bsc#1054038).
- CVE-2017-20006: Fixed heap-based buffer overflow in Unpack:CopyString (bsc#1187974).

These non-security issues were fixed:

- Added extraction support for .LZ archives created by Lzip compressor
- Enable unpacking of files in ZIP archives compressed with XZ algorithm and
  encrypted with AES
- Added support for PAX extended headers inside of TAR archive
- If RAR recovery volumes (.rev files) are present in the same folder as usual
  RAR volumes, archive test command verifies .rev contents after completing
  testing .rar files
- By default unrar skips symbolic links with absolute paths in link target when
  extracting unless -ola command line switch is specified
- Added support for AES-NI CPU instructions
- Support for a new RAR 5.0 archiving format
- Wildcard exclusion mask for folders
- Prevent conditional jumps depending on uninitialised values (bsc#1046882)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1046882">SUSE bug 1046882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187974">SUSE bug 1187974</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-20006/">CVE-2017-20006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81278" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627800" comment="aspell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627801" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627802" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81279" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1188888" ref_url="https://bugzilla.suse.com/1188888" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627796" comment="bind-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627797" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627798" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627799" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81280" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81281" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628213" comment="libesmtp-1.0.6-17.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81282" version="1" class="patch">
	<metadata>
		<title>Security update for file (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1154661" ref_url="https://bugzilla.suse.com/1154661" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<description>
This update for file fixes the following issues:

- CVE-2019-18218: Fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628151" comment="file-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628152" comment="file-magic-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628153" comment="libmagic1-5.22-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81283" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008269.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.5.11 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
- datapath: Clear the L4 portion of the key for 'later' fragments
- datapath: Properly set L4 keys on 'later' IP fragments
- ofproto-dpif: Fix using uninitialised memory in user_action_cookie.
- stream-ssl: Fix crash on NULL private key and valid certificate.
- datapath: fix flow actions reallocation
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-03"/>
	<updated date="2021-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531859" comment="openvswitch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531862" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81284" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1156015" ref_url="https://bugzilla.suse.com/1156015" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009451.html" source="SUSE-SU"/>
		<description>
This update for Mesa fixes the following issues:

Security issue fixed:

- CVE-2019-5068: Fixed exploitable shared memory permissions vulnerability (bsc#1156015).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632681" comment="Mesa-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632682" comment="Mesa-32bit-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632683" comment="Mesa-libEGL1-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632684" comment="Mesa-libEGL1-32bit-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632685" comment="Mesa-libGL1-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632686" comment="Mesa-libGL1-32bit-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632687" comment="Mesa-libGLESv2-2-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632688" comment="Mesa-libglapi0-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632689" comment="Mesa-libglapi0-32bit-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632690" comment="libgbm1-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632691" comment="libgbm1-32bit-11.2.1-104.9.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632692" comment="libxatracker2-1.0.0-104.9.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81285" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1136882" ref_url="https://bugzilla.suse.com/1136882" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1136882">SUSE bug 1136882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81286" version="1" class="patch">
	<metadata>
		<title>Security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1024266" ref_url="https://bugzilla.suse.com/1024266" source="BUGZILLA"/>
		<reference ref_id="1024268" ref_url="https://bugzilla.suse.com/1024268" source="BUGZILLA"/>
		<reference ref_id="1046782" ref_url="https://bugzilla.suse.com/1046782" source="BUGZILLA"/>
		<reference ref_id="1188292" ref_url="https://bugzilla.suse.com/1188292" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
		<description>
This update for gtk-vnc fixes the following issues:

- CVE-2017-5885: Correctly validate color map range indexes (bsc#1024268).
- CVE-2017-5884: Fix bounds checking for RRE, hextile &amp; copyrect encodings (bsc#1024266).
- Fix crash when opening connection from a GSocketAddress (bsc#1046782).
- Fix possible crash on connection failure (bsc#1188292).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046782">SUSE bug 1046782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188292">SUSE bug 1188292</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81287" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-20"/>
	<updated date="2021-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632419" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632420" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632421" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632422" comment="openssl-1.0.2j-60.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81288" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632780" comment="ghostscript-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632781" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632782" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632783" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632784" comment="libspectre1-0.2.7-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81289" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-22"/>
	<updated date="2021-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633610" comment="MozillaFirefox-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633612" comment="MozillaFirefox-devel-91.1.0-112.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633613" comment="MozillaFirefox-translations-common-91.1.0-112.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81290" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81291" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153/" source="CVE"/>
		<reference ref_id="CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989/" source="CVE"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).

The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:

* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
  multiSelectOrderBy due to mishandling of query-flattener
  optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
  segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
  with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
  ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling  of  certain uses
  of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
  sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
  during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling  of certain
  errors during parsing  multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
  allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
  and CREATE VIEW statements, does not consider confusion with
  a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
  integrity_check PRAGMA command in certain cases of generated
  columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
  infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
  from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
  function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also
  has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
  vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
  collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
  sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
  to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
  crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
  process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81292" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<description>

This update for python-urllib3 fixes the following security issue:

- CVE-2020-26137: A CRLF injection via HTTP request method was fixed (bsc#1177120)

Note that this was fixed in a previous version update to 1.25.9, this update just complements the tracking.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81293" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178600" ref_url="https://bugzilla.suse.com/1178600" source="BUGZILLA"/>
		<reference ref_id="1189408" ref_url="https://bugzilla.suse.com/1189408" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24741" ref_url="https://www.suse.com/security/cve/CVE-2020-24741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009526.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-24741: Fixed a bug that allowed QLibrary to load libraries relative to CWD which could result in arbitrary code execution. (bsc#1189408)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-30"/>
	<updated date="2021-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178600">SUSE bug 1178600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189408">SUSE bug 1189408</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24741/">CVE-2020-24741</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634372" comment="libQt5Concurrent5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634373" comment="libQt5Core5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634374" comment="libQt5DBus5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634375" comment="libQt5Gui5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634376" comment="libQt5Network5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634377" comment="libQt5OpenGL5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634378" comment="libQt5PrintSupport5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634379" comment="libQt5Sql5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634380" comment="libQt5Sql5-mysql-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634381" comment="libQt5Sql5-postgresql-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634382" comment="libQt5Sql5-sqlite-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634383" comment="libQt5Sql5-unixODBC-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634384" comment="libQt5Test5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634385" comment="libQt5Widgets5-5.6.1-17.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634386" comment="libQt5Xml5-5.6.1-17.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81294" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1117993" ref_url="https://bugzilla.suse.com/1117993" source="BUGZILLA"/>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

Also the following bug was fixed:

- Avoid concurrency problem in ldconfig (bsc#1117993)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117993">SUSE bug 1117993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81295" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634387" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634388" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634365" comment="libwebkit2gtk3-lang-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634389" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634390" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634391" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634392" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634393" comment="webkit2gtk3-devel-2.32.4-2.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81296" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81297" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182654" ref_url="https://bugzilla.suse.com/1182654" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1187369" ref_url="https://bugzilla.suse.com/1187369" source="BUGZILLA"/>
		<reference ref_id="1187376" ref_url="https://bugzilla.suse.com/1187376" source="BUGZILLA"/>
		<reference ref_id="1187378" ref_url="https://bugzilla.suse.com/1187378" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: Fixed IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-28697: Fixed grant table v2 status pages that may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-28698: Fixed long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-20255: Fixed eepro100 stack overflow via infinite recursion (bsc#1182654).
- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187369).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure (udp) (bsc#1187378).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187376).
- CVE-2021-28692: Fixed inappropriate x86 IOMMU timeout detection / handling (XSA-373)(bsc#1186429).
- CVE-2021-0089: Fixed Speculative Code Store Bypass (XSA-375)(bsc#1186433).
- CVE-2021-28690: Fixed x86 TSX Async Abort protections not restored after S3 (XSA-377)(bsc#1186434).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-07"/>
	<updated date="2021-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187378">SUSE bug 1187378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81298" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81299" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81300" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652805" comment="strongswan-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652806" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652807" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652808" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81301" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1190177" ref_url="https://bugzilla.suse.com/1190177" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Fix for build with llvm12 on s390x. (bsc#1185952)
- Re-enable 'icu' for PostgreSQL 10. (bsc#1179945)
- Add postgresqlXX-server-devel as a dependency for postgresql13-server-devel. (bsc#1187751)
- Upgrade to version 10.18. (bsc#1190177)

Upgrade to version 10.17 (already released for SUSE Linux Enterprise 12 SP5):

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
- Fixed an issue droping irregular warning messages by removing the package. (bsc#1178961)
- Fixed an issue when build does not build the requiements to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix recently-added timetz test case so it works when the USA is not observing daylight savings time.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190177">SUSE bug 1190177</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652166" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652167" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652168" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81302" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)
- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-28"/>
	<updated date="2021-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81303" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81304" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81305" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="1179036" ref_url="https://bugzilla.suse.com/1179036" source="BUGZILLA"/>
		<reference ref_id="1179341" ref_url="https://bugzilla.suse.com/1179341" source="BUGZILLA"/>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for the arm-symbianelf format has been removed.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.
* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

 New features in the Assembler:

  General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

   X86/x86_64:

     * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
       Locker instructions. 
     * Support non-absolute segment values for lcall and ljmp.
     * Add {disp16} pseudo prefix to x86 assembler.
     * Configure with --enable-x86-used-note by default for Linux/x86.

   ARM/AArch64:

     * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
       Cortex-R82, Neoverse V1, and Neoverse N2 cores.
     * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
       Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
       Stack Recorder Extension) and BRBE (Branch Record Buffer
       Extension) system registers.
     * Add support for Armv8-R and Armv8.7-A ISA extensions.
     * Add support for DSB memory nXS barrier, WFET and WFIT
       instruction for Armv8.7.
     * Add support for +csre feature for -march. Add CSR PDEC
       instruction for CSRE feature in AArch64.
     * Add support for +flagm feature for -march in Armv8.4 AArch64.
     * Add support for +ls64 feature for -march in Armv8.7
       AArch64. Add atomic 64-byte load/store instructions for this
       feature. 
     * Add support for +pauth (Pointer Authentication) feature for
       -march in AArch64.

  New features in the Linker:

    * Add --error-handling-script=&lt;NAME&gt; command line option to allow
      a helper script to be invoked when an undefined symbol or a
      missing library is encountered.  This option can be suppressed
      via the configure time switch: --enable-error-handling-script=no.
    * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
      x86-64-{baseline|v[234]} ISA level as needed.
    * Add -z unique-symbol to avoid duplicated local symbol names.
    * The creation of PE format DLLs now defaults to using a more
      secure set of DLL characteristics.
    * The linker now deduplicates the types in .ctf sections.  The new 
       command-line option --ctf-share-types describes how to do this:
       its default value, share-unconflicted, produces the most compact
       output.
    * The linker now omits the 'variable section' from .ctf sections
      by default, saving space.  This is almost certainly what you
      want unless you are working on a project that has its own
      analogue of symbol tables that are not reflected in the ELF
      symtabs.

New features in other binary tools:

    * The ar tool's previously unused l modifier is now used for
      specifying dependencies of a static library. The arguments of
      this option (or --record-libdeps long form option) will be
      stored verbatim in the __.LIBDEP member of the archive, which
      the linker may read at link time.
    * Readelf can now display the contents of LTO symbol table
      sections when asked to do so via the --lto-syms command line
      option.
    * Readelf now accepts the -C command line option to enable the
      demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
      --no-demangle, --recurse-limit and --no-recurse-limit options
      are also now availale.

Update to binutils 2.35.1:

* This is a point release over the previous 2.35 version, containing bug
  fixes, and as an exception to the usual rule, one new feature.  The
  new feature is the support for a new directive in the assembler:
  '.nop'.  This directive creates a single no-op instruction in whatever
  encoding is correct for the target architecture.  Unlike the .space or
  .fill this is a real instruction, and it does affect the generation of
  DWARF line number tables, should they be enabled.

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
- CVE-2019-17451: Fixed an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line() in dwarf2.c (bsc#1153768).
- CVE-2019-17450: Fixed a potential denial of service in find_abstract_instance() in dwarf2.c (bsc#1153770).
- CVE-2019-9077: Fixed a heap-based buffer overflow in process_mips_specific() in readelf.c via a malformed MIPS option section (bsc#1126826).
- CVE-2019-9075: Fixed a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap() in archive64.c (bsc#1126829).
- CVE-2019-9074: Fixed a out-of-bounds read leading to a SEGV in bfd_getl32() in libbfd.c (bsc#1126831).
- CVE-2019-12972: Fixed a heap-based buffer over-read in _bfd_doprnt() in bfd.c (bsc#1140126).
- CVE-2019-14444: Fixed an integer overflow apply_relocations() in readelf.c (bsc#1143609).
- CVE-2019-14250: Fixed an integer overflow in simple_object_elf_match() in simple-object-elf.c (bsc#1142649).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-02"/>
	<updated date="2021-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179036">SUSE bug 1179036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179341">SUSE bug 1179341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81306" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).

- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654414" comment="binutils-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654415" comment="binutils-devel-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654416" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654417" comment="libctf0-2.37-9.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81307" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1025709" ref_url="https://bugzilla.suse.com/1025709" source="BUGZILLA"/>
		<reference ref_id="1030066" ref_url="https://bugzilla.suse.com/1030066" source="BUGZILLA"/>
		<reference ref_id="1030803" ref_url="https://bugzilla.suse.com/1030803" source="BUGZILLA"/>
		<reference ref_id="1030805" ref_url="https://bugzilla.suse.com/1030805" source="BUGZILLA"/>
		<reference ref_id="1030807" ref_url="https://bugzilla.suse.com/1030807" source="BUGZILLA"/>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973).
- CVE-2017-7244: Fixed invalid read in _pcre32_xclass() (bsc#1030807).
- CVE-2017-7245: Fixed buffer overflow in the pcre32_copy_substring (bsc#1030805).
- CVE-2017-7246: Fixed another buffer overflow in the pcre32_copy_substring (bsc#1030803).
- CVE-2017-7186: Fixed denial of service caused by an invalid Unicode property lookup (bsc#1030066).
- CVE-2017-6004: Fixed denial of service via crafted regular expression (bsc#1025709).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81308" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655206" comment="libdcerpc-binding0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655207" comment="libdcerpc-binding0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655208" comment="libdcerpc0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655209" comment="libdcerpc0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655210" comment="libndr-krb5pac0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655211" comment="libndr-krb5pac0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655212" comment="libndr-nbt0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655213" comment="libndr-nbt0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655214" comment="libndr-standard0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655215" comment="libndr-standard0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655216" comment="libndr0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655217" comment="libndr0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655218" comment="libnetapi0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655219" comment="libnetapi0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655220" comment="libsamba-credentials0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655221" comment="libsamba-credentials0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655222" comment="libsamba-errors0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655223" comment="libsamba-errors0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655224" comment="libsamba-hostconfig0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655225" comment="libsamba-hostconfig0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655226" comment="libsamba-passdb0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655227" comment="libsamba-passdb0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655228" comment="libsamba-util0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655229" comment="libsamba-util0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655230" comment="libsamdb0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655231" comment="libsamdb0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655232" comment="libsmbclient0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655233" comment="libsmbclient0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655234" comment="libsmbconf0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655235" comment="libsmbconf0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655236" comment="libsmbldap0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655237" comment="libsmbldap0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655238" comment="libtevent-util0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655239" comment="libtevent-util0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655240" comment="libwbclient0-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655241" comment="libwbclient0-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655242" comment="samba-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655243" comment="samba-client-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655244" comment="samba-client-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655245" comment="samba-doc-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655246" comment="samba-libs-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655247" comment="samba-libs-32bit-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655248" comment="samba-winbind-4.4.2-38.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655249" comment="samba-winbind-32bit-4.4.2-38.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81309" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81310" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13, postgresql14  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 and postgresql14 fixes the following issues:

Security issues fixed:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

This update also ships postgresql14 to SUSE Linux Enterprise 12 SP5. (jsc#SLE-22673)
On older service packs only libpq5 and libecpg6 are being replaced by the postgresql14 variants.

Feature changes in postgresql14:

- https://www.postgresql.org/about/news/postgresql-14-released-2318/
- https://www.postgresql.org/docs/14/release-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-20"/>
	<updated date="2021-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81311" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<description>
This update for postgresql96 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81312" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656550" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656551" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656552" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81313" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657339" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657340" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657332" comment="libwebkit2gtk3-lang-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657341" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657342" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657343" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657344" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657345" comment="webkit2gtk3-devel-2.32.4-2.74.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81314" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81315" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:


Update to OpenJDK 7u321 (October 2021 CPU):

- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-24"/>
	<updated date="2021-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81316" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-29"/>
	<updated date="2021-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81317" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<description>
This update for ruby2.1 fixes the following issues:

- CVE-2020-25613: Fixed potential HTTP request smuggling in WEBrick (bsc#1177125).
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81318" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2018-14679: Fixed off-by-one issue in embedded libmspack that could lead to denial of service (bsc#1103032). 
  
- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656968" comment="clamav-0.103.4-33.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81319" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658205" comment="libjavascriptcoregtk-4_0-18-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658206" comment="libwebkit2gtk-4_0-37-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658196" comment="libwebkit2gtk3-lang-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658207" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658208" comment="typelib-1_0-WebKit2-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658209" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658210" comment="webkit2gtk-4_0-injected-bundles-2.34.1-2.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658211" comment="webkit2gtk3-devel-2.34.1-2.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81320" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1119934" ref_url="https://bugzilla.suse.com/1119934" source="BUGZILLA"/>
		<reference ref_id="1129735" ref_url="https://bugzilla.suse.com/1129735" source="BUGZILLA"/>
		<reference ref_id="1171217" ref_url="https://bugzilla.suse.com/1171217" source="BUGZILLA"/>
		<reference ref_id="1171420" ref_url="https://bugzilla.suse.com/1171420" source="BUGZILLA"/>
		<reference ref_id="1173346" ref_url="https://bugzilla.suse.com/1173346" source="BUGZILLA"/>
		<reference ref_id="1176724" ref_url="https://bugzilla.suse.com/1176724" source="BUGZILLA"/>
		<reference ref_id="1183089" ref_url="https://bugzilla.suse.com/1183089" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1186109" ref_url="https://bugzilla.suse.com/1186109" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188325" ref_url="https://bugzilla.suse.com/1188325" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190276" ref_url="https://bugzilla.suse.com/1190276" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190601" ref_url="https://bugzilla.suse.com/1190601" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882/" source="CVE"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032). Additional spectrev1 fixes were added to the eBPF code.
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1087082 bnc#1100416 bnc#1129735).
- CVE-2018-16882: A use-after-free issue was found in the way the KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).
- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).
- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel&amp;#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).
- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).
- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
- CVE-2021-34556: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-35477: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the 'int_ctl' field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. (bnc#1189399).
- CVE-2021-3655: A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).
- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computed the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159)
- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).
- CVE-2021-43389: An issue was discovered in the Linux kernel There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- - ipv4: make exception cache less predictible (bsc#1191790,  CVE-2021-20322).

The following non-security bugs were fixed:

- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1188325).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1188325).
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1188325).
- config: disable unprivileged BPF by default (jsc#SLE-22918) Backport of mainline commit 8a03e56b253e ('bpf: Disallow unprivileged bpf by default') only changes kconfig default, used e.g. for 'make oldconfig' when the config option is missing, but does not update our kernel configs used for build. Update also these to make sure unprivileged BPF is really disabled by default.
- kABI: protect struct bpf_map (kabi).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- sctp: fully initialize v4 addr in some functions (bsc#1188563).
- sctp: simplify addr copy (bsc#1188563).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188325">SUSE bug 1188325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190601">SUSE bug 1190601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81321" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659103" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659104" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659105" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659106" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659107" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659108" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659109" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659110" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81322" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:
  
- CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658348" comment="openssh-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658349" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658350" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658351" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81323" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:
                                                                                                                    
Update to Extended Support Release 91.4.0 (bsc#1193485):                                                            
                                                                                                                    
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone                         
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods 
- CVE-2021-43541: External protocol handler parameters were unescaped                                                  
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler           
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding                                                       
- CVE-2021-43545: Denial of Service when using the Location API in a loop                                              
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed                         
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4                                                       
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)                                            
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-12"/>
	<updated date="2021-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81324" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659102" comment="glib-networking-2.48.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81325" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
 
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659889" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659890" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81326" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issue:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81327" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-20"/>
	<updated date="2021-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81328" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1063704" ref_url="https://bugzilla.suse.com/1063704" source="BUGZILLA"/>
		<reference ref_id="1069468" ref_url="https://bugzilla.suse.com/1069468" source="BUGZILLA"/>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1083597" ref_url="https://bugzilla.suse.com/1083597" source="BUGZILLA"/>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1156884" ref_url="https://bugzilla.suse.com/1156884" source="BUGZILLA"/>
		<reference ref_id="1159840" ref_url="https://bugzilla.suse.com/1159840" source="BUGZILLA"/>
		<reference ref_id="1161119" ref_url="https://bugzilla.suse.com/1161119" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1171806" ref_url="https://bugzilla.suse.com/1171806" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1173760" ref_url="https://bugzilla.suse.com/1173760" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1183783" ref_url="https://bugzilla.suse.com/1183783" source="BUGZILLA"/>
		<reference ref_id="1184400" ref_url="https://bugzilla.suse.com/1184400" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1:

* Add support for NTS servers specified by IP address (matching
  Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
  server
- Update clknetsim to snapshot f89702d.

- Ensure the correct pool packages are installed for openSUSE and SLE (bsc#1180689).

- Enable syscallfilter unconditionally (bsc#1181826).

Chrony was updated to 4.0:

Enhancements

- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
  unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
  configuration
- Add sourcedir directive and 'reload sources' command to
  support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
  (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
  files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
  option
- Avoid replacing NTP sources with sources that have
  unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
  sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
  to online
- Update clock synchronisation status and leap status more
  frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
  authentication
- Add selectdata command to print details about source
  selection
- Add -N option and sourcename command to print original names
  of sources
- Add -a option to some commands to print also unresolved
  sources
- Add -k, -p, -r options to clients command to select, limit,
  reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
  routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
  multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
  (chrony 2.x clients using non-MD5/SHA1 keys need to use
  option 'version 3')

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Chrony was updated to 3.5.1:

* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
  preconfigure chrony to use NTP servers from the  respective
  pools for SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
  preconfigured servers.
- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).

- Update clknetsim to version 79ffe44 (fixes bsc#1162964).

Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service (bsc#1128846).

- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529) 

Update to version 3.4

* Enhancements

  + Add filter option to server/pool/peer directive
  + Add minsamples and maxsamples options to hwtimestamp directive
  + Add support for faster frequency adjustments in Linux 4.19
  + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
    without root privileges to remove it on exit
  + Disable sub-second polling intervals for distant NTP sources
  + Extend range of supported sub-second polling intervals
  + Get/set IPv4 destination/source address of NTP packets on FreeBSD
  + Make burst options and command useful with short polling intervals
  + Modify auto_offline option to activate when sending request failed
  + Respond from interface that received NTP request if possible
  + Add onoffline command to switch between online and offline state 
    according to current system network configuration
  + Improve example NetworkManager dispatcher script

* Bug fixes

  + Avoid waiting in Linux getrandom system call
  + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

* Enhancements:

  + Add burst option to server/pool directive
  + Add stratum and tai options to refclock directive
  + Add support for Nettle crypto library
  + Add workaround for missing kernel receive timestamps on Linux
  + Wait for late hardware transmit timestamps
  + Improve source selection with unreachable sources
  + Improve protection against replay attacks on symmetric mode
  + Allow PHC refclock to use socket in /var/run/chrony
  + Add shutdown command to stop chronyd
  + Simplify format of response to manual list command
  + Improve handling of unknown responses in chronyc

* Bug fixes:

  + Respond to NTPv1 client requests with zero mode
  + Fix -x option to not require CAP_SYS_TIME under non-root user
  + Fix acquisitionport directive to work with privilege separation
  + Fix handling of socket errors on Linux to avoid high CPU usage
  + Fix chronyc to not get stuck in infinite loop after clock step

- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed default chrony.conf to add 'include /etc/chrony.d/*'

- Enable pps support

Upgraded to version 3.2:

Enhancements

* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default

Bug fixes

* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up

Upgraded to version 3.1:

- Enhancements

  - Add support for precise cross timestamping of PHC on Linux
  - Add minpoll, precision, nocrossts options to hwtimestamp directive
  - Add rawmeasurements option to log directive and modify measurements
    option to log only valid measurements from synchronised sources
  - Allow sub-second polling interval with NTP sources

- Bug fixes

  - Fix time smoothing in interleaved mode

Upgraded to version 3.0:

- Enhancements

  - Add support for software and hardware timestamping on Linux
  - Add support for client/server and symmetric interleaved modes
  - Add support for MS-SNTP authentication in Samba
  - Add support for truncated MACs in NTPv4 packets
  - Estimate and correct for asymmetric network jitter
  - Increase default minsamples and polltarget to improve stability with very low jitter
  - Add maxjitter directive to limit source selection by jitter
  - Add offset option to server/pool/peer directive
  - Add maxlockage option to refclock directive
  - Add -t option to chronyd to exit after specified time
  - Add partial protection against replay attacks on symmetric mode
  - Don't reset polling interval when switching sources to online state
  - Allow rate limiting with very short intervals
  - Improve maximum server throughput on Linux and NetBSD
  - Remove dump files after start
  - Add tab-completion to chronyc with libedit/readline
  - Add ntpdata command to print details about NTP measurements
  - Allow all source options to be set in add server/peer command
  - Indicate truncated addresses/hostnames in chronyc output
  - Print reference IDs as hexadecimal numbers to avoid confusion with IPv4 addresses

- Bug fixes

  - Fix crash with disabled asynchronous name resolving

Upgraded to version 2.4.1:

- Bug fixes

  - Fix processing of kernel timestamps on non-Linux systems
  - Fix crash with smoothtime directive
  - Fix validation of refclock sample times
  - Fix parsing of refclock directive

update to 2.4:

- Enhancements

  - Add orphan option to local directive for orphan mode
    compatible with ntpd
  - Add distance option to local directive to set activation
    threshold (1 second by default)
  - Add maxdrift directive to set maximum allowed drift of system
    clock
  - Try to replace NTP sources exceeding maximum distance
  - Randomise source replacement to avoid getting stuck with bad
    sources
  - Randomise selection of sources from pools on start
  - Ignore reference timestamp as ntpd doesn't always set it
    correctly
  - Modify tracking report to use same values as seen by NTP
    clients
  - Add -c option to chronyc to write reports in CSV format
  - Provide detailed manual pages

- Bug fixes

  - Fix SOCK refclock to work correctly when not specified as
    last refclock
  - Fix initstepslew and -q/-Q options to accept time from own
    NTP clients
  - Fix authentication with keys using 512-bit hash functions
  - Fix crash on exit when multiple signals are received
  - Fix conversion of very small floating-point numbers in
    command packets
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1063704">SUSE bug 1063704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069468">SUSE bug 1069468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083597">SUSE bug 1083597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156884">SUSE bug 1156884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159840">SUSE bug 1159840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161119">SUSE bug 1161119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171806">SUSE bug 1171806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173760">SUSE bug 1173760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183783">SUSE bug 1183783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184400">SUSE bug 1184400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659981" comment="chrony-4.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81329" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81330" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1070943" ref_url="https://bugzilla.suse.com/1070943" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could eventually have allowed attackers to cause a denial of service (memory consumption) (bnc#1157298 ).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81331" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008322.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531895" comment="openvswitch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531898" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81332" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81333" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81334" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81335" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81336" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81337" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81338" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81339" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81340" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81341" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81342" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81343" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

grub2 was bumped to version 2.02, same as SUSE Linux Enterprise 12 SP3.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81344" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81345" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bug was fixed:

- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81346" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81347" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81348" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81349" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81350" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81351" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- Fixed a potential crash on exit as a result of the fix of CVE-2021-3156 [bsc#1181090]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531993" comment="sudo-1.8.10p3-10.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81352" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81353" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81354" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81355" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81356" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010562.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676877" comment="openvpn-2.3.8-16.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676878" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81357" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update Java 7.1 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81358" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81359" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677126" comment="libz1-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677127" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81360" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81361" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1038841" ref_url="https://bugzilla.suse.com/1038841" source="BUGZILLA"/>
		<reference ref_id="1081947" ref_url="https://bugzilla.suse.com/1081947" source="BUGZILLA"/>
		<reference ref_id="1082293" ref_url="https://bugzilla.suse.com/1082293" source="BUGZILLA"/>
		<reference ref_id="1084671" ref_url="https://bugzilla.suse.com/1084671" source="BUGZILLA"/>
		<reference ref_id="1085196" ref_url="https://bugzilla.suse.com/1085196" source="BUGZILLA"/>
		<reference ref_id="1106214" ref_url="https://bugzilla.suse.com/1106214" source="BUGZILLA"/>
		<reference ref_id="1116347" ref_url="https://bugzilla.suse.com/1116347" source="BUGZILLA"/>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1135534" ref_url="https://bugzilla.suse.com/1135534" source="BUGZILLA"/>
		<reference ref_id="1135708" ref_url="https://bugzilla.suse.com/1135708" source="BUGZILLA"/>
		<reference ref_id="1151708" ref_url="https://bugzilla.suse.com/1151708" source="BUGZILLA"/>
		<reference ref_id="1168235" ref_url="https://bugzilla.suse.com/1168235" source="BUGZILLA"/>
		<reference ref_id="1168389" ref_url="https://bugzilla.suse.com/1168389" source="BUGZILLA"/>
		<reference ref_id="1169006" ref_url="https://bugzilla.suse.com/1169006" source="BUGZILLA"/>
		<reference ref_id="1172427" ref_url="https://bugzilla.suse.com/1172427" source="BUGZILLA"/>
		<reference ref_id="1174942" ref_url="https://bugzilla.suse.com/1174942" source="BUGZILLA"/>
		<reference ref_id="1175514" ref_url="https://bugzilla.suse.com/1175514" source="BUGZILLA"/>
		<reference ref_id="1175623" ref_url="https://bugzilla.suse.com/1175623" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1178554" ref_url="https://bugzilla.suse.com/1178554" source="BUGZILLA"/>
		<reference ref_id="1178825" ref_url="https://bugzilla.suse.com/1178825" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="1194642" ref_url="https://bugzilla.suse.com/1194642" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010652.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- Improve throughput and reduce clock sequence increments for high load situation with time based 
  version 1 uuids. (bsc#1194642)
- Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)
- Warn if uuidd lock state is not usable. (bsc#1194642)
- Fix 'su -s' bash completion. (bsc#1172427)
- CVE-2021-37600: Fixed an integer overflow which could lead to buffer overflow in get_sem_elements. (bsc#1188921)
- Load /etc/default/su (bsc#1116347).
- Prevent outdated pam files (bsc#1082293, bsc#1081947#c68).
- Do not trim read-only volumes (bsc#1106214).
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- agetty: Reload issue only if it is really needed (bsc#1085196)
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- libblkid: Do not trigger CDROM autoclose. (bsc#1084671)
- Avoid sulogin failing on not existing or not functional console devices. (bsc#1175514)
- Build with libudev support to support non-root users. (bsc#1169006)
- lscpu: avoid segfault on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix for warning on mounts to CIFS with mount. (bsc#1174942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1038841">SUSE bug 1038841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081947">SUSE bug 1081947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082293">SUSE bug 1082293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084671">SUSE bug 1084671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085196">SUSE bug 1085196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106214">SUSE bug 1106214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116347">SUSE bug 1116347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135534">SUSE bug 1135534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135708">SUSE bug 1135708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151708">SUSE bug 1151708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168235">SUSE bug 1168235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168389">SUSE bug 1168389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169006">SUSE bug 1169006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172427">SUSE bug 1172427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174942">SUSE bug 1174942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175514">SUSE bug 1175514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175623">SUSE bug 1175623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178554">SUSE bug 1178554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178825">SUSE bug 1178825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194642">SUSE bug 1194642</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677611" comment="libblkid1-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677612" comment="libblkid1-32bit-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677613" comment="libfdisk1-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677614" comment="libmount1-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677615" comment="libmount1-32bit-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677616" comment="libsmartcols1-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677617" comment="libuuid1-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677618" comment="libuuid1-32bit-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677619" comment="python-libmount-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677620" comment="util-linux-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677621" comment="util-linux-lang-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677622" comment="util-linux-systemd-2.28-44.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677623" comment="uuidd-2.28-44.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81362" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-05"/>
	<updated date="2022-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678285" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678286" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678287" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678288" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678289" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678290" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678291" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678292" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81363" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81364" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1167631" ref_url="https://bugzilla.suse.com/1167631" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2020-1752: Fix use-after-free in glob when expanding ~user (bsc#1167631)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677624" comment="glibc-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677625" comment="glibc-devel-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677626" comment="glibc-locale-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677627" comment="glibc-profile-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677628" comment="nscd-2.22-123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81365" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1189622" ref_url="https://bugzilla.suse.com/1189622" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195485" ref_url="https://bugzilla.suse.com/1195485" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010668.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp fixes the following issues:

libsolv to 0.6.39:

- fix memory leaks in SWIG generated code
- fix misparsing of '&amp;' in attributes with libxml2
- try to keep packages from a cycle close togther in the
  transaction order (bsc#1189622)
- fix split provides not working if the update includes a
  forbidden vendor change (bsc#1195485)
- fix segfault on conflict resolution when using bindings
- do not replace noarch problem rules with arch dependent ones
  in problem reporting
- fix and simplify pool_vendor2mask implementation
- bump version to 0.6.39

libzypp to 16.22.4:

- Hint on ptf resolver conflicts (bsc#1194848)
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Set ZYPP_RPM_DEBUG=1 to capture verbose rpm command output.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189622">SUSE bug 1189622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195485">SUSE bug 1195485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677629" comment="libsolv-devel-0.6.39-2.27.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677630" comment="libsolv-tools-0.6.39-2.27.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677631" comment="libzypp-16.22.4-27.85.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677632" comment="libzypp-devel-16.22.4-27.85.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677633" comment="perl-solv-0.6.39-2.27.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677634" comment="python-solv-0.6.39-2.27.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81366" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1140205" ref_url="https://bugzilla.suse.com/1140205" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="971617" ref_url="https://bugzilla.suse.com/971617" source="BUGZILLA"/>
		<reference ref_id="980504" ref_url="https://bugzilla.suse.com/980504" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924/" source="CVE"/>
		<reference ref_id="CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183/" source="CVE"/>
		<reference ref_id="CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797/" source="CVE"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81367" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81368" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679302" comment="liblzma5-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679303" comment="xz-5.0.5-6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81369" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81370" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679548" comment="gzip-1.6-9.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81371" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
- sr9700: sanity check for packet length (bsc#1196836).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81372" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2021-3448: Fixed a potential DNS cache poisoning issue due to a constant
  outgoing port being used when for certain use cases of the --server option
  (bsc#1183709).
- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81373" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010789.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Remove the log4j dependency as it is not used by the tomcat package (bsc#1196137)
    
Security hardening, related to Spring Framework vulnerabilities:    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679547" comment="javapackages-filesystem-5.3.1-14.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679528" comment="tomcat-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679529" comment="tomcat-admin-webapps-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679530" comment="tomcat-docs-webapp-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679531" comment="tomcat-el-3_0-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679532" comment="tomcat-javadoc-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679533" comment="tomcat-jsp-2_3-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679534" comment="tomcat-lib-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679535" comment="tomcat-servlet-3_1-api-8.0.53-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679536" comment="tomcat-webapps-8.0.53-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81374" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680006" comment="git-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680007" comment="git-core-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680008" comment="git-cvs-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680009" comment="git-daemon-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679999" comment="git-doc-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680010" comment="git-email-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680011" comment="git-gui-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680012" comment="git-svn-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680013" comment="git-web-2.26.2-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680014" comment="gitk-2.26.2-27.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81375" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010799.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-23308: Fixed use-after-free of ID and IDREF attributes. (bsc#1196490)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680015" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680016" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680017" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81376" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81377" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
- CVE-2021-20257: Fixed an infinite loop in the e1000 emulated device, which
  could cause an excessive CPU consumption in the host (bsc#1182846).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81378" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518/" source="CVE"/>
		<reference ref_id="CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81379" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010844.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681235" comment="cifs-utils-6.9-9.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81380" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664239" comment="aide-0.16-20.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81381" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.1.0 ESR.

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-09"/>
	<updated date="2022-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81382" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1107294" ref_url="https://bugzilla.suse.com/1107294" source="BUGZILLA"/>
		<reference ref_id="1107296" ref_url="https://bugzilla.suse.com/1107296" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2018-0502: Fixed execve call vulnerability to program named on the second line when the beginning of a #! script file was mishandled. (bsc#1107296, bsc#1107294)
- CVE-2018-13259: Fixed execve call vulnerability to program name that is a substring of the intended one. (bsc#1107296, bsc#1107294)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81383" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198446" ref_url="https://bugzilla.suse.com/1198446" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<description>
This update for e2fsprogs fixes the following issues:

- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
  and possibly arbitrary code execution. (bsc#1198446)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682319" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682320" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682321" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81384" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188568" ref_url="https://bugzilla.suse.com/1188568" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 5 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2432: Fixed a vulnerability in the omponent JNDI. (bsc#1188568)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-24"/>
	<updated date="2022-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81385" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198383" ref_url="https://bugzilla.suse.com/1198383" source="BUGZILLA"/>
		<reference ref_id="1199240" ref_url="https://bugzilla.suse.com/1199240" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011023.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
- Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198383">SUSE bug 1198383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682642" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682643" comment="openldap2-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682644" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682645" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81386" version="1" class="patch">
	<metadata>
		<title>Security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011029.html" source="SUSE-SU"/>
		<description>
This update for gzip fixes the following issues:

- CVE-2022-1271: Add hardening for zgrep. (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682638" comment="gzip-1.6-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81387" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):

- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):

- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-16"/>
	<updated date="2022-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681322" comment="webkit2gtk3-devel-2.36.0-2.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81388" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1199223" ref_url="https://bugzilla.suse.com/1199223" source="BUGZILLA"/>
		<reference ref_id="1199224" ref_url="https://bugzilla.suse.com/1199224" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2022-27781: Fixed CERTINFO never-ending busy-loop (bsc#1199223)
- CVE-2022-27782: Fixed TLS and SSH connection too eager reuse (bsc#1199224)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-18"/>
	<updated date="2022-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81389" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198717" ref_url="https://bugzilla.suse.com/1198717" source="BUGZILLA"/>
		<reference ref_id="1199423" ref_url="https://bugzilla.suse.com/1199423" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220510 release. (bsc#1199423)
Updated to Intel CPU Microcode 20220419 release. (bsc#1198717)

- CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198717">SUSE bug 1198717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81390" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198970" ref_url="https://bugzilla.suse.com/1198970" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):

- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-19"/>
	<updated date="2022-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81391" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81392" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664690" comment="libpolkit0-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664691" comment="polkit-0.113-5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664692" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81393" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664933" comment="strongswan-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664934" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664935" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664936" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81394" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-27"/>
	<updated date="2022-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81395" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2018-18074: Fixed to prevent the package to send an HTTP Authorization header to an http URI
  upon receiving a same-hostname https-to-http redirect. (bsc#1111622) 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81396" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198351" ref_url="https://bugzilla.suse.com/1198351" source="BUGZILLA"/>
		<reference ref_id="1199350" ref_url="https://bugzilla.suse.com/1199350" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1270" ref_url="https://www.suse.com/security/cve/CVE-2022-1270/" source="CVE"/>
		<reference ref_id="CVE-2022-28463" ref_url="https://www.suse.com/security/cve/CVE-2022-28463/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-1270: Fixed a memory corruption issue when parsing MIFF files (bsc#1198351).
- CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-05-12"/>
	<updated date="2022-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198351">SUSE bug 1198351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199350">SUSE bug 1199350</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1270/">CVE-2022-1270</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28463/">CVE-2022-28463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009683697" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683698" comment="ImageMagick-config-6-upstream-6.8.8.1-71.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683699" comment="libMagickCore-6_Q16-1-6.8.8.1-71.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009683700" comment="libMagickWand-6_Q16-1-6.8.8.1-71.170.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81397" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010150.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666238" comment="libdcerpc-binding0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666239" comment="libdcerpc-binding0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666240" comment="libdcerpc0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666241" comment="libdcerpc0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666242" comment="libndr-krb5pac0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666243" comment="libndr-krb5pac0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666244" comment="libndr-nbt0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666245" comment="libndr-nbt0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666246" comment="libndr-standard0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666247" comment="libndr-standard0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666248" comment="libndr0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666249" comment="libndr0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666250" comment="libnetapi0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666251" comment="libnetapi0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666252" comment="libsamba-credentials0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666253" comment="libsamba-credentials0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666254" comment="libsamba-errors0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666255" comment="libsamba-errors0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666256" comment="libsamba-hostconfig0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666257" comment="libsamba-hostconfig0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666258" comment="libsamba-passdb0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666259" comment="libsamba-passdb0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666260" comment="libsamba-util0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666261" comment="libsamba-util0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666262" comment="libsamdb0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666263" comment="libsamdb0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666264" comment="libsmbclient0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666265" comment="libsmbclient0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666266" comment="libsmbconf0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666267" comment="libsmbconf0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666268" comment="libsmbldap0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666269" comment="libsmbldap0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666270" comment="libtevent-util0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666271" comment="libtevent-util0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666272" comment="libwbclient0-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666273" comment="libwbclient0-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666274" comment="samba-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666275" comment="samba-client-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666276" comment="samba-client-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666277" comment="samba-doc-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666278" comment="samba-libs-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666279" comment="samba-libs-32bit-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666280" comment="samba-winbind-4.4.2-38.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666281" comment="samba-winbind-32bit-4.4.2-38.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81398" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1100146" ref_url="https://bugzilla.suse.com/1100146" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1184839" ref_url="https://bugzilla.suse.com/1184839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1100146">SUSE bug 1100146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184839">SUSE bug 1184839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661606" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661607" comment="net-snmp-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661608" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661609" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81399" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009971.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-05"/>
	<updated date="2022-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662498" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81400" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010191.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-07"/>
	<updated date="2022-02-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666228" comment="xen-4.7.6_20-43.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666229" comment="xen-doc-html-4.7.6_20-43.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666230" comment="xen-libs-4.7.6_20-43.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666231" comment="xen-libs-32bit-4.7.6_20-43.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666232" comment="xen-tools-4.7.6_20-43.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666233" comment="xen-tools-domU-4.7.6_20-43.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81401" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010197.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-09"/>
	<updated date="2022-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664693" comment="clamav-0.103.5-33.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81402" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1186207" ref_url="https://bugzilla.suse.com/1186207" source="BUGZILLA"/>
		<reference ref_id="1192032" ref_url="https://bugzilla.suse.com/1192032" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1193157" ref_url="https://bugzilla.suse.com/1193157" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193575" ref_url="https://bugzilla.suse.com/1193575" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194272" ref_url="https://bugzilla.suse.com/1194272" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020/" source="CVE"/>
		<reference ref_id="CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
- CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
- CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/af_x25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
- CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
- CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
- CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
- CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
- CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
- CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate (bsc#1194272).
- CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
- CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
- CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- memstick: rtsx_usb_ms: fix UAF
- moxart: fix potential use-after-free on remove path (bsc1194516).
- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (git-fixes).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81403" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667335" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81404" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81405" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81406" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668119" comment="tcpdump-4.9.2-14.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81407" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010280.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81408" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81409" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81410" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations. (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua. (bsc#1193942)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-12"/>
	<updated date="2022-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81411" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

-  CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669342" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669343" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669344" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669345" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669346" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669347" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669348" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81412" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81413" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81414" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1089030" ref_url="https://bugzilla.suse.com/1089030" source="BUGZILLA"/>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
- CVE-2018-1100: Fixed a potential code execution via a stack-based buffer
  overflow in utils.c:checkmailpath() (bsc#1089030).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81415" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1146312" ref_url="https://bugzilla.suse.com/1146312" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).

The following non-security bug was fixed:

- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81416" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81417" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010419.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-11"/>
	<updated date="2022-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670816" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670817" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670802" comment="libwebkit2gtk3-lang-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670818" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670819" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670820" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670821" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670822" comment="webkit2gtk3-devel-2.34.6-2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81418" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81419" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81420" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671277" comment="expat-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671278" comment="libexpat1-2.1.0-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81421" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673055" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673056" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673057" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673058" comment="openssl-1.0.2j-60.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81422" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81423" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81424" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81425" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1086690" ref_url="https://bugzilla.suse.com/1086690" source="BUGZILLA"/>
		<reference ref_id="1094150" ref_url="https://bugzilla.suse.com/1094150" source="BUGZILLA"/>
		<reference ref_id="1094154" ref_url="https://bugzilla.suse.com/1094154" source="BUGZILLA"/>
		<reference ref_id="1094161" ref_url="https://bugzilla.suse.com/1094161" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<description>

  
This update for glibc fixes the following issues:

- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)

Non security bugs fixed:

- Fix crash in resolver on memory allocation failure (bsc#1086690)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1086690">SUSE bug 1086690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530086" comment="glibc-profile-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530087" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81426" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1095218" ref_url="https://bugzilla.suse.com/1095218" source="BUGZILLA"/>
		<reference ref_id="1095219" ref_url="https://bugzilla.suse.com/1095219" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<description>
This update for git fixes several issues.

These security issues were fixed:

- CVE-2018-11233: Path sanity-checks on NTFS allowed attackers to read arbitrary memory (bsc#1095218)
- CVE-2018-11235: Arbitrary code execution when recursively cloning a malicious repository (bsc#1095219)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530088" comment="git-core-2.12.3-27.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81427" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1095735" ref_url="https://bugzilla.suse.com/1095735" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for kernel-firmware fixes the following issues:

This security issue was fixed:

- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
  with local user access caused by speculative execution and indirect branch
  prediction (bsc#1095735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81428" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2018-3639: cpu: add support for 'ssbd' and 'virt-ssbd' CPUID feature bits pass through (bsc#1092885)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530090" comment="libvirt-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530091" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530092" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530093" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530094" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530095" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530097" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530098" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530099" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530100" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530101" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530102" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530103" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530104" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530105" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530106" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530108" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530109" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530110" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81429" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1091836" ref_url="https://bugzilla.suse.com/1091836" source="BUGZILLA"/>
		<description>
This update for ucode-intel fixes the following issues:

Update to version 20180425 (bsc#1091836)

Fix provided for:

- GLK          B0       6-7a-1/01 0000001e-&gt;00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx

- Name microcodes which are not allowed to load late
  with a *.early suffix
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091836">SUSE bug 1091836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519666" comment="ucode-intel-20180425-13.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81430" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1087066" ref_url="https://bugzilla.suse.com/1087066" source="BUGZILLA"/>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:

These security issues were fixed:

- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For other changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087066">SUSE bug 1087066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81431" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1090023" ref_url="https://bugzilla.suse.com/1090023" source="BUGZILLA"/>
		<reference ref_id="1090024" ref_url="https://bugzilla.suse.com/1090024" source="BUGZILLA"/>
		<reference ref_id="1090025" ref_url="https://bugzilla.suse.com/1090025" source="BUGZILLA"/>
		<reference ref_id="1090026" ref_url="https://bugzilla.suse.com/1090026" source="BUGZILLA"/>
		<reference ref_id="1090027" ref_url="https://bugzilla.suse.com/1090027" source="BUGZILLA"/>
		<reference ref_id="1090028" ref_url="https://bugzilla.suse.com/1090028" source="BUGZILLA"/>
		<reference ref_id="1090029" ref_url="https://bugzilla.suse.com/1090029" source="BUGZILLA"/>
		<reference ref_id="1090030" ref_url="https://bugzilla.suse.com/1090030" source="BUGZILLA"/>
		<reference ref_id="1090032" ref_url="https://bugzilla.suse.com/1090032" source="BUGZILLA"/>
		<reference ref_id="1090033" ref_url="https://bugzilla.suse.com/1090033" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u181 fixes the following issues:

+ S8162488: JDK should be updated to use LittleCMS 2.8
+ S8180881: Better packaging of deserialization
+ S8182362: Update CipherOutputStream Usage
+ S8183032: Upgrade to LittleCMS 2.9
+ S8189123: More consistent classloading
+ S8190478: Improved interface method selection
+ S8190877: Better handling of abstract classes
+ S8191696: Better mouse positioning
+ S8192030: Better MTSchema support
+ S8193409: Improve AES supporting classes
+ S8193414: Improvements in MethodType lookups
+ S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
+ S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
+ S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
+ S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
+ S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
+ S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
+ S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
+ S8192025, CVE-2018-2814, bsc#1090032: Less referential references
+ S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
+ S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support

For additional changes please consult the changelog.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81432" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1096745" ref_url="https://bugzilla.suse.com/1096745" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<description>
This update for gpg2 fixes the following security issue:

- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
  verification actions, which allowed remote attackers to spoof the output that
  GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
  option (bsc#1096745)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519719" comment="gpg2-2.0.24-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81433" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1074562" ref_url="https://bugzilla.suse.com/1074562" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1092631" ref_url="https://bugzilla.suse.com/1092631" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for xen fixes several issues.

This feature was added:

- Added support for qemu monitor command 

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

- bsc#1086039 - Dom0 does not represent DomU cpu flags
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81434" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<description>


IBM Java was updated to version 8.0.5.15 [bsc#1093311, bsc#1085449]

Security fixes:

- CVE-2018-2826 CVE-2018-2825 CVE-2018-2814 CVE-2018-2794
  CVE-2018-2783 CVE-2018-2799 CVE-2018-2798 CVE-2018-2797
  CVE-2018-2796 CVE-2018-2795 CVE-2018-2800 CVE-2018-2790
  CVE-2018-1417

- Removed translations in the java-1_8_0-ibm-devel-32bit package
  as they conflict with those in java-1_8_0-ibm-devel.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81435" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1085449" ref_url="https://bugzilla.suse.com/1085449" source="BUGZILLA"/>
		<reference ref_id="1093311" ref_url="https://bugzilla.suse.com/1093311" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<description>


IBM Java was updated to 7.1.4.25 [bsc#1093311, bsc#1085449]:

Security fixes:

- CVE-2018-2814 CVE-2018-2794 CVE-2018-2783 CVE-2018-2799
  CVE-2018-2798 CVE-2018-2797 CVE-2018-2796 CVE-2018-2795
  CVE-2018-2800 CVE-2018-2790 CVE-2018-1417
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1085449">SUSE bug 1085449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81436" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1077445" ref_url="https://bugzilla.suse.com/1077445" source="BUGZILLA"/>
		<reference ref_id="1082063" ref_url="https://bugzilla.suse.com/1082063" source="BUGZILLA"/>
		<reference ref_id="1082210" ref_url="https://bugzilla.suse.com/1082210" source="BUGZILLA"/>
		<reference ref_id="1083417" ref_url="https://bugzilla.suse.com/1083417" source="BUGZILLA"/>
		<reference ref_id="1083420" ref_url="https://bugzilla.suse.com/1083420" source="BUGZILLA"/>
		<reference ref_id="1083422" ref_url="https://bugzilla.suse.com/1083422" source="BUGZILLA"/>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1083426" ref_url="https://bugzilla.suse.com/1083426" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
  * CVE-2016-1549: Sybil vulnerability: ephemeral association
    attack. While fixed in ntp-4.2.8p7, there are significant
    additional protections for this issue in 4.2.8p11.
  * CVE-2018-7182: ctl_getitem(): buffer read overrun
    leads to undefined behavior and information leak. (bsc#1083426)
  * CVE-2018-7170: Multiple authenticated ephemeral
    associations. (bsc#1083424)
  * CVE-2018-7184: Interleaved symmetric mode cannot
    recover from bad state. (bsc#1083422)
  * CVE-2018-7185: Unauthenticated packet can reset
    authenticated interleaved association. (bsc#1083420)
  * CVE-2018-7183: ntpq:decodearr() can write beyond its
    buffer limit.(bsc#1083417)
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update is a reissue of the previous update with LTSS channels included.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1077445">SUSE bug 1077445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082063">SUSE bug 1082063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81437" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1088681" ref_url="https://bugzilla.suse.com/1088681" source="BUGZILLA"/>
		<reference ref_id="1090518" ref_url="https://bugzilla.suse.com/1090518" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<description>


MariaDB was updated to 10.0.35 (bsc#1090518)

Notable changes:

* PCRE updated to 8.42
* XtraDB updated to 5.6.39-83.1
* TokuDB updated to 5.6.39-83.1
* InnoDB updated to 5.6.40
* The embedded server library now supports SSL when connecting
  to remote servers [bsc#1088681], [CVE-2018-2767]
* MDEV-15249 - Crash in MVCC read after IMPORT TABLESPACE
* MDEV-14988 - innodb_read_only tries to modify files if
  transactions were recovered in COMMITTED state
* MDEV-14773 - DROP TABLE hangs for InnoDB table with FULLTEXT index
* MDEV-15723 - Crash in INFORMATION_SCHEMA.INNODB_SYS_TABLES when
  accessing corrupted record
* fixes for the following security vulnerabilities:
  CVE-2018-2782, CVE-2018-2784, CVE-2018-2787, CVE-2018-2766,
  CVE-2018-2755, CVE-2018-2819, CVE-2018-2817, CVE-2018-2761,
  CVE-2018-2781, CVE-2018-2771, CVE-2018-2813
* Release notes and changelog:

    * https://kb.askmonty.org/en/mariadb-10035-release-notes
    * https://kb.askmonty.org/en/mariadb-10035-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81438" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1096449" ref_url="https://bugzilla.suse.com/1096449" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following security issue:

- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519747" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530131" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81439" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1079152" ref_url="https://bugzilla.suse.com/1079152" source="BUGZILLA"/>
		<reference ref_id="1082962" ref_url="https://bugzilla.suse.com/1082962" source="BUGZILLA"/>
		<reference ref_id="1083650" ref_url="https://bugzilla.suse.com/1083650" source="BUGZILLA"/>
		<reference ref_id="1083900" ref_url="https://bugzilla.suse.com/1083900" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1086400" ref_url="https://bugzilla.suse.com/1086400" source="BUGZILLA"/>
		<reference ref_id="1087007" ref_url="https://bugzilla.suse.com/1087007" source="BUGZILLA"/>
		<reference ref_id="1087012" ref_url="https://bugzilla.suse.com/1087012" source="BUGZILLA"/>
		<reference ref_id="1087036" ref_url="https://bugzilla.suse.com/1087036" source="BUGZILLA"/>
		<reference ref_id="1087086" ref_url="https://bugzilla.suse.com/1087086" source="BUGZILLA"/>
		<reference ref_id="1087095" ref_url="https://bugzilla.suse.com/1087095" source="BUGZILLA"/>
		<reference ref_id="1089895" ref_url="https://bugzilla.suse.com/1089895" source="BUGZILLA"/>
		<reference ref_id="1090534" ref_url="https://bugzilla.suse.com/1090534" source="BUGZILLA"/>
		<reference ref_id="1090955" ref_url="https://bugzilla.suse.com/1090955" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1092552" ref_url="https://bugzilla.suse.com/1092552" source="BUGZILLA"/>
		<reference ref_id="1092813" ref_url="https://bugzilla.suse.com/1092813" source="BUGZILLA"/>
		<reference ref_id="1092904" ref_url="https://bugzilla.suse.com/1092904" source="BUGZILLA"/>
		<reference ref_id="1094033" ref_url="https://bugzilla.suse.com/1094033" source="BUGZILLA"/>
		<reference ref_id="1094353" ref_url="https://bugzilla.suse.com/1094353" source="BUGZILLA"/>
		<reference ref_id="1094823" ref_url="https://bugzilla.suse.com/1094823" source="BUGZILLA"/>
		<reference ref_id="1095042" ref_url="https://bugzilla.suse.com/1095042" source="BUGZILLA"/>
		<reference ref_id="1096140" ref_url="https://bugzilla.suse.com/1096140" source="BUGZILLA"/>
		<reference ref_id="1096242" ref_url="https://bugzilla.suse.com/1096242" source="BUGZILLA"/>
		<reference ref_id="1096281" ref_url="https://bugzilla.suse.com/1096281" source="BUGZILLA"/>
		<reference ref_id="1096728" ref_url="https://bugzilla.suse.com/1096728" source="BUGZILLA"/>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="973378" ref_url="https://bugzilla.suse.com/973378" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305/" source="CVE"/>
		<reference ref_id="CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241/" source="CVE"/>
		<reference ref_id="CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092/" source="CVE"/>
		<reference ref_id="CVE-2018-1093" ref_url="https://www.suse.com/security/cve/CVE-2018-1093/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
  not handle unsigned integer overflow properly. As a result, a large value of
  the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
  ioctl (bsc#1096728).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
  nid, which allowed local users to cause a denial of service (race condition) or
  possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
  registers) between processes. These registers might contain encryption keys
  when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
  option that triggers a NULL value for a flush_cmd_control data structure
  (bnc#1086400)
- CVE-2017-13305: Prevent information disclosure vulnerability in
  encrypted-keys (bsc#1094353).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
  cause a denial of service (out-of-bounds read and system crash) via a crafted
  ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers
  (bsc#1087095).
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
  crc32c checksum driver, which allowed attackers to cause a denial of service
  (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
  ext4 image (bsc#1087007).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
  with a zero i_links_count, which allowed attackers to cause a denial of service
  (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
  image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
  allowed a local user to cause a denial of service by a number of certain
  crafted system calls (bsc#1092904).
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
  that contains a jump but lacks a user-defined chain, which allowed local users
  to cause a denial of service (NULL pointer dereference) by leveraging the
  CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
  handling SCTP packets length that could have been exploited to cause a kernel
  crash (bnc#1083900).
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
  __rds_rdma_map() function that allowed local attackers to cause a system panic
  and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
  (bsc#1082962).
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
  could have caused a crash and possibly memory corruption (bsc#1089895).

The following non-security bugs were fixed:

- ALSA: timer: Fix pause event notification (bsc#973378).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fix the patch content (bsc#1085185)
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079152">SUSE bug 1079152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087012">SUSE bug 1087012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087095">SUSE bug 1087095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090534">SUSE bug 1090534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090955">SUSE bug 1090955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092552">SUSE bug 1092552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092813">SUSE bug 1092813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094033">SUSE bug 1094033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094823">SUSE bug 1094823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095042">SUSE bug 1095042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096140">SUSE bug 1096140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096242">SUSE bug 1096242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096281">SUSE bug 1096281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973378">SUSE bug 973378</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1093/">CVE-2018-1093</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81440" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097158" ref_url="https://bugzilla.suse.com/1097158" source="BUGZILLA"/>
		<reference ref_id="1097624" ref_url="https://bugzilla.suse.com/1097624" source="BUGZILLA"/>
		<reference ref_id="1098592" ref_url="https://bugzilla.suse.com/1098592" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
  ciphersuite a malicious server could have sent a very large prime value to the
  client. This caused the client to spend an unreasonably long period of time
  generating a key for this prime resulting in a hang until the client has
  finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097624">SUSE bug 1097624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098592">SUSE bug 1098592</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519760" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519761" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519762" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530140" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530141" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519763" comment="openssl-1.0.2j-60.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81441" version="1" class="patch">
	<metadata>
		<title>Recommended update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1096141" ref_url="https://bugzilla.suse.com/1096141" source="BUGZILLA"/>
		<reference ref_id="1100147" ref_url="https://bugzilla.suse.com/1100147" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<description>


The Intel CPU microcode bundle was updated to the 20180703 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)
and helps mitigating CVE-2018-3639 (Spectre v4)  (bsc#1100147 bsc#1087082 bsc#1087083).

More information on:
  https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File

Following chipsets are fixed in this round:

Model        Stepping F-MO-S/PI      Old-&gt;New

---- updated platforms ------------------------------------

SNB-EP       C1       6-2d-6/6d 0000061c-&gt;0000061d Xeon E5
SNB-EP       C2       6-2d-7/6d 00000713-&gt;00000714 Xeon E5
IVT          C0       6-3e-4/ed 0000042c-&gt;0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K
IVT          D1       6-3e-7/ed 00000713-&gt;00000714 Xeon E5 v2
HSX-E/EP/4S  C0       6-3f-2/6f 0000003c-&gt;0000003d Xeon E5 v3
HSX-EX       E0       6-3f-4/80 00000011-&gt;00000012 Xeon E7 v3
SKX-SP/D/W/X H0       6-55-4/b7 02000043-&gt;0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX
BDX-DE       A1       6-56-5/10 0e000009-&gt;0e00000a Xeon D-15x3N
BDX-ML       B/M/R0   6-4f-1/ef 0b00002c-&gt;0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx

- Add a new style supplements for the recent kernels. (bsc#1096141)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096141">SUSE bug 1096141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100147">SUSE bug 1100147</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519785" comment="ucode-intel-20180703-13.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81442" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1068565" ref_url="https://bugzilla.suse.com/1068565" source="BUGZILLA"/>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1082234" ref_url="https://bugzilla.suse.com/1082234" source="BUGZILLA"/>
		<reference ref_id="1096718" ref_url="https://bugzilla.suse.com/1096718" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797/" source="CVE"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

These security issue were fixed: 

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
  directory-traversal protection mechanism and overwrite arbitrary files
  (bsc#1096718)

This non-security issue was fixed: 

- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068565">SUSE bug 1068565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81443" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1099310" ref_url="https://bugzilla.suse.com/1099310" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252/" source="CVE"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519796" comment="shadow-4.2.1-27.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81444" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1087289" ref_url="https://bugzilla.suse.com/1087289" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1095242" ref_url="https://bugzilla.suse.com/1095242" source="BUGZILLA"/>
		<reference ref_id="1096224" ref_url="https://bugzilla.suse.com/1096224" source="BUGZILLA"/>
		<reference ref_id="1097521" ref_url="https://bugzilla.suse.com/1097521" source="BUGZILLA"/>
		<reference ref_id="1097522" ref_url="https://bugzilla.suse.com/1097522" source="BUGZILLA"/>
		<reference ref_id="1097523" ref_url="https://bugzilla.suse.com/1097523" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2018-12891: Fix preemption checks bypass in x86 PV MM handling (XSA-264) (bsc#1097521).
- CVE-2018-12892: Fix libxl failure to honour readonly flag on HVM emulated SCSI disks (XSA-266) (bsc#1097523).
- CVE-2018-12893: Fix #DB exception safety check that could be triggered by a guest (XSA-265) (bsc#1097522).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-3665: Fix lazy FP Save/Restore (XSA-267) (bsc#1095242).

Bug fixes:

- bsc#1027519: Update to Xen 4.7.6 bug fix only release.
- bsc#1087289: Xen BUG at sched_credit.c:1663.
- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087289">SUSE bug 1087289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81445" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1054849" ref_url="https://bugzilla.suse.com/1054849" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The following security vulnerability was fixed:

- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

The following other bugs were fixed:

- Fix libnss_wins.so.2 link libreplace with rpath (bsc#1054849)		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054849">SUSE bug 1054849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530149" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530150" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530151" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530152" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530153" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530154" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530155" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530156" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530157" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530158" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530159" comment="libndr0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530160" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530161" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530162" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530163" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530164" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530165" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530166" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530167" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530168" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530169" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530170" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530171" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530172" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530173" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530174" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530175" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530176" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530177" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530178" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530179" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530180" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530181" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530182" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530183" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530184" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530185" comment="samba-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530186" comment="samba-client-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530187" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530189" comment="samba-libs-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530190" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530191" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530192" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81446" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1098998" ref_url="https://bugzilla.suse.com/1098998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<description>
This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81447" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1082858" ref_url="https://bugzilla.suse.com/1082858" source="BUGZILLA"/>
		<reference ref_id="1101410" ref_url="https://bugzilla.suse.com/1101410" source="BUGZILLA"/>
		<reference ref_id="1101412" ref_url="https://bugzilla.suse.com/1101412" source="BUGZILLA"/>
		<reference ref_id="1101654" ref_url="https://bugzilla.suse.com/1101654" source="BUGZILLA"/>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<description>
This update for clamav to version 0.100.1 fixes the following issues:
  
The following security vulnerabilities were addressed:
  
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability (bsc#1101410)
- CVE-2018-0361: PDF object length check, unreasonably long time to parse relatively small file (bsc#1101412)
- CVE-2018-1000085: Fixed a out-of-bounds heap read in XAR parser (bsc#1082858)
- CVE-2018-14679: Libmspack heap buffer over-read in CHM parser (bsc#1103040)
- Buffer over-read in unRAR code due to missing max value checks in table initialization
- PDF parser bugs

The following other changes were made:

- Disable YARA support for licensing reasons (bsc#1101654).
- Add HTTPS support for clamsubmit
- Fix for DNS resolution for users on IPv4-only machines where IPv6 is not
  available or is link-local only
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101654">SUSE bug 1101654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81448" version="1" class="patch">
	<metadata>
		<title>Security update to ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087083" ref_url="https://bugzilla.suse.com/1087083" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1104134" ref_url="https://bugzilla.suse.com/1104134" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>

ucode-intel was updated to the 20180807 release.

For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)

 Processor             Identifier     Version       Products

 Model        Stepping F-MO-S/PI      Old-&gt;New

 ---- new platforms ----------------------------------------
 WSM-EP/WS    U1       6-2c-2/03           0000001f Xeon E/L/X56xx, W36xx
 NHM-EX       D0       6-2e-6/04           0000000d Xeon E/L/X65xx/75xx
 BXT          C0       6-5c-2/01           00000014 Atom T5500/5700
 APL          E0       6-5c-a/03           0000000c Atom x5-E39xx
 DVN          B0       6-5f-1/01           00000024 Atom C3xxx
 ---- updated platforms ------------------------------------
 NHM-EP/WS    D0       6-1a-5/03 00000019-&gt;0000001d Xeon E/L/X/W55xx
 NHM          B1       6-1e-5/13 00000007-&gt;0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
 WSM          B1       6-25-2/12 0000000e-&gt;00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
 WSM          K0       6-25-5/92 00000004-&gt;00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
 SNB          D2       6-2a-7/12 0000002d-&gt;0000002e Core Gen2; Xeon E3
 WSM-EX       A2       6-2f-2/05 00000037-&gt;0000003b Xeon E7
 IVB          E2       6-3a-9/12 0000001f-&gt;00000020 Core Gen3 Mobile
 HSW-H/S/E3   Cx/Dx    6-3c-3/32 00000024-&gt;00000025 Core Gen4 Desktop; Xeon E3 v3
 BDW-U/Y      E/F      6-3d-4/c0 0000002a-&gt;0000002b Core Gen5 Mobile
 HSW-ULT      Cx/Dx    6-45-1/72 00000023-&gt;00000024 Core Gen4 Mobile and derived Pentium/Celeron
 HSW-H        Cx       6-46-1/32 00000019-&gt;0000001a Core Extreme i7-5xxxX
 BDW-H/E3     E/G      6-47-1/22 0000001d-&gt;0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
 SKL-U/Y      D0       6-4e-3/c0 000000c2-&gt;000000c6 Core Gen6 Mobile
 BDX-DE       V1       6-56-2/10 00000015-&gt;00000017 Xeon D-1520/40
 BDX-DE       V2/3     6-56-3/10 07000012-&gt;07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
 BDX-DE       Y0       6-56-4/10 0f000011-&gt;0f000012 Xeon D-1557/59/67/71/77/81/87
 APL          D0       6-5c-9/03 0000002c-&gt;00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
 SKL-H/S/E3   R0       6-5e-3/36 000000c2-&gt;000000c6 Core Gen6; Xeon E3 v5
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104134">SUSE bug 1104134</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81449" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1081741" ref_url="https://bugzilla.suse.com/1081741" source="BUGZILLA"/>
		<reference ref_id="1103411" ref_url="https://bugzilla.suse.com/1103411" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

The following security issues were fixed:

- CVE-2018-1050: Fixed denial of service vulnerability when SPOOLSS is run externally (bsc#1081741). 
- CVE-2018-10858: smbc_urlencode helper function is a subject to buffer overflow (bsc#1103411)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530194" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81450" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1076110" ref_url="https://bugzilla.suse.com/1076110" source="BUGZILLA"/>
		<reference ref_id="1083635" ref_url="https://bugzilla.suse.com/1083635" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1086652" ref_url="https://bugzilla.suse.com/1086652" source="BUGZILLA"/>
		<reference ref_id="1087081" ref_url="https://bugzilla.suse.com/1087081" source="BUGZILLA"/>
		<reference ref_id="1089343" ref_url="https://bugzilla.suse.com/1089343" source="BUGZILLA"/>
		<reference ref_id="1090123" ref_url="https://bugzilla.suse.com/1090123" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1094248" ref_url="https://bugzilla.suse.com/1094248" source="BUGZILLA"/>
		<reference ref_id="1096130" ref_url="https://bugzilla.suse.com/1096130" source="BUGZILLA"/>
		<reference ref_id="1096480" ref_url="https://bugzilla.suse.com/1096480" source="BUGZILLA"/>
		<reference ref_id="1096978" ref_url="https://bugzilla.suse.com/1096978" source="BUGZILLA"/>
		<reference ref_id="1097140" ref_url="https://bugzilla.suse.com/1097140" source="BUGZILLA"/>
		<reference ref_id="1097551" ref_url="https://bugzilla.suse.com/1097551" source="BUGZILLA"/>
		<reference ref_id="1098016" ref_url="https://bugzilla.suse.com/1098016" source="BUGZILLA"/>
		<reference ref_id="1098425" ref_url="https://bugzilla.suse.com/1098425" source="BUGZILLA"/>
		<reference ref_id="1098435" ref_url="https://bugzilla.suse.com/1098435" source="BUGZILLA"/>
		<reference ref_id="1099924" ref_url="https://bugzilla.suse.com/1099924" source="BUGZILLA"/>
		<reference ref_id="1100089" ref_url="https://bugzilla.suse.com/1100089" source="BUGZILLA"/>
		<reference ref_id="1100416" ref_url="https://bugzilla.suse.com/1100416" source="BUGZILLA"/>
		<reference ref_id="1100418" ref_url="https://bugzilla.suse.com/1100418" source="BUGZILLA"/>
		<reference ref_id="1100491" ref_url="https://bugzilla.suse.com/1100491" source="BUGZILLA"/>
		<reference ref_id="1101557" ref_url="https://bugzilla.suse.com/1101557" source="BUGZILLA"/>
		<reference ref_id="1102340" ref_url="https://bugzilla.suse.com/1102340" source="BUGZILLA"/>
		<reference ref_id="1102851" ref_url="https://bugzilla.suse.com/1102851" source="BUGZILLA"/>
		<reference ref_id="1103097" ref_url="https://bugzilla.suse.com/1103097" source="BUGZILLA"/>
		<reference ref_id="1103119" ref_url="https://bugzilla.suse.com/1103119" source="BUGZILLA"/>
		<reference ref_id="1103580" ref_url="https://bugzilla.suse.com/1103580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).

The following non-security bugs were fixed:

- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev-&gt;count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc-&gt;writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc-&gt;io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc-&gt;writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand-&gt;siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076110">SUSE bug 1076110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083635">SUSE bug 1083635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086652">SUSE bug 1086652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090123">SUSE bug 1090123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094248">SUSE bug 1094248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096130">SUSE bug 1096130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096978">SUSE bug 1096978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097140">SUSE bug 1097140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097551">SUSE bug 1097551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098425">SUSE bug 1098425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098435">SUSE bug 1098435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100089">SUSE bug 1100089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101557">SUSE bug 1101557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81451" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1091107" ref_url="https://bugzilla.suse.com/1091107" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<description>
This update for xen fixes the following security issues:

- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
  and address translations may have allowed unauthorized disclosure of
  information residing in the L1 data cache to an attacker with local user access
  with guest OS privilege via a terminal page fault and a side-channel analysis
  (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
  buggy guest administrator can lock up the entire host (bsc#1103276)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81452" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1076957" ref_url="https://bugzilla.suse.com/1076957" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2016-10708: Prevent DoS due to crashes caused by out-of-sequence NEWKEYS message (bsc#1076957).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530211" comment="openssh-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530212" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530213" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530214" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81453" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1079869" ref_url="https://bugzilla.suse.com/1079869" source="BUGZILLA"/>
		<reference ref_id="1091427" ref_url="https://bugzilla.suse.com/1091427" source="BUGZILLA"/>
		<reference ref_id="1094325" ref_url="https://bugzilla.suse.com/1094325" source="BUGZILLA"/>
		<reference ref_id="1094725" ref_url="https://bugzilla.suse.com/1094725" source="BUGZILLA"/>
		<reference ref_id="1100112" ref_url="https://bugzilla.suse.com/1100112" source="BUGZILLA"/>
		<reference ref_id="959329" ref_url="https://bugzilla.suse.com/959329" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

This new feature was added:

- bsc#1094325, bsc#1094725: libxl: Enable virsh blockresize for XEN guests

This security issue was fixed:

- CVE-2017-5715: Additional fixes for the Spectre patches (bsc#1079869)

These non-security issues were fixed:

- bsc#1100112: schema: allow any strings in smbios entry qemu: escape smbios entry strings 
- bsc#1091427: libxl: fix segfault in libxlReconnectDomain 
- bsc#959329: libxl: don't set hasManagedSave when performing save 
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1079869">SUSE bug 1079869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091427">SUSE bug 1091427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094325">SUSE bug 1094325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094725">SUSE bug 1094725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100112">SUSE bug 1100112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959329">SUSE bug 959329</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530215" comment="libvirt-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530216" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530217" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530218" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530219" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530220" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530222" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530223" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530224" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530225" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530226" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530227" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530228" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530229" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530230" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530231" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530233" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530234" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530235" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81454" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1082828" ref_url="https://bugzilla.suse.com/1082828" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issue fixed:

- CVE-2017-15130: Fixed a potential denial of service via TLS SNI config
  lookups, which would slow the process down and could have led to exhaustive
  memory allocation and/or process restarts (bsc#1082828)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530236" comment="dovecot22-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530237" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530238" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530239" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81455" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Security issues fixed:
  
- CVE-2018-1517: Fixed a flaw in the java.math component in IBM SDK, which may
  allow an attacker to inflict a denial-of-service attack with specially
  crafted String data.
- CVE-2018-1656: Protect against path traversal attacks when extracting
  compressed dump files.
- CVE-2018-2940: Fixed an easily exploitable vulnerability in the libraries
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to
  unauthorized read access.
- CVE-2018-2952: Fixed an easily exploitable vulnerability in the concurrency
  subcomponent, which allowed unauthenticated attackers with network access
  via multiple protocols to compromise the Java SE, leading to denial of
  service.
- CVE-2018-2973: Fixed a difficult to exploit vulnerability in the JSSE
  subcomponent, which allowed unauthenticated attackers with network access
  via SSL/TLS to compromise the Java SE, leading to unauthorized creation,
  deletion or modification access to critical data.
- CVE-2018-12539: Fixed a vulnerability in which users other than the process
  owner may be able to use Java Attach API to connect to the IBM JVM on the
  same machine and use Attach API operations, including the ability to execute
  untrusted arbitrary code.

Other changes made:

- Various JIT/JVM crash fixes
- Version update to 7.1.4.30 (bsc#1104668)

You can find detailed information about this update [here](https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_August_2018).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81456" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1036304" ref_url="https://bugzilla.suse.com/1036304" source="BUGZILLA"/>
		<reference ref_id="1045735" ref_url="https://bugzilla.suse.com/1045735" source="BUGZILLA"/>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1070851" ref_url="https://bugzilla.suse.com/1070851" source="BUGZILLA"/>
		<reference ref_id="1076192" ref_url="https://bugzilla.suse.com/1076192" source="BUGZILLA"/>
		<reference ref_id="1079334" ref_url="https://bugzilla.suse.com/1079334" source="BUGZILLA"/>
		<reference ref_id="1088705" ref_url="https://bugzilla.suse.com/1088705" source="BUGZILLA"/>
		<reference ref_id="1091624" ref_url="https://bugzilla.suse.com/1091624" source="BUGZILLA"/>
		<reference ref_id="1092413" ref_url="https://bugzilla.suse.com/1092413" source="BUGZILLA"/>
		<reference ref_id="1096803" ref_url="https://bugzilla.suse.com/1096803" source="BUGZILLA"/>
		<reference ref_id="1099847" ref_url="https://bugzilla.suse.com/1099847" source="BUGZILLA"/>
		<reference ref_id="1100028" ref_url="https://bugzilla.suse.com/1100028" source="BUGZILLA"/>
		<reference ref_id="1101349" ref_url="https://bugzilla.suse.com/1101349" source="BUGZILLA"/>
		<reference ref_id="1102429" ref_url="https://bugzilla.suse.com/1102429" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<description>
This update for libzypp, zypper provides the following fixes:

Update libzypp to version 16.17.20

Security issues fixed:

- PackageProvider: Validate delta rpms before caching (bsc#1091624,
  bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
  caching (bsc#1091624, bsc#1088705, CVE-2018-7685)

Other bugs fixed:

- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
  pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
  been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)

Update to zypper to version 1.13.45

Security issue fixed:
- Improve signature check callback messages
  (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
  (bsc#1045735, CVE-2017-9269)

Other bugs fixed:

- XML &lt;install-summary&gt; attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
  not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- do not recommend cron (bsc#1079334)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1036304">SUSE bug 1036304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070851">SUSE bug 1070851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076192">SUSE bug 1076192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079334">SUSE bug 1079334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092413">SUSE bug 1092413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096803">SUSE bug 1096803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099847">SUSE bug 1099847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100028">SUSE bug 1100028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101349">SUSE bug 1101349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102429">SUSE bug 1102429</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530245" comment="libzypp-16.17.20-27.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530246" comment="zypper-1.13.45-18.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81457" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520063" comment="openslp-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520064" comment="openslp-32bit-2.0.0-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530248" comment="openslp-server-2.0.0-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81458" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1016715" ref_url="https://bugzilla.suse.com/1016715" source="BUGZILLA"/>
		<reference ref_id="1104826" ref_url="https://bugzilla.suse.com/1104826" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530249" comment="apache2-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530251" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530252" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530253" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530254" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81459" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1047002" ref_url="https://bugzilla.suse.com/1047002" source="BUGZILLA"/>
		<reference ref_id="1105437" ref_url="https://bugzilla.suse.com/1105437" source="BUGZILLA"/>
		<reference ref_id="1105459" ref_url="https://bugzilla.suse.com/1105459" source="BUGZILLA"/>
		<reference ref_id="1105460" ref_url="https://bugzilla.suse.com/1105460" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This update for gnutls fixes the following issues:

This update for gnutls fixes the following issues:

Security issues fixed:

- Improved mitigations against Lucky 13 class of attacks
- 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
- HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
- HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530255" comment="gnutls-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530256" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530257" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530258" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81460" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104668" ref_url="https://bugzilla.suse.com/1104668" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm to 8.0.5.20 fixes the following security issues:

- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1104668)
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1104668)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1104668)
- CVE-2018-2964: Vulnerability in subcomponent: Deployment. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE. Successful attacks require human
  interaction from a person other than the attacker. Successful attacks of this
  vulnerability can result in takeover of Java SE. (bsc#1104668)
- CVE-2016-0705: Prevent double free in the dsa_priv_decode function that
  allowed remote attackers to cause a denial of service (memory corruption) or
  possibly have unspecified other impact via a malformed DSA private key
  (bsc#1104668)
- CVE-2017-3732: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2017-3736: Prevent carry propagating bug in the x86_64 Montgomery
  squaring procedure (bsc#1104668)
- CVE-2018-1517: Unspecified vulnerability (bsc#1104668)
- CVE-2018-1656: Unspecified vulnerability (bsc#1104668)
- CVE-2018-12539: Users other than the process owner might have been able to
  use Java Attach API to connect to an IBM JVM on the same machine and use Attach
  API operations, which includes the ability to execute untrusted native code
  (bsc#1104668)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104668">SUSE bug 1104668</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81461" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1094301" ref_url="https://bugzilla.suse.com/1094301" source="BUGZILLA"/>
		<reference ref_id="1101776" ref_url="https://bugzilla.suse.com/1101776" source="BUGZILLA"/>
		<reference ref_id="1101777" ref_url="https://bugzilla.suse.com/1101777" source="BUGZILLA"/>
		<reference ref_id="1101786" ref_url="https://bugzilla.suse.com/1101786" source="BUGZILLA"/>
		<reference ref_id="1101788" ref_url="https://bugzilla.suse.com/1101788" source="BUGZILLA"/>
		<reference ref_id="1101791" ref_url="https://bugzilla.suse.com/1101791" source="BUGZILLA"/>
		<reference ref_id="1101794" ref_url="https://bugzilla.suse.com/1101794" source="BUGZILLA"/>
		<reference ref_id="1101800" ref_url="https://bugzilla.suse.com/1101800" source="BUGZILLA"/>
		<reference ref_id="1101802" ref_url="https://bugzilla.suse.com/1101802" source="BUGZILLA"/>
		<reference ref_id="1101804" ref_url="https://bugzilla.suse.com/1101804" source="BUGZILLA"/>
		<reference ref_id="1101810" ref_url="https://bugzilla.suse.com/1101810" source="BUGZILLA"/>
		<reference ref_id="1106514" ref_url="https://bugzilla.suse.com/1106514" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<description>
This update for wireshark to version 2.4.9 fixes the following issues:

Wireshark was updated to 2.4.9 (bsc#1094301, bsc#1106514).

Security issues fixed:

- CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44)
- CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45)
- CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46)
- CVE-2018-11355: Fix RTCP dissector crash (bsc#1094301).
- CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, bsc#1101802)
- CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, bsc#1101794)
- CVE-2018-11362: Fix LDSS dissector crash (bsc#1094301).
- CVE-2018-11361: Fix IEEE 802.11 dissector crash (bsc#1094301).
- CVE-2018-11360: Fix GSM A DTAP dissector crash (bsc#1094301).
- CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, bsc#1101777)
- CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, bsc#1101786)
- CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, bsc#1101804)
- CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, bsc#1101776)
- CVE-2018-11358: Fix Q.931 dissector crash (bsc#1094301).
- CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, bsc#1101788)
- CVE-2018-11359: Fix multiple dissectors crashs (bsc#1094301).
- CVE-2018-11356: Fix DNS dissector crash (bsc#1094301).
- CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, bsc#1101810)
- CVE-2018-11357: Fix multiple dissectors that could consume excessive memory (bsc#1094301).
- CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, bsc#1101791)
- CVE-2018-11354: Fix IEEE 1905.1a dissector crash (bsc#1094301).
- CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, bsc#1101800)

Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81462" version="1" class="patch">
	<metadata>
		<title>Security update for smt, yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1006984" ref_url="https://bugzilla.suse.com/1006984" source="BUGZILLA"/>
		<reference ref_id="1006989" ref_url="https://bugzilla.suse.com/1006989" source="BUGZILLA"/>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="1097824" ref_url="https://bugzilla.suse.com/1097824" source="BUGZILLA"/>
		<reference ref_id="1103809" ref_url="https://bugzilla.suse.com/1103809" source="BUGZILLA"/>
		<reference ref_id="1103810" ref_url="https://bugzilla.suse.com/1103810" source="BUGZILLA"/>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470/" source="CVE"/>
		<reference ref_id="CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471/" source="CVE"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<description>
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:

These security issues were fixed in SMT:

- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing
  modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote
  attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further
  attacks on SMT (bsc#1104076).

SUSE would like to thank Jake Miller for reporting these issues to us.

These non-security issues were fixed in SMT:

- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)

This non-security issue was fixed in yast2-smt:

- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in
  the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1006984">SUSE bug 1006984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006989">SUSE bug 1006989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097824">SUSE bug 1097824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530263" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530264" comment="smt-3.0.37-52.23.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530265" comment="smt-support-3.0.37-52.23.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81463" version="1" class="patch">
	<metadata>
		<title>Security update for yast2-smt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1037811" ref_url="https://bugzilla.suse.com/1037811" source="BUGZILLA"/>
		<reference ref_id="1097560" ref_url="https://bugzilla.suse.com/1097560" source="BUGZILLA"/>
		<reference ref_id="977043" ref_url="https://bugzilla.suse.com/977043" source="BUGZILLA"/>
		<description>
This update fixes the following issues in yast2-smt:

- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Added missing translation marks (bsc#1037811)
- Remove cron job rescheduling (bsc#1097560)

This update is a requirement for the security update for SMT. Because of that it is
tagged as security to ensure that all users, even those that only install security updates,
install it.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037811">SUSE bug 1037811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097560">SUSE bug 1097560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977043">SUSE bug 977043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530266" comment="yast2-smt-3.0.14-17.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81464" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1089039" ref_url="https://bugzilla.suse.com/1089039" source="BUGZILLA"/>
		<reference ref_id="1101246" ref_url="https://bugzilla.suse.com/1101246" source="BUGZILLA"/>
		<reference ref_id="1101470" ref_url="https://bugzilla.suse.com/1101470" source="BUGZILLA"/>
		<reference ref_id="1104789" ref_url="https://bugzilla.suse.com/1104789" source="BUGZILLA"/>
		<reference ref_id="1106197" ref_url="https://bugzilla.suse.com/1106197" source="BUGZILLA"/>
		<reference ref_id="997043" ref_url="https://bugzilla.suse.com/997043" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

These security issues were fixed:

- Prevent One&amp;Done side-channel attack on RSA that allowed physically near
  attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
  vulnerable to a cache timing side channel attack. An attacker with sufficient
  access to mount cache timing attacks during the RSA key generation process
  could have recovered the private key (bsc#1089039)

These non-security issues were fixed:

- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
  bsc#997043)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101246">SUSE bug 1101246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101470">SUSE bug 1101470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104789">SUSE bug 1104789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106197">SUSE bug 1106197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997043">SUSE bug 997043</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520119" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520120" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520121" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530267" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530268" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520122" comment="openssl-1.0.2j-60.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81465" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="1096223" ref_url="https://bugzilla.suse.com/1096223" source="BUGZILLA"/>
		<reference ref_id="1098735" ref_url="https://bugzilla.suse.com/1098735" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for qemu fixes the following security issues:

- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have
  been exploited by sending a crafted QMP command (including guest-file-read with
  a large count value) to the agent via the listening socket causing DoS (bsc#1098735)
- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented
  datagrams (bsc#1096223)

With this release the mitigations for Spectre v4 are moved the the patches from
upstream (CVE-2018-3639, bsc#1092885).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530270" comment="qemu-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530271" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530273" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530274" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530276" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530277" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530280" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81466" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1106171" ref_url="https://bugzilla.suse.com/1106171" source="BUGZILLA"/>
		<reference ref_id="1106172" ref_url="https://bugzilla.suse.com/1106172" source="BUGZILLA"/>
		<reference ref_id="1106173" ref_url="https://bugzilla.suse.com/1106173" source="BUGZILLA"/>
		<reference ref_id="1106195" ref_url="https://bugzilla.suse.com/1106195" source="BUGZILLA"/>
		<reference ref_id="1107410" ref_url="https://bugzilla.suse.com/1107410" source="BUGZILLA"/>
		<reference ref_id="1107411" ref_url="https://bugzilla.suse.com/1107411" source="BUGZILLA"/>
		<reference ref_id="1107412" ref_url="https://bugzilla.suse.com/1107412" source="BUGZILLA"/>
		<reference ref_id="1107413" ref_url="https://bugzilla.suse.com/1107413" source="BUGZILLA"/>
		<reference ref_id="1107420" ref_url="https://bugzilla.suse.com/1107420" source="BUGZILLA"/>
		<reference ref_id="1107421" ref_url="https://bugzilla.suse.com/1107421" source="BUGZILLA"/>
		<reference ref_id="1107422" ref_url="https://bugzilla.suse.com/1107422" source="BUGZILLA"/>
		<reference ref_id="1107423" ref_url="https://bugzilla.suse.com/1107423" source="BUGZILLA"/>
		<reference ref_id="1107426" ref_url="https://bugzilla.suse.com/1107426" source="BUGZILLA"/>
		<reference ref_id="1107581" ref_url="https://bugzilla.suse.com/1107581" source="BUGZILLA"/>
		<reference ref_id="1108027" ref_url="https://bugzilla.suse.com/1108027" source="BUGZILLA"/>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<description>
This update for ghostscript to version 9.25 fixes the following issues:

These security issues were fixed:

- CVE-2018-17183: Remote attackers were be able to supply crafted PostScript to
  potentially overwrite or replace error handlers to inject code (bsc#1109105)
- CVE-2018-15909: Prevent type confusion using the .shfill operator that could
  have been used by attackers able to supply crafted PostScript files to crash
  the interpreter or potentially execute code (bsc#1106172).
- CVE-2018-15908: Prevent attackers that are able to supply malicious
  PostScript files to bypass .tempfile restrictions and write files
  (bsc#1106171).
- CVE-2018-15910: Prevent a type confusion in the LockDistillerParams parameter
  that could have been used to crash the interpreter or execute code
  (bsc#1106173).
- CVE-2018-15911: Prevent use uninitialized memory access in the aesdecode
  operator that could have been used to crash the interpreter or potentially
  execute code (bsc#1106195).
- CVE-2018-16513: Prevent a type confusion in the setcolor function that could
  have been used to crash the interpreter or possibly have unspecified other
  impact (bsc#1107412).
- CVE-2018-16509: Incorrect 'restoration of privilege' checking during handling
  of /invalidaccess exceptions could be have been used by attackers able to
  supply crafted PostScript to execute code using the 'pipe' instruction
  (bsc#1107410).
- CVE-2018-16510: Incorrect exec stack handling in the 'CS' and 'SC' PDF
  primitives could have been used by remote attackers able to supply crafted PDFs
  to crash the interpreter or possibly have unspecified other impact
  (bsc#1107411).
- CVE-2018-16542: Prevent attackers able to supply crafted PostScript files
  from using insufficient interpreter stack-size checking during error handling
  to crash the interpreter (bsc#1107413).
- CVE-2018-16541: Prevent attackers able to supply crafted PostScript files
  from using incorrect free logic in pagedevice replacement to crash the
  interpreter (bsc#1107421).
- CVE-2018-16540: Prevent use-after-free in copydevice handling that could have
  been used to crash the interpreter or possibly have unspecified other impact
  (bsc#1107420).
- CVE-2018-16539: Prevent attackers able to supply crafted PostScript files
  from using incorrect access checking in temp file handling to disclose contents
  of files on the system otherwise not readable (bsc#1107422).
- CVE-2018-16543: gssetresolution and gsgetresolution allowed attackers to have
  an unspecified impact (bsc#1107423).
- CVE-2018-16511: A type confusion in 'ztype' could have been used by remote
  attackers able to supply crafted PostScript to crash the interpreter or
  possibly have unspecified other impact (bsc#1107426).
- CVE-2018-16585: The .setdistillerkeys PostScript command was accepted even
  though it is not intended for use during document processing (e.g., after the
  startup phase). This lead to memory corruption, allowing remote attackers able
  to supply crafted PostScript to crash the interpreter or possibly have
  unspecified other impact (bsc#1107581).
- CVE-2018-16802: Incorrect 'restoration of privilege' checking when running
  out of stack during exception handling could have been used by attackers able
  to supply crafted PostScript to execute code using the 'pipe' instruction. This
  is due to an incomplete fix for CVE-2018-16509 (bsc#1108027).

These non-security issues were fixed:

* Fixes problems with argument handling, some unintended results of the
  security fixes to the SAFER file access restrictions (specifically accessing
  ICC profile files).
* Avoid that ps2epsi fails with 'Error: /undefined in --setpagedevice--'

For additional changes please check http://www.ghostscript.com/doc/9.25/News.htm
and the changes file of the package.
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81467" version="1" class="patch">
	<metadata>
		<title>Security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1090638" ref_url="https://bugzilla.suse.com/1090638" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This update for openslp fixes the following issues:

- CVE-2017-17833: Prevent heap-related memory corruption issue which may have
  manifested itself as a denial-of-service or a remote code-execution
  vulnerability (bsc#1090638)
- Prevent out of bounds reads in message parsing
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520128" comment="openslp-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520129" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530283" comment="openslp-server-2.0.0-18.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81468" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1106812" ref_url="https://bugzilla.suse.com/1106812" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:

These security issues were fixed:

- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated
  attacker with network access via multiple protocols to compromise Java SE.
  Successful attacks of this vulnerability can result in takeover of Java SE
  (bsc#1101644).
- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable
  vulnerability allowed unauthenticated attacker with network access via multiple
  protocols to compromise Java SE, Java SE Embedded. Successful attacks require
  human interaction from a person other than the attacker. Successful attacks of
  this vulnerability can result in unauthorized read access to a subset of Java
  SE, Java SE Embedded accessible data (bsc#1101645)
- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to
  exploit vulnerability allowed unauthenticated attacker with network access via
  multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit
  (bsc#1101651)
- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit
  vulnerability allowed unauthenticated attacker with network access via SSL/TLS
  to compromise Java SE, Java SE Embedded. Successful attacks of this
  vulnerability can result in unauthorized creation, deletion or modification
  access to critical data or all Java SE, Java SE Embedded accessible data
  (bsc#1101656)

These non-security issues were fixed:

- Improve desktop file usage
- Better Internet address support
- speculative traps break when classes are redefined
- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently
- Clean up code that saves the previous versions of redefined classes
- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links
- RedefineClasses() tests fail assert(((Metadata*)obj)-&gt;is_valid()) failed: obj is valid
- NMT is not enabled if NMT option is specified after class path specifiers
- EndEntityChecker should not process custom extensions after PKIX validation
- SupportedDSAParamGen.java failed with timeout
- Montgomery multiply intrinsic should use correct name
- When determining the ciphersuite lists, there is no debug output for disabled suites.
- sun/security/mscapi/SignedObjectChain.java fails on Windows
- On Windows Swing changes keyboard layout on a window activation
- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj
- Even better Internet address support
- Newlines in JAXB string values of SOAP-requests are escaped to '&amp;#xa;'
- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException
- Unable to use JDWP API in JDK 8 to debug JDK 9 VM
- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3
- Performance drop with Java JDK 1.8.0_162-b32
- Upgrade time-zone data to tzdata2018d
- Fix potential crash in BufImg_SetupICM
- JDK 8u181 l10n resource file update
- Remove debug print statements from RMI fix
- (tz) Upgrade time-zone data to tzdata2018e
- ObjectInputStream filterCheck method throws NullPointerException
- adjust reflective access checks
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106812">SUSE bug 1106812</bugzilla>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81469" version="1" class="patch">
	<metadata>
		<title>Security update for qpdf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1040311" ref_url="https://bugzilla.suse.com/1040311" source="BUGZILLA"/>
		<reference ref_id="1040312" ref_url="https://bugzilla.suse.com/1040312" source="BUGZILLA"/>
		<reference ref_id="1040313" ref_url="https://bugzilla.suse.com/1040313" source="BUGZILLA"/>
		<reference ref_id="1050577" ref_url="https://bugzilla.suse.com/1050577" source="BUGZILLA"/>
		<reference ref_id="1050578" ref_url="https://bugzilla.suse.com/1050578" source="BUGZILLA"/>
		<reference ref_id="1050579" ref_url="https://bugzilla.suse.com/1050579" source="BUGZILLA"/>
		<reference ref_id="1050581" ref_url="https://bugzilla.suse.com/1050581" source="BUGZILLA"/>
		<reference ref_id="1055960" ref_url="https://bugzilla.suse.com/1055960" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<description>

  
This update for qpdf fixes the following issues:

qpdf was updated to 7.1.1.

Security issues fixed:

- CVE-2017-11627: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050577).
- CVE-2017-11625: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050579).
- CVE-2017-11626: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050578).
- CVE-2017-11624: A stack-consumption vulnerability which allows attackers to cause DoS (bsc#1050581).
- CVE-2017-12595: Stack overflow when processing deeply nested arrays and dictionaries (bsc#1055960).
- CVE-2017-9209: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040312).
- CVE-2017-9210: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040313).
- CVE-2017-9208: Remote attackers can cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document (bsc#1040311).

  * Check release notes for detailed bug fixes.
  * http://qpdf.sourceforge.net/files/qpdf-manual.html#ref.release-notes

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81470" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1108308" ref_url="https://bugzilla.suse.com/1108308" source="BUGZILLA"/>
		<description>

This update for brings postgresql10 version 10.5 to SUSE Linux Enterprise 12 SP3. (FATE#325659 bnc#1108308)

This release marks the change of the versioning scheme for PostgreSQL
to a 'x.y' format. This means the next minor releases of PostgreSQL
will be 10.1, 10.2, ... and the next major release will be 11.

* Logical Replication

Logical replication extends the current replication features of
PostgreSQL with the ability to send modifications on a per-database
and per-table level to different PostgreSQL databases. Users can now
fine-tune the data replicated to various database clusters and will
have the ability to perform zero-downtime upgrades to future major
PostgreSQL versions.

* Declarative Table Partitioning

Table partitioning has existed for years in PostgreSQL but required a
user to maintain a nontrivial set of rules and triggers for the
partitioning to work. PostgreSQL 10 introduces a table partitioning
syntax that lets users easily create and maintain range and list
partitioned tables.

* Improved Query Parallelism

PostgreSQL 10 provides better support for parallelized queries by
allowing more parts of the query execution process to be
parallelized. Improvements include additional types of data scans that
are parallelized as well as optimizations when the data is recombined,
such as pre-sorting. These enhancements allow results to be returned
more quickly.

* Quorum Commit for Synchronous Replication

PostgreSQL 10 introduces quorum commit for synchronous replication,
which allows for flexibility in how a primary database receives
acknowledgement that changes were successfully written to remote
replicas.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108308">SUSE bug 1108308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520151" comment="libecpg6-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520152" comment="libpq5-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520153" comment="libpq5-32bit-10.5-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530291" comment="postgresql-init-10-17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520154" comment="postgresql10-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530292" comment="postgresql10-contrib-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530293" comment="postgresql10-docs-10.5-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530294" comment="postgresql10-server-10.5-1.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81471" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1062604" ref_url="https://bugzilla.suse.com/1062604" source="BUGZILLA"/>
		<reference ref_id="1064232" ref_url="https://bugzilla.suse.com/1064232" source="BUGZILLA"/>
		<reference ref_id="1065364" ref_url="https://bugzilla.suse.com/1065364" source="BUGZILLA"/>
		<reference ref_id="1082519" ref_url="https://bugzilla.suse.com/1082519" source="BUGZILLA"/>
		<reference ref_id="1082863" ref_url="https://bugzilla.suse.com/1082863" source="BUGZILLA"/>
		<reference ref_id="1084536" ref_url="https://bugzilla.suse.com/1084536" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1088810" ref_url="https://bugzilla.suse.com/1088810" source="BUGZILLA"/>
		<reference ref_id="1089066" ref_url="https://bugzilla.suse.com/1089066" source="BUGZILLA"/>
		<reference ref_id="1092903" ref_url="https://bugzilla.suse.com/1092903" source="BUGZILLA"/>
		<reference ref_id="1094466" ref_url="https://bugzilla.suse.com/1094466" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1096547" ref_url="https://bugzilla.suse.com/1096547" source="BUGZILLA"/>
		<reference ref_id="1097104" ref_url="https://bugzilla.suse.com/1097104" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1099811" ref_url="https://bugzilla.suse.com/1099811" source="BUGZILLA"/>
		<reference ref_id="1099813" ref_url="https://bugzilla.suse.com/1099813" source="BUGZILLA"/>
		<reference ref_id="1099844" ref_url="https://bugzilla.suse.com/1099844" source="BUGZILLA"/>
		<reference ref_id="1099845" ref_url="https://bugzilla.suse.com/1099845" source="BUGZILLA"/>
		<reference ref_id="1099846" ref_url="https://bugzilla.suse.com/1099846" source="BUGZILLA"/>
		<reference ref_id="1099849" ref_url="https://bugzilla.suse.com/1099849" source="BUGZILLA"/>
		<reference ref_id="1099863" ref_url="https://bugzilla.suse.com/1099863" source="BUGZILLA"/>
		<reference ref_id="1099864" ref_url="https://bugzilla.suse.com/1099864" source="BUGZILLA"/>
		<reference ref_id="1099922" ref_url="https://bugzilla.suse.com/1099922" source="BUGZILLA"/>
		<reference ref_id="1099993" ref_url="https://bugzilla.suse.com/1099993" source="BUGZILLA"/>
		<reference ref_id="1099999" ref_url="https://bugzilla.suse.com/1099999" source="BUGZILLA"/>
		<reference ref_id="1100000" ref_url="https://bugzilla.suse.com/1100000" source="BUGZILLA"/>
		<reference ref_id="1100001" ref_url="https://bugzilla.suse.com/1100001" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1102517" ref_url="https://bugzilla.suse.com/1102517" source="BUGZILLA"/>
		<reference ref_id="1102715" ref_url="https://bugzilla.suse.com/1102715" source="BUGZILLA"/>
		<reference ref_id="1102870" ref_url="https://bugzilla.suse.com/1102870" source="BUGZILLA"/>
		<reference ref_id="1103445" ref_url="https://bugzilla.suse.com/1103445" source="BUGZILLA"/>
		<reference ref_id="1104319" ref_url="https://bugzilla.suse.com/1104319" source="BUGZILLA"/>
		<reference ref_id="1104495" ref_url="https://bugzilla.suse.com/1104495" source="BUGZILLA"/>
		<reference ref_id="1105292" ref_url="https://bugzilla.suse.com/1105292" source="BUGZILLA"/>
		<reference ref_id="1105296" ref_url="https://bugzilla.suse.com/1105296" source="BUGZILLA"/>
		<reference ref_id="1105322" ref_url="https://bugzilla.suse.com/1105322" source="BUGZILLA"/>
		<reference ref_id="1105348" ref_url="https://bugzilla.suse.com/1105348" source="BUGZILLA"/>
		<reference ref_id="1105396" ref_url="https://bugzilla.suse.com/1105396" source="BUGZILLA"/>
		<reference ref_id="1105536" ref_url="https://bugzilla.suse.com/1105536" source="BUGZILLA"/>
		<reference ref_id="1106016" ref_url="https://bugzilla.suse.com/1106016" source="BUGZILLA"/>
		<reference ref_id="1106095" ref_url="https://bugzilla.suse.com/1106095" source="BUGZILLA"/>
		<reference ref_id="1106369" ref_url="https://bugzilla.suse.com/1106369" source="BUGZILLA"/>
		<reference ref_id="1106509" ref_url="https://bugzilla.suse.com/1106509" source="BUGZILLA"/>
		<reference ref_id="1106511" ref_url="https://bugzilla.suse.com/1106511" source="BUGZILLA"/>
		<reference ref_id="1106512" ref_url="https://bugzilla.suse.com/1106512" source="BUGZILLA"/>
		<reference ref_id="1106594" ref_url="https://bugzilla.suse.com/1106594" source="BUGZILLA"/>
		<reference ref_id="1107689" ref_url="https://bugzilla.suse.com/1107689" source="BUGZILLA"/>
		<reference ref_id="1107735" ref_url="https://bugzilla.suse.com/1107735" source="BUGZILLA"/>
		<reference ref_id="1107966" ref_url="https://bugzilla.suse.com/1107966" source="BUGZILLA"/>
		<reference ref_id="1108239" ref_url="https://bugzilla.suse.com/1108239" source="BUGZILLA"/>
		<reference ref_id="1108399" ref_url="https://bugzilla.suse.com/1108399" source="BUGZILLA"/>
		<reference ref_id="1109333" ref_url="https://bugzilla.suse.com/1109333" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876/" source="CVE"/>
		<reference ref_id="CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14678" ref_url="https://www.suse.com/security/cve/CVE-2018-14678/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

- CVE-2018-10853: A flaw was found in the way the KVM hypervisor emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest (bnc#1097104).
- CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
- CVE-2018-10938: A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw (bnc#1106016).
- CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allowed local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory (bnc#1092903).
- CVE-2018-12896: An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically made the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls (bnc#1099922).
- CVE-2018-13093: There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation (bnc#1100001).
- CVE-2018-13094: An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).
- CVE-2018-13095: A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork (bnc#1099999).
- CVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).
- CVE-2018-14678: The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S did not properly maintain RBX, which allowed local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges (bnc#1102715).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-15594: arch/x86/kernel/paravirt.c mishandled certain indirect calls, which made it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests (bnc#1105348).
- CVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095).
- CVE-2018-16658: An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 (bnc#1107689).
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).
- CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket (bnc#1106509).
- CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c allowed local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket (bnc#1106511).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following security bugs were fixed:
- CVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).

The following non-security bugs were fixed:

- atm: Preserve value of skb-&gt;truesize when accounting to vcc (bsc#1089066).
- bcache: avoid unncessary cache prefetch bch_btree_node_get() (bsc#1064232).
- bcache: calculate the number of incremental GC nodes according to the total of btree nodes (bsc#1064232).
- bcache: display rate debug parameters to 0 when writeback is not running (bsc#1064232).
- bcache: do not check return value of debugfs_create_dir() (bsc#1064232).
- bcache: finish incremental GC (bsc#1064232).
- bcache: fix error setting writeback_rate through sysfs interface (bsc#1064232).
- bcache: fix I/O significant decline while backend devices registering (bsc#1064232).
- bcache: free heap cache_set-&gt;flush_btree in bch_journal_free (bsc#1064232).
- bcache: make the pr_err statement used for ENOENT only in sysfs_attatch section (bsc#1064232).
- bcache: release dc-&gt;writeback_lock properly in bch_writeback_thread() (bsc#1064232).
- bcache: set max writeback rate when I/O request is idle (bsc#1064232).
- bcache: simplify the calculation of the total amount of flash dirty data (bsc#1064232).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ibmvnic: Include missing return code checks in reset function (bnc#1107966).
- kABI: protect struct x86_emulate_ops (kabi).
- kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)
- kabi: x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- kvm: MMU: always terminate page walks at level 1 (bsc#1062604).
- kvm: MMU: simplify last_pte_bitmap (bsc#1062604).
- kvm: nVMX: update last_nonleaf_level when initializing nested EPT (bsc#1062604).
- kvm: VMX: fixes for vmentry_l1d_flush module parameter (bsc#1106369).
- kvm: VMX: Work around kABI breakage in 'enum vmx_l1d_flush_state' (bsc#1106369).
- net: add skb_condense() helper (bsc#1089066).
- net: adjust skb-&gt;truesize in pskb_expand_head() (bsc#1089066).
- net: adjust skb-&gt;truesize in ___pskb_trim() (bsc#1089066).
- net: ena: Eliminate duplicate barriers on weakly-ordered archs (bsc#1108239).
- net: ena: fix device destruction to gracefully free resources (bsc#1108239).
- net: ena: fix driver when PAGE_SIZE == 64kB (bsc#1108239).
- net: ena: fix incorrect usage of memory barriers (bsc#1108239).
- net: ena: fix missing calls to READ_ONCE (bsc#1108239).
- net: ena: fix missing lock during device destruction (bsc#1108239).
- net: ena: fix potential double ena_destroy_device() (bsc#1108239).
- net: ena: fix surprise unplug NULL dereference kernel crash (bsc#1108239).
- net: ena: Fix use of uninitialized DMA address bits field (bsc#1108239).
- netfilter: xt_CT: fix refcnt leak on error path (bnc#1012382 bsc#1100152).
- netlink: do not enter direct reclaim from netlink_trim() (bsc#1042286).
- nfs: Use an appropriate work queue for direct-write completion (bsc#1082519).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: modify ovl_permission() to do checks on two inodes (bsc#1106512).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- powerpc: Avoid code patching freed init sections (bnc#1107735).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/tm: Avoid possible userspace r1 corruption on reclaim (bsc#1109333).
- powerpc/tm: Fix userspace r13 corruption (bsc#1109333).
- provide special timeout module parameters for EC2 (bsc#1065364).
- stop_machine: Atomically queue and wake stopper threads (git-fixes).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1096547).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM (bnc#1105536).
- x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ (bnc#1105536).
- x86/speculation/l1tf: Suggest what to do on systems with too much RAM (bnc#1105536).
- x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry (bsc#1106369).
- x86: Drop kernel trampoline stack. It is involved in breaking kdump/kexec infrastucture. (bsc#1099597)
- xen: avoid crash in disable_hotplug_cpu (bsc#1106594).
- xen/blkback: do not keep persistent grants too long (bsc#1085042).
- xen/blkback: move persistent grants flags to bool (bsc#1085042).
- xen/blkfront: cleanup stale persistent grants (bsc#1085042).
- xen/blkfront: reorder tests in xlblk_init() (bsc#1085042).
- xfs: add a new xfs_iext_lookup_extent_before helper (bsc#1095344).
- xfs: add asserts for the mmap lock in xfs_{insert,collapse}_file_space (bsc#1095344).
- xfs: add a xfs_bmap_fork_to_state helper (bsc#1095344).
- xfs: add a xfs_iext_update_extent helper (bsc#1095344).
- xfs: add comments documenting the rebalance algorithm (bsc#1095344).
- xfs: add some comments to xfs_iext_insert/xfs_iext_insert_node (bsc#1095344).
- xfs: add xfs_trim_extent (bsc#1095344).
- xfs: allow unaligned extent records in xfs_bmbt_disk_set_all (bsc#1095344).
- xfs: borrow indirect blocks from freed extent when available (bsc#1095344).
- xfs: cleanup xfs_bmap_last_before (bsc#1095344).
- xfs: do not create overlapping extents in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: do not rely on extent indices in xfs_bmap_insert_extents (bsc#1095344).
- xfs: do not set XFS_BTCUR_BPRV_WASDEL in xfs_bunmapi (bsc#1095344).
- xfs: during btree split, save new block key &amp; ptr for future insertion (bsc#1095344).
- xfs: factor out a helper to initialize a local format inode fork (bsc#1095344).
- xfs: fix memory leak in xfs_iext_free_last_leaf (bsc#1095344).
- xfs: fix number of records handling in xfs_iext_split_leaf (bsc#1095344).
- xfs: handle indlen shortage on delalloc extent merge (bsc#1095344).
- xfs: handle zero entries case in xfs_iext_rebalance_leaf (bsc#1095344).
- xfs: improve kmem_realloc (bsc#1095344).
- xfs: inline xfs_shift_file_space into callers (bsc#1095344).
- xfs: introduce the xfs_iext_cursor abstraction (bsc#1095344).
- xfs: iterate over extents in xfs_bmap_extents_to_btree (bsc#1095344).
- xfs: iterate over extents in xfs_iextents_copy (bsc#1095344).
- xfs: make better use of the 'state' variable in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: merge xfs_bmap_read_extents into xfs_iread_extents (bsc#1095344).
- xfs: move pre/post-bmap tracing into xfs_iext_update_extent (bsc#1095344).
- xfs: move some code around inside xfs_bmap_shift_extents (bsc#1095344).
- xfs: move some more code into xfs_bmap_del_extent_real (bsc#1095344).
- xfs: move xfs_bmbt_irec and xfs_exntst_t to xfs_types.h (bsc#1095344).
- xfs: move xfs_iext_insert tracepoint to report useful information (bsc#1095344).
- xfs: new inode extent list lookup helpers (bsc#1095344).
- xfs: pass an on-disk extent to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_lookup_eq (bsc#1095344).
- xfs: pass a struct xfs_bmbt_irec to xfs_bmbt_update (bsc#1095344).
- xfs: pass struct xfs_bmbt_irec to xfs_bmbt_validate_extent (bsc#1095344).
- xfs: provide helper for counting extents from if_bytes (bsc#1095344).
- xfs: refactor delalloc accounting in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor delalloc indlen reservation split into helper (bsc#1095344).
- xfs: refactor dir2 leaf readahead shadow buffer cleverness (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: refactor xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: refactor xfs_bunmapi_cow (bsc#1095344).
- xfs: refactor xfs_del_extent_real (bsc#1095344).
- xfs: remove a duplicate assignment in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: remove all xfs_bmbt_set_* helpers except for xfs_bmbt_set_all (bsc#1095344).
- xfs: remove a superflous assignment in xfs_iext_remove_node (bsc#1095344).
- xfs: Remove dead code from inode recover function (bsc#1105396).
- xfs: remove if_rdev (bsc#1095344).
- xfs: remove prev argument to xfs_bmapi_reserve_delalloc (bsc#1095344).
- xfs: remove support for inlining data/extents into the inode fork (bsc#1095344).
- xfs: remove the never fully implemented UUID fork format (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_insert (bsc#1095344).
- xfs: remove the nr_extents argument to xfs_iext_remove (bsc#1095344).
- xfs: remove XFS_BMAP_MAX_SHIFT_EXTENTS (bsc#1095344).
- xfs: remove XFS_BMAP_TRACE_EXLIST (bsc#1095344).
- xfs: remove xfs_bmbt_get_state (bsc#1095344).
- xfs: remove xfs_bmse_shift_one (bsc#1095344).
- xfs: rename bno to end in __xfs_bunmapi (bsc#1095344).
- xfs: repair malformed inode items during log recovery (bsc#1105396).
- xfs: replace xfs_bmbt_lookup_ge with xfs_bmbt_lookup_first (bsc#1095344).
- xfs: replace xfs_qm_get_rtblks with a direct call to xfs_bmap_count_leaves (bsc#1095344).
- xfs: rewrite getbmap using the xfs_iext_* helpers (bsc#1095344).
- xfs: rewrite xfs_bmap_count_leaves using xfs_iext_get_extent (bsc#1095344).
- xfs: rewrite xfs_bmap_first_unused to make better use of xfs_iext_get_extent (bsc#1095344).
- xfs: simplify the xfs_getbmap interface (bsc#1095344).
- xfs: simplify validation of the unwritten extent bit (bsc#1095344).
- xfs: split indlen reservations fairly when under reserved (bsc#1095344).
- xfs: split xfs_bmap_shift_extents (bsc#1095344).
- xfs: switch xfs_bmap_local_to_extents to use xfs_iext_insert (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_delay_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_delay (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_hole_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_add_extent_unwritten_real (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_collapse_extents (bsc#1095344).
- xfs: treat idx as a cursor in xfs_bmap_del_extent_* (bsc#1095344).
- xfs: update freeblocks counter after extent deletion (bsc#1095344).
- xfs: update got in xfs_bmap_shift_update_extent (bsc#1095344).
- xfs: use a b+tree for the in-core extent list (bsc#1095344).
- xfs: use correct state defines in xfs_bmap_del_extent_{cow,delay} (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_read (bsc#1095344).
- xfs: use new extent lookup helpers in xfs_bmapi_write (bsc#1095344).
- xfs: use new extent lookup helpers in __xfs_bunmapi (bsc#1095344).
- xfs: use the state defines in xfs_bmap_del_extent_real (bsc#1095344).
- xfs: use xfs_bmap_del_extent_delay for the data fork as well (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_shift_extents (bsc#1095344).
- xfs: use xfs_iext_*_extent helpers in xfs_bmap_split_extent_at (bsc#1095344).
- xfs: use xfs_iext_get_extent instead of open coding it (bsc#1095344).
- xfs: use xfs_iext_get_extent in xfs_bmap_first_unused (bsc#1095344).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064232">SUSE bug 1064232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065364">SUSE bug 1065364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082519">SUSE bug 1082519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088810">SUSE bug 1088810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089066">SUSE bug 1089066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094466">SUSE bug 1094466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096547">SUSE bug 1096547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099993">SUSE bug 1099993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103445">SUSE bug 1103445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104319">SUSE bug 1104319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104495">SUSE bug 1104495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105396">SUSE bug 1105396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105536">SUSE bug 1105536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106369">SUSE bug 1106369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106594">SUSE bug 1106594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107735">SUSE bug 1107735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107966">SUSE bug 1107966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108239">SUSE bug 1108239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109333">SUSE bug 1109333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14678/">CVE-2018-14678</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81472" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536621" comment="kgraft-patch-4_4_121-92_92-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81473" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536622" comment="kgraft-patch-4_4_121-92_73-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81474" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536623" comment="kgraft-patch-4_4_120-92_70-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81475" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536624" comment="kgraft-patch-4_4_121-92_80-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81476" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536625" comment="kgraft-patch-4_4_121-92_85-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81477" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536626" comment="kgraft-patch-4_4_90-92_45-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81478" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536627" comment="kgraft-patch-4_4_90-92_50-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81479" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536628" comment="kgraft-patch-4_4_103-92_56-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81480" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536629" comment="kgraft-patch-4_4_103-92_53-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81481" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536630" comment="kgraft-patch-4_4_114-92_67-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81482" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1110233" ref_url="https://bugzilla.suse.com/1110233" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.

The following security issues were fixed:

- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-16"/>
	<updated date="2018-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536631" comment="kgraft-patch-4_4_114-92_64-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81483" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1029907" ref_url="https://bugzilla.suse.com/1029907" source="BUGZILLA"/>
		<reference ref_id="1029908" ref_url="https://bugzilla.suse.com/1029908" source="BUGZILLA"/>
		<reference ref_id="1029909" ref_url="https://bugzilla.suse.com/1029909" source="BUGZILLA"/>
		<reference ref_id="1030296" ref_url="https://bugzilla.suse.com/1030296" source="BUGZILLA"/>
		<reference ref_id="1030297" ref_url="https://bugzilla.suse.com/1030297" source="BUGZILLA"/>
		<reference ref_id="1030298" ref_url="https://bugzilla.suse.com/1030298" source="BUGZILLA"/>
		<reference ref_id="1030584" ref_url="https://bugzilla.suse.com/1030584" source="BUGZILLA"/>
		<reference ref_id="1030585" ref_url="https://bugzilla.suse.com/1030585" source="BUGZILLA"/>
		<reference ref_id="1030588" ref_url="https://bugzilla.suse.com/1030588" source="BUGZILLA"/>
		<reference ref_id="1030589" ref_url="https://bugzilla.suse.com/1030589" source="BUGZILLA"/>
		<reference ref_id="1031590" ref_url="https://bugzilla.suse.com/1031590" source="BUGZILLA"/>
		<reference ref_id="1031593" ref_url="https://bugzilla.suse.com/1031593" source="BUGZILLA"/>
		<reference ref_id="1031595" ref_url="https://bugzilla.suse.com/1031595" source="BUGZILLA"/>
		<reference ref_id="1031638" ref_url="https://bugzilla.suse.com/1031638" source="BUGZILLA"/>
		<reference ref_id="1031644" ref_url="https://bugzilla.suse.com/1031644" source="BUGZILLA"/>
		<reference ref_id="1031656" ref_url="https://bugzilla.suse.com/1031656" source="BUGZILLA"/>
		<reference ref_id="1037052" ref_url="https://bugzilla.suse.com/1037052" source="BUGZILLA"/>
		<reference ref_id="1037057" ref_url="https://bugzilla.suse.com/1037057" source="BUGZILLA"/>
		<reference ref_id="1037061" ref_url="https://bugzilla.suse.com/1037061" source="BUGZILLA"/>
		<reference ref_id="1037066" ref_url="https://bugzilla.suse.com/1037066" source="BUGZILLA"/>
		<reference ref_id="1037273" ref_url="https://bugzilla.suse.com/1037273" source="BUGZILLA"/>
		<reference ref_id="1044891" ref_url="https://bugzilla.suse.com/1044891" source="BUGZILLA"/>
		<reference ref_id="1044897" ref_url="https://bugzilla.suse.com/1044897" source="BUGZILLA"/>
		<reference ref_id="1044901" ref_url="https://bugzilla.suse.com/1044901" source="BUGZILLA"/>
		<reference ref_id="1044909" ref_url="https://bugzilla.suse.com/1044909" source="BUGZILLA"/>
		<reference ref_id="1044925" ref_url="https://bugzilla.suse.com/1044925" source="BUGZILLA"/>
		<reference ref_id="1044927" ref_url="https://bugzilla.suse.com/1044927" source="BUGZILLA"/>
		<reference ref_id="1065643" ref_url="https://bugzilla.suse.com/1065643" source="BUGZILLA"/>
		<reference ref_id="1065689" ref_url="https://bugzilla.suse.com/1065689" source="BUGZILLA"/>
		<reference ref_id="1065693" ref_url="https://bugzilla.suse.com/1065693" source="BUGZILLA"/>
		<reference ref_id="1068640" ref_url="https://bugzilla.suse.com/1068640" source="BUGZILLA"/>
		<reference ref_id="1068643" ref_url="https://bugzilla.suse.com/1068643" source="BUGZILLA"/>
		<reference ref_id="1068887" ref_url="https://bugzilla.suse.com/1068887" source="BUGZILLA"/>
		<reference ref_id="1068888" ref_url="https://bugzilla.suse.com/1068888" source="BUGZILLA"/>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1069176" ref_url="https://bugzilla.suse.com/1069176" source="BUGZILLA"/>
		<reference ref_id="1069202" ref_url="https://bugzilla.suse.com/1069202" source="BUGZILLA"/>
		<reference ref_id="1074741" ref_url="https://bugzilla.suse.com/1074741" source="BUGZILLA"/>
		<reference ref_id="1077745" ref_url="https://bugzilla.suse.com/1077745" source="BUGZILLA"/>
		<reference ref_id="1079103" ref_url="https://bugzilla.suse.com/1079103" source="BUGZILLA"/>
		<reference ref_id="1079741" ref_url="https://bugzilla.suse.com/1079741" source="BUGZILLA"/>
		<reference ref_id="1080556" ref_url="https://bugzilla.suse.com/1080556" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1083528" ref_url="https://bugzilla.suse.com/1083528" source="BUGZILLA"/>
		<reference ref_id="1083532" ref_url="https://bugzilla.suse.com/1083532" source="BUGZILLA"/>
		<reference ref_id="1085784" ref_url="https://bugzilla.suse.com/1085784" source="BUGZILLA"/>
		<reference ref_id="1086608" ref_url="https://bugzilla.suse.com/1086608" source="BUGZILLA"/>
		<reference ref_id="1086784" ref_url="https://bugzilla.suse.com/1086784" source="BUGZILLA"/>
		<reference ref_id="1086786" ref_url="https://bugzilla.suse.com/1086786" source="BUGZILLA"/>
		<reference ref_id="1086788" ref_url="https://bugzilla.suse.com/1086788" source="BUGZILLA"/>
		<reference ref_id="1090997" ref_url="https://bugzilla.suse.com/1090997" source="BUGZILLA"/>
		<reference ref_id="1091015" ref_url="https://bugzilla.suse.com/1091015" source="BUGZILLA"/>
		<reference ref_id="1091365" ref_url="https://bugzilla.suse.com/1091365" source="BUGZILLA"/>
		<reference ref_id="1091368" ref_url="https://bugzilla.suse.com/1091368" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<description>
This update for binutils to 2.31 fixes the following issues:

These security issues were fixed:

- CVE-2017-15996: readelf allowed remote attackers to cause a denial of service
  (excessive memory allocation) or possibly have unspecified other impact via a
  crafted ELF file that triggered a buffer overflow on fuzzed archive header
  (bsc#1065643).
- CVE-2017-15939: Binary File Descriptor (BFD) library (aka libbfd) mishandled
  NULL files in a .debug_line file table, which allowed remote attackers to cause
  a denial of service (NULL pointer dereference and application crash) via a
  crafted ELF file, related to concat_filename (bsc#1065689).
- CVE-2017-15938: the Binary File Descriptor (BFD) library (aka libbfd)
  miscalculated DW_FORM_ref_addr die refs in the case of a relocatable object
  file, which allowed remote attackers to cause a denial of service
  (find_abstract_instance_name invalid memory read, segmentation fault, and
  application crash) (bsc#1065693).
- CVE-2017-16826: The coff_slurp_line_table function the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (invalid memory access and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068640).
- CVE-2017-16832: The pe_bfd_read_buildid function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not validate size and offset values
  in the data dictionary, which allowed remote attackers to cause a denial of
  service (segmentation violation and application crash) or possibly have
  unspecified other impact via a crafted PE file (bsc#1068643).
- CVE-2017-16831: Binary File Descriptor (BFD) library (aka libbfd) did not
  validate the symbol count, which allowed remote attackers to cause a denial of
  service (integer overflow and application crash, or excessive memory
  allocation) or possibly have unspecified other impact via a crafted PE file
  (bsc#1068887).
- CVE-2017-16830: The print_gnu_property_note function did not have
  integer-overflow protection on 32-bit platforms, which allowed remote attackers
  to cause a denial of service (segmentation violation and application crash) or
  possibly have unspecified other impact via a crafted ELF file (bsc#1068888).
- CVE-2017-16829: The _bfd_elf_parse_gnu_properties function in the Binary File
  Descriptor (BFD) library (aka libbfd) did not prevent negative pointers, which
  allowed remote attackers to cause a denial of service (out-of-bounds read and
  application crash) or possibly have unspecified other impact via a crafted ELF
  file (bsc#1068950).
- CVE-2017-16828: The display_debug_frames function allowed remote attackers to
  cause a denial of service (integer overflow and heap-based buffer over-read,
  and application crash) or possibly have unspecified other impact via a crafted
  ELF file (bsc#1069176).
- CVE-2017-16827: The aout_get_external_symbols function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (slurp_symtab invalid free and application crash) or possibly
  have unspecified other impact via a crafted ELF file (bsc#1069202).
- CVE-2018-6323: The elf_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) had an unsigned integer overflow because bfd_size_type
  multiplication is not used. A crafted ELF file allowed remote attackers to
  cause a denial of service (application crash) or possibly have unspecified
  other impact (bsc#1077745).
- CVE-2018-6543: Prevent integer overflow in the function
  load_specific_debug_section() which resulted in `malloc()` with 0 size. A
  crafted ELF file allowed remote attackers to cause a denial of service
  (application crash) or possibly have unspecified other impact (bsc#1079103).
- CVE-2018-6759: The bfd_get_debug_link_info_1 function in the Binary File
  Descriptor (BFD) library (aka libbfd) had an unchecked strnlen operation.
  Remote attackers could have leveraged this vulnerability to cause a denial of
  service (segmentation fault) via a crafted ELF file (bsc#1079741).
- CVE-2018-6872: The elf_parse_notes function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (out-of-bounds read and segmentation violation) via a note with a large
  alignment (bsc#1080556).
- CVE-2018-7208: In the coff_pointerize_aux function in the Binary File
  Descriptor (BFD) library (aka libbfd) an index was not validated, which allowed
  remote attackers to cause a denial of service (segmentation fault) or possibly
  have unspecified other impact via a crafted file, as demonstrated by objcopy of
  a COFF object (bsc#1081527).
- CVE-2018-7570: The assign_file_positions_for_non_load_sections function in
  the Binary File Descriptor (BFD) library (aka libbfd) allowed remote attackers
  to cause a denial of service (NULL pointer dereference and application crash)
  via an ELF file with a RELRO segment that lacks a matching LOAD segment, as
  demonstrated by objcopy (bsc#1083528).
- CVE-2018-7569: The Binary File Descriptor (BFD) library (aka libbfd) allowed
  remote attackers to cause a denial of service (integer underflow or overflow,
  and application crash) via an ELF file with a corrupt DWARF FORM block, as
  demonstrated by nm (bsc#1083532).
- CVE-2018-8945: The bfd_section_from_shdr function in the Binary File
  Descriptor (BFD) library (aka libbfd) allowed remote attackers to cause a
  denial of service (segmentation fault) via a large attribute section
  (bsc#1086608).
- CVE-2018-7643: The display_debug_ranges function allowed remote attackers to
  cause a denial of service (integer overflow and application crash) or possibly
  have unspecified other impact via a crafted ELF file, as demonstrated by
  objdump (bsc#1086784).
- CVE-2018-7642: The swap_std_reloc_in function in the Binary File Descriptor
  (BFD) library (aka libbfd) allowed remote attackers to cause a denial of
  service (aout_32_swap_std_reloc_out NULL pointer dereference and application
  crash) via a crafted ELF file, as demonstrated by objcopy (bsc#1086786).
- CVE-2018-7568: The parse_die function in the Binary File Descriptor (BFD)
  library (aka libbfd) allowed remote attackers to cause a denial of service
  (integer overflow and application crash) via an ELF file with corrupt dwarf1
  debug information, as demonstrated by nm (bsc#1086788).
- CVE-2018-10373: concat_filename in the Binary File Descriptor (BFD) library
  (aka libbfd) allowed remote attackers to cause a denial of service (NULL
  pointer dereference and application crash) via a crafted binary file, as
  demonstrated by nm-new (bsc#1090997).
- CVE-2018-10372: process_cu_tu_index allowed remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via a
  crafted binary file, as demonstrated by readelf (bsc#1091015).
- CVE-2018-10535: The ignore_section_sym function in the Binary File Descriptor
  (BFD) library (aka libbfd) did not validate the output_section pointer in the
  case of a symtab entry with a 'SECTION' type that has a '0' value, which
  allowed remote attackers to cause a denial of service (NULL pointer dereference
  and application crash) via a crafted file, as demonstrated by objcopy
  (bsc#1091365).
- CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in the
  Binary File Descriptor (BFD) library (aka libbfd) processesed a negative Data
  Directory size with an unbounded loop that increased the value of
  (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeded its own
  memory region, resulting in an out-of-bounds memory write, as demonstrated by
  objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common
  in pex64igen.c (bsc#1091368).

These non-security issues were fixed:

- The AArch64 port now supports showing disassembly notes which are emitted
  when inconsistencies are found with the instruction that may result in the
  instruction being invalid. These can be turned on with the option -M notes
  to objdump.
- The AArch64 port now emits warnings when a combination of an instruction and
  a named register could be invalid.
- Added O modifier to ar to display member offsets inside an archive
- The ADR and ADRL pseudo-instructions supported by the ARM assembler
  now only set the bottom bit of the address of thumb function symbols
  if the -mthumb-interwork command line option is active.
- Add --generate-missing-build-notes=[yes|no] option to create (or not) GNU
  Build Attribute notes if none are present in the input sources.  Add a
  --enable-generate-build-notes=[yes|no] configure time option to set the
  default behaviour.  Set the default if the configure option is not used
  to 'no'.
- Remove -mold-gcc command-line option for x86 targets.
- Add -O[2|s] command-line options to x86 assembler to enable alternate
  shorter instruction encoding.
- Add support for .nops directive.  It is currently supported only for
  x86 targets.
- Speed up direct linking with DLLs for Cygwin and Mingw targets.
- Add a configure option --enable-separate-code to decide whether
  -z separate-code should be enabled in ELF linker by default.  Default
  to yes for Linux/x86 targets. Note that -z separate-code can increase
  disk and memory size.
- RISC-V: Fix symbol address problem with versioned symbols 
- Restore riscv64-elf cross prefix via symlinks
- RISC-V: Don't enable relaxation in relocatable link
- Prevent linking faiures on i386 with assertion (bsc#1085784)
- Fix symbol size bug when relaxation deletes bytes
- Add --debug-dump=links option to readelf and --dwarf=links option to objdump
  which displays the contents of any .gnu_debuglink or .gnu_debugaltlink
  sections.
  Add a --debug-dump=follow-links option to readelf and a --dwarf=follow-links
  option to objdump which causes indirect links into separate debug info files
  to be followed when dumping other DWARF sections.
- Add support for loaction views in DWARF debug line information.
- Add -z separate-code to generate separate code PT_LOAD segment.
- Add '-z undefs' command line option as the inverse of the '-z defs' option.
- Add -z globalaudit command line option to force audit libraries to be run
  for every dynamic object loaded by an executable - provided that the loader
  supports this functionality.
- Tighten linker script grammar around file name specifiers to prevent the use
  of SORT_BY_ALIGNMENT and SORT_BY_INIT_PRIORITY on filenames.  These would
  previously be accepted but had no effect.
- The EXCLUDE_FILE directive can now be placed within any SORT_* directive
  within input section lists.
- Fix linker relaxation with --wrap
- Add arm-none-eabi symlinks (bsc#1074741)

Former updates of binutils also fixed the following security issues, for which
there was not CVE assigned at the time the update was released or no mapping
between code change and CVE existed:

- CVE-2014-9939: Prevent stack buffer overflow when printing bad bytes in Intel
  Hex objects (bsc#1030296).
- CVE-2017-7225: The find_nearest_line function in addr2line did not handle the
  case where the main file name and the directory name are both empty, triggering
  a NULL pointer dereference and an invalid write, and leading to a program crash
  (bsc#1030585).
- CVE-2017-7224: The find_nearest_line function in objdump was vulnerable to an
  invalid write (of size 1) while disassembling a corrupt binary that contains an
  empty function name, leading to a program crash (bsc#1030588).
- CVE-2017-7223: GNU assembler in was vulnerable to a global buffer overflow
  (of size 1) while attempting to unget an EOF character from the input stream,
  potentially leading to a program crash (bsc#1030589).
- CVE-2017-7226: The pe_ILF_object_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) was vulnerable to a heap-based buffer over-read of
  size 4049 because it used the strlen function instead of strnlen, leading to
  program crashes in several utilities such as addr2line, size, and strings. It
  could lead to information disclosure as well (bsc#1030584).
- CVE-2017-7299: The Binary File Descriptor (BFD) library (aka libbfd) had an
  invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link
  function in bfd/elflink.c) did not check the format of the input file trying to
  read the ELF reloc section header. The vulnerability leads to a GNU linker (ld)
  program crash (bsc#1031644).
- CVE-2017-7300: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a
  heap-based buffer over-read (off-by-one) because of an incomplete check for
  invalid string offsets while loading symbols, leading to a GNU linker (ld)
  program crash (bsc#1031656).
- CVE-2017-7302: The Binary File Descriptor (BFD) library (aka libbfd) had a
  swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid
  read (of size 4) because of missing checks for relocs that could not be
  recognised. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031595).
- CVE-2017-7303: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 4) because of missing a check (in the
  find_link function) for null headers attempting to match them. This
  vulnerability caused Binutils utilities like strip to crash (bsc#1031593).
- CVE-2017-7301: The Binary File Descriptor (BFD) library (aka libbfd) had an
  aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one
  vulnerability because it did not carefully check the string offset. The
  vulnerability could lead to a GNU linker (ld) program crash (bsc#1031638).
- CVE-2017-7304: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read (of size 8) because of missing a check (in the
  copy_special_section_fields function) for an invalid sh_link field attempting
  to follow it. This vulnerability caused Binutils utilities like strip to crash
  (bsc#1031590).
- CVE-2017-8392: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 8 because of missing a check to determine
  whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This
  vulnerability caused programs that conduct an analysis of binary programs using
  the libbfd library, such as objdump, to crash (bsc#1037052).
- CVE-2017-8393: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to a global buffer over-read error because of an assumption made by
  code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always
  named starting with a .rel/.rela prefix. This vulnerability caused programs
  that conduct an analysis of binary programs using the libbfd library, such as
  objcopy and strip, to crash (bsc#1037057).
- CVE-2017-8394: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of
  _bfd_elf_large_com_section. This vulnerability caused programs that conduct an
  analysis of binary programs using the libbfd library, such as objcopy, to crash
  (bsc#1037061).
- CVE-2017-8396: The Binary File Descriptor (BFD) library (aka libbfd) was
  vulnerable to an invalid read of size 1 because the existing reloc offset range
  tests didn't catch small negative offsets less than the size of the reloc
  field. This vulnerability caused programs that conduct an analysis of binary
  programs using the libbfd library, such as objdump, to crash (bsc#1037066).
- CVE-2017-8421: The function coff_set_alignment_hook in Binary File Descriptor
  (BFD) library (aka libbfd) had a memory leak vulnerability which can cause
  memory exhaustion in objdump via a crafted PE file (bsc#1037273).
- CVE-2017-9746: The disassemble_bytes function in objdump.c allowed remote
  attackers to cause a denial of service (buffer overflow and application crash)
  or possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of rae insns printing for this file during 'objdump
  -D' execution (bsc#1044891).
- CVE-2017-9747: The ieee_archive_p function in the Binary File Descriptor
  (BFD) library (aka libbfd) might have allowed remote attackers to cause a
  denial of service (buffer overflow and application crash) or possibly have
  unspecified other impact via a crafted binary file, as demonstrated by
  mishandling of this file during 'objdump -D' execution (bsc#1044897).
- CVE-2017-9748: The ieee_object_p function in the Binary File Descriptor (BFD)
  library (aka libbfd) might have allowed remote attackers to cause a denial of
  service (buffer overflow and application crash) or possibly have unspecified
  other impact via a crafted binary file, as demonstrated by mishandling of this
  file during 'objdump -D' execution (bsc#1044901).
- CVE-2017-9750: opcodes/rx-decode.opc lacked bounds checks for certain scale
  arrays, which allowed remote attackers to cause a denial of service (buffer
  overflow and application crash) or possibly have unspecified other impact via a
  crafted binary file, as demonstrated by mishandling of this file during
  'objdump -D' execution (bsc#1044909).
- CVE-2017-9755: Not considering the the number of registers for bnd mode
  allowed remote attackers to cause a denial of service (buffer overflow and
  application crash) or possibly have unspecified other impact via a crafted
  binary file, as demonstrated by mishandling of this file during 'objdump -D'
  execution (bsc#1044925).
- CVE-2017-9756: The aarch64_ext_ldst_reglist function allowed remote attackers
  to cause a denial of service (buffer overflow and application crash) or
  possibly have unspecified other impact via a crafted binary file, as
  demonstrated by mishandling of this file during 'objdump -D' execution
  (bsc#1044927).
- CVE-2017-7209: The dump_section_as_bytes function in readelf accessed a NULL
  pointer while reading section contents in a corrupt binary, leading to a
  program crash (bsc#1030298).
- CVE-2017-6965: readelf wrote to illegal addresses while processing corrupt
  input files containing symbol-difference relocations, leading to a heap-based
  buffer overflow (bsc#1029909).
- CVE-2017-6966: readelf had a use-after-free (specifically read-after-free)
  error while processing multiple, relocated sections in an MSP430 binary. This
  is caused by mishandling of an invalid symbol index, and mishandling of state
  across invocations (bsc#1029908).
- CVE-2017-6969: readelf was vulnerable to a heap-based buffer over-read while
  processing corrupt RL78 binaries. The vulnerability can trigger program
  crashes. It may lead to an information leak as well (bsc#1029907).
- CVE-2017-7210: objdump was vulnerable to multiple heap-based buffer
  over-reads (of size 1 and size 8) while handling corrupt STABS enum type
  strings in a crafted object file, leading to program crash (bsc#1030297).
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085784">SUSE bug 1085784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81484" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1094508" ref_url="https://bugzilla.suse.com/1094508" source="BUGZILLA"/>
		<reference ref_id="1103276" ref_url="https://bugzilla.suse.com/1103276" source="BUGZILLA"/>
		<reference ref_id="1111014" ref_url="https://bugzilla.suse.com/1111014" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) could have locked up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)

Non security issues fixed:

- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094508">SUSE bug 1094508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81485" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1083424" ref_url="https://bugzilla.suse.com/1083424" source="BUGZILLA"/>
		<reference ref_id="1098531" ref_url="https://bugzilla.suse.com/1098531" source="BUGZILLA"/>
		<reference ref_id="1111853" ref_url="https://bugzilla.suse.com/1111853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<description>

  
NTP was updated to 4.2.8p12 (bsc#1111853):

- CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
- CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-23"/>
	<updated date="2018-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81486" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103040" ref_url="https://bugzilla.suse.com/1103040" source="BUGZILLA"/>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1110723" ref_url="https://bugzilla.suse.com/1110723" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to version 0.100.2:

- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
  could allow an unauthenticated, remote attacker to cause a denial of
  service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
  libmspack. (bsc#1103040)

- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
  OnAccess scanning on Linux systems, has been disabled due to a
  known issue with resource cleanup OnAccessExtraScanning will
  be re-enabled in a future release when the issue is
  resolved. In the mean-time, users who enabled the feature in
  clamd.conf will see a warning informing them that the feature
  is not active. For details, see:
  https://bugzilla.clamav.net/show_bug.cgi?id=12048

- Restore exit code compatibility of freshclam with versions before
  0.100.0 when the virus database is already up to date
  (bsc#1104457).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81487" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<description>
This update for net-snmp fixes the following issues:

Security issues fixed:

- CVE-2018-18065: _set_key in agent/helpers/table_container.c had a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. (bsc#1111122)

Non-security issues fixed:

- swintst_rpm: Protect against unspecified Group name (bsc#1102775)
- Add tsm and tlstm MIBs and the USM security module. (bsc#1081164)
- Fix agentx freezing on timeout (bsc#1027353)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520274" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520275" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520276" comment="net-snmp-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520277" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520278" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81488" version="1" class="patch">
	<metadata>
		<title>Security update for smt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104076" ref_url="https://bugzilla.suse.com/1104076" source="BUGZILLA"/>
		<reference ref_id="1111056" ref_url="https://bugzilla.suse.com/1111056" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472/" source="CVE"/>
		<description>


SMT was updated to version 3.0.38.

Following security issue was fixed:

- CVE-2018-12472: Harden hostname check during sibling check by forcing double
  reverse lookup (bsc#1104076)

Following non security issues were fixed:

- Add migration path check when registration sharing is enabled
- Fix sibling sync errors (bsc#1111056):
  - Synchronize all registered products
  - Handle duplicate registrations when syncing
  - Force resync to the sibling instance in `upgrade` and
    `synchronize` API calls
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111056">SUSE bug 1111056</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530314" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530315" comment="smt-3.0.38-52.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530316" comment="smt-support-3.0.38-52.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81489" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-25"/>
	<updated date="2018-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552398" comment="kgraft-patch-4_4_121-92_95-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81490" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1109961" ref_url="https://bugzilla.suse.com/1109961" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-11763: In Apache HTTP Server by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. (bsc#1109961)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-30"/>
	<updated date="2018-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530317" comment="apache2-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530319" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530320" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530321" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530322" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81491" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111647" ref_url="https://bugzilla.suse.com/1111647" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Wireshark was updated to 2.4.10 (bsc#1111647).

Following security issues were fixed:

- CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47)
- CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50)

Further bug fixes and updated protocol support that were done are listed in:

  https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81492" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1012260" ref_url="https://bugzilla.suse.com/1012260" source="BUGZILLA"/>
		<reference ref_id="1021577" ref_url="https://bugzilla.suse.com/1021577" source="BUGZILLA"/>
		<reference ref_id="1026191" ref_url="https://bugzilla.suse.com/1026191" source="BUGZILLA"/>
		<reference ref_id="1041469" ref_url="https://bugzilla.suse.com/1041469" source="BUGZILLA"/>
		<reference ref_id="1041894" ref_url="https://bugzilla.suse.com/1041894" source="BUGZILLA"/>
		<reference ref_id="1049703" ref_url="https://bugzilla.suse.com/1049703" source="BUGZILLA"/>
		<reference ref_id="1061204" ref_url="https://bugzilla.suse.com/1061204" source="BUGZILLA"/>
		<reference ref_id="1064786" ref_url="https://bugzilla.suse.com/1064786" source="BUGZILLA"/>
		<reference ref_id="1065464" ref_url="https://bugzilla.suse.com/1065464" source="BUGZILLA"/>
		<reference ref_id="1066489" ref_url="https://bugzilla.suse.com/1066489" source="BUGZILLA"/>
		<reference ref_id="1073210" ref_url="https://bugzilla.suse.com/1073210" source="BUGZILLA"/>
		<reference ref_id="1078436" ref_url="https://bugzilla.suse.com/1078436" source="BUGZILLA"/>
		<reference ref_id="1091551" ref_url="https://bugzilla.suse.com/1091551" source="BUGZILLA"/>
		<reference ref_id="1092697" ref_url="https://bugzilla.suse.com/1092697" source="BUGZILLA"/>
		<reference ref_id="1094767" ref_url="https://bugzilla.suse.com/1094767" source="BUGZILLA"/>
		<reference ref_id="1096515" ref_url="https://bugzilla.suse.com/1096515" source="BUGZILLA"/>
		<reference ref_id="1107343" ref_url="https://bugzilla.suse.com/1107343" source="BUGZILLA"/>
		<reference ref_id="1108771" ref_url="https://bugzilla.suse.com/1108771" source="BUGZILLA"/>
		<reference ref_id="1108986" ref_url="https://bugzilla.suse.com/1108986" source="BUGZILLA"/>
		<reference ref_id="1109363" ref_url="https://bugzilla.suse.com/1109363" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1110506" ref_url="https://bugzilla.suse.com/1110506" source="BUGZILLA"/>
		<reference ref_id="1110507" ref_url="https://bugzilla.suse.com/1110507" source="BUGZILLA"/>
		<reference ref_id="703591" ref_url="https://bugzilla.suse.com/703591" source="BUGZILLA"/>
		<reference ref_id="839074" ref_url="https://bugzilla.suse.com/839074" source="BUGZILLA"/>
		<reference ref_id="857131" ref_url="https://bugzilla.suse.com/857131" source="BUGZILLA"/>
		<reference ref_id="893359" ref_url="https://bugzilla.suse.com/893359" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 60.2.2 fixes several issues.

These general changes are part of the version 60 release.

- New browser engine with speed improvements
- Redesigned graphical user interface elements
- Unified address and search bar for new installations
- New tab page listing top visited, recently visited and recommended pages
- Support for configuration policies in enterprise deployments via JSON files
- Support for Web Authentication, allowing the use of USB tokens for
  authentication to web sites

The following changes affect compatibility:
    
- Now exclusively supports extensions built using the WebExtension API.
- Unsupported legacy extensions will no longer work in Firefox 60 ESR
- TLS certificates issued by Symantec before June 1st, 2016 are no longer trusted 
  The 'security.pki.distrust_ca_policy' preference can be set to 0 to reinstate
  trust in those certificates

The following issues affect performance:

- new format for storing private keys, certificates and certificate trust
  If the user home or data directory is on a network file system, it is
  recommended that users set the following environment variable to avoid
  slowdowns: NSS_SDB_USE_CACHE=yes
  This setting is not recommended for local, fast file systems. 

These security issues were fixed:

- CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation (bsc#1107343).
- CVE-2017-16541: Proxy bypass using automount and autofs (bsc#1107343).
- CVE-2018-12376: Various memory safety bugs (bsc#1107343).
- CVE-2018-12377: Use-after-free in refresh driver timers (bsc#1107343).
- CVE-2018-12378: Use-after-free in IndexedDB (bsc#1107343).
- CVE-2018-12379: Out-of-bounds write with malicious MAR file (bsc#1107343).
- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process (bsc#1110507)
- CVE-2018-12385: Crash in TransportSecurityInfo due to cached data  (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords  (bsc#1107343)

This update for mozilla-nspr to version 4.19 fixes the follwing issues

- Added TCP Fast Open functionality
- A socket without PR_NSPR_IO_LAYER will no longer trigger
  an assertion when polling

This update for mozilla-nss to version 3.36.4 fixes the follwing issues

- Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
- Fix a rare bug with PKCS#12 files.
- Replaces existing vectorized ChaCha20 code with verified
  HACL* implementation.
- TLS 1.3 support has been updated to draft -23.
- Added formally verified implementations of non-vectorized Chacha20
  and non-vectorized Poly1305 64-bit.
- The following CA certificates were Removed:
  OU = Security Communication EV RootCA1
  CN = CA Disig Root R1
  CN = DST ACES CA X6
  Certum CA, O=Unizeto Sp. z o.o.
  StartCom Certification Authority
  StartCom Certification Authority G2
  T?BİTAK UEKAE K?k Sertifika Hizmet Sağlayıcısı - S?r?m 3
  ACEDICOM Root
  Certinomis - Autorit? Racine
  T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı
  PSCProcert
  CA 沃通根证书, O=WoSign CA Limited
  Certification Authority of WoSign
  Certification Authority of WoSign G2
  CA WoSign ECC Root
  Subject CN = VeriSign Class 3 Secure Server CA - G2
  O = Japanese Government, OU = ApplicationCA
  CN = WellsSecure Public Root Certificate Authority
  CN = T?RKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
  CN = Microsec e-Szigno Root
* The following CA certificates were Removed:
  AddTrust Public CA Root
  AddTrust Qualified CA Root
  China Internet Network Information Center EV Certificates Root
  CNNIC ROOT
  ComSign Secured CA
  GeoTrust Global CA 2
  Secure Certificate Services
  Swisscom Root CA 1
  Swisscom Root EV CA 2
  Trusted Certificate Services
  UTN-USERFirst-Hardware
  UTN-USERFirst-Object
* The following CA certificates were Added
  CN = D-TRUST Root CA 3 2013
  CN = TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1
  GDCA TrustAUTH R5 ROOT
  SSL.com Root Certification Authority RSA
  SSL.com Root Certification Authority ECC
  SSL.com EV Root Certification Authority RSA R2
  SSL.com EV Root Certification Authority ECC
  TrustCor RootCert CA-1
  TrustCor RootCert CA-2
  TrustCor ECA-1
* The Websites (TLS/SSL) trust bit was turned off for the following
  CA certificates:
  CN = Chambers of Commerce Root
  CN = Global Chambersign Root
* TLS servers are able to handle a ClientHello statelessly, if the
  client supports TLS 1.3.  If the server sends a HelloRetryRequest,
  it is possible to discard the server socket, and make a new socket
  to handle any subsequent ClientHello. This better enables stateless
  server operation. (This feature is added in support of QUIC, but it
  also has utility for DTLS 1.3 servers.)

Due to the update of mozilla-nss apache2-mod_nss needs to be updated to 
change to the SQLite certificate database, which is now the default (bsc#1108771)
  		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-31"/>
	<updated date="2018-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012260">SUSE bug 1012260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021577">SUSE bug 1021577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026191">SUSE bug 1026191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041469">SUSE bug 1041469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041894">SUSE bug 1041894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049703">SUSE bug 1049703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061204">SUSE bug 1061204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064786">SUSE bug 1064786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065464">SUSE bug 1065464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073210">SUSE bug 1073210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078436">SUSE bug 1078436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091551">SUSE bug 1091551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092697">SUSE bug 1092697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094767">SUSE bug 1094767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096515">SUSE bug 1096515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108771">SUSE bug 1108771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108986">SUSE bug 1108986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703591">SUSE bug 703591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839074">SUSE bug 839074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857131">SUSE bug 857131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893359">SUSE bug 893359</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81493" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1112852" ref_url="https://bugzilla.suse.com/1112852" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-13"/>
	<updated date="2018-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81494" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1106923" ref_url="https://bugzilla.suse.com/1106923" source="BUGZILLA"/>
		<reference ref_id="1108835" ref_url="https://bugzilla.suse.com/1108835" source="BUGZILLA"/>
		<reference ref_id="1109252" ref_url="https://bugzilla.suse.com/1109252" source="BUGZILLA"/>
		<reference ref_id="1110445" ref_url="https://bugzilla.suse.com/1110445" source="BUGZILLA"/>
		<reference ref_id="1111278" ref_url="https://bugzilla.suse.com/1111278" source="BUGZILLA"/>
		<reference ref_id="1112024" ref_url="https://bugzilla.suse.com/1112024" source="BUGZILLA"/>
		<reference ref_id="1113083" ref_url="https://bugzilla.suse.com/1113083" source="BUGZILLA"/>
		<reference ref_id="1113632" ref_url="https://bugzilla.suse.com/1113632" source="BUGZILLA"/>
		<reference ref_id="1113665" ref_url="https://bugzilla.suse.com/1113665" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>

This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)

Non-security issues fixed:

- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)

- Ship systemd-sysv-install helper via the main package
  This script was part of systemd-sysvinit sub-package but it was
  wrong since systemd-sysv-install is a script used to redirect
  enable/disable operations to chkconfig when the unit targets are
  sysv init scripts. Therefore it's never been a SySV init tool.
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-14"/>
	<updated date="2018-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106923">SUSE bug 1106923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108835">SUSE bug 1108835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109252">SUSE bug 1109252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110445">SUSE bug 1110445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111278">SUSE bug 1111278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112024">SUSE bug 1112024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113083">SUSE bug 1113083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81495" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bsc#1107832).
- CVE-2018-5390: Fixed the possiblilty that the kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552399" comment="kgraft-patch-4_4_121-92_98-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81496" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536663" comment="kgraft-patch-4_4_114-92_64-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81497" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536664" comment="kgraft-patch-4_4_114-92_67-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81498" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536665" comment="kgraft-patch-4_4_121-92_80-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81499" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536666" comment="kgraft-patch-4_4_121-92_73-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81500" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536667" comment="kgraft-patch-4_4_120-92_70-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81501" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="1112039" ref_url="https://bugzilla.suse.com/1112039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.

The following security issues were fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536668" comment="kgraft-patch-4_4_103-92_53-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81502" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="1112039" ref_url="https://bugzilla.suse.com/1112039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536669" comment="kgraft-patch-4_4_103-92_56-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81503" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="1112039" ref_url="https://bugzilla.suse.com/1112039" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.

The following security issues were fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
- CVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536670" comment="kgraft-patch-4_4_90-92_50-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81504" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1103098" ref_url="https://bugzilla.suse.com/1103098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes one issue.

The following security issue was fixed:

- CVE-2018-5391: Fixed a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may have caused a denial of service condition by sending specially crafted IP fragments. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bsc#1103098).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-16"/>
	<updated date="2018-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536671" comment="kgraft-patch-4_4_121-92_85-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81505" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1112209" ref_url="https://bugzilla.suse.com/1112209" source="BUGZILLA"/>
		<reference ref_id="1113534" ref_url="https://bugzilla.suse.com/1113534" source="BUGZILLA"/>
		<reference ref_id="1113652" ref_url="https://bugzilla.suse.com/1113652" source="BUGZILLA"/>
		<reference ref_id="1113742" ref_url="https://bugzilla.suse.com/1113742" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-22"/>
	<updated date="2018-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1112209">SUSE bug 1112209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530330" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530331" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81506" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="943457" ref_url="https://bugzilla.suse.com/943457" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501/" source="CVE"/>
		<description>
This update for rpm fixes the following issues:

These security issues were fixed:

- CVE-2017-7500: rpm did not properly handle RPM installations when a
  destination path was a symbolic link to a directory, possibly changing
  ownership and permissions of an arbitrary directory, and RPM files being placed
  in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
  installing an RPM. An attacker with ability to write in a directory where files
  will be installed could create symbolic links to an arbitrary location and
  modify content, and possibly permissions to arbitrary files, which could be
  used for denial of service or possibly privilege escalation (bsc#943457)

This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-23"/>
	<updated date="2018-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81507" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1091396" ref_url="https://bugzilla.suse.com/1091396" source="BUGZILLA"/>
		<reference ref_id="1105010" ref_url="https://bugzilla.suse.com/1105010" source="BUGZILLA"/>
		<reference ref_id="964336" ref_url="https://bugzilla.suse.com/964336" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Following security issues have been fixed:

- CVE-2018-15473: OpenSSH was prone to a user existance oracle vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. (bsc#1105010)

The following non-security issues were fixed:

- Stop leaking File descriptors (bsc#964336)
- sftp-client.c returns wrong error code upon failure [bsc#1091396]

		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-26"/>
	<updated date="2018-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091396">SUSE bug 1091396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964336">SUSE bug 964336</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530337" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81508" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 35 (bsc#1116574):

* Consumability

  - IJ10515 AIX JAVA 7.1.3.10 GENERAL PROTECTION FAULT WHEN ATTEMPTING TO USE HEALTH CENTER API

* Class Libraries

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.

* Java Virtual Machine

  - IJ10931 CVE-2018-3169
  - IV91132 SOME CORE PATTERN SPECIFIERS ARE NOT HANDLED BY THE JVM ON LINUX

* JIT Compiler

  - IJ08205 CRASH WHILE COMPILING
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID
		</description>
<advisory from="security@suse.de">
	<issued date="2018-11-28"/>
	<updated date="2018-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81509" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography, python-pyOpenSSL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1021578" ref_url="https://bugzilla.suse.com/1021578" source="BUGZILLA"/>
		<reference ref_id="1111634" ref_url="https://bugzilla.suse.com/1111634" source="BUGZILLA"/>
		<reference ref_id="1111635" ref_url="https://bugzilla.suse.com/1111635" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807/" source="CVE"/>
		<reference ref_id="CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808/" source="CVE"/>
		<description>

This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

- avoid bad interaction with python-cryptography package. (bsc#1021578)

  		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1021578">SUSE bug 1021578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81510" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1116574" ref_url="https://bugzilla.suse.com/1116574" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 5 Fix Pack 25 (bsc#1116574)

* Class Libraries:

  - IJ10934 CVE-2018-13785
  - IJ10935 CVE-2018-3136
  - IJ10895 CVE-2018-3139
  - IJ10932 CVE-2018-3149
  - IJ10894 CVE-2018-3180
  - IJ10930 CVE-2018-3183
  - IJ10933 CVE-2018-3214
  - IJ09315 FLOATING POINT EXCEPTION FROM JAVA.TEXT.DECIMALFORMAT. FORMAT
  - IJ09088 INTRODUCING A NEW PROPERTY FOR TURKEY TIMEZONE FOR PRODUCTS NOT IDENTIFYING TRT
  - IJ10800 REMOVE EXPIRING ROOT CERTIFICATES IN IBM JDK’S CACERTS.
  - IJ10566 SUPPORT EBCDIC CODE PAGE IBM-274 – BELGIUM EBCDIC

* Java Virtual Machine

  - IJ08730 APPLICATION SIGNAL HANDLER NOT INVOKED FOR SIGABRT
  - IJ10453 ASSERTION FAILURE AT CLASSPATHITEM.CPP
  - IJ09574 CLASSLOADER DEFINED THROUGH SYSTEM PROPERTY ‘JAVA.SYSTEM.CLASS.LOADE R’ IS NOT HONORED.
  - IJ10931 CVE-2018-3169
  - IJ10618 GPU SORT: UNSPECIFIED LAUNCH FAILURE
  - IJ10619 INCORRECT ILLEGALARGUMENTEXCEPTION BECAUSE OBJECT IS NOT AN INSTANCE OF DECLARING CLASS ON REFLECTIVE INVOCATION
  - IJ10135 JVM HUNG IN GARBAGECOLLECTORMXBEAN.G ETLASTGCINFO() API
  - IJ10680 RECURRENT ABORTED SCAVENGE

* ORB

  - IX90187 CLIENTREQUESTIMPL.REINVO KE FAILS WITH JAVA.LANG.INDEXOUTOFBOUN DSEXCEPTION

* Reliability and Serviceability

  - IJ09600 DTFJ AND JDMPVIEW FAIL TO PARSE WIDE REGISTER VALUES

* Security

  - IJ10492 'EC KEYSIZE &lt; 384' IS NOT HONORED USING THE 'JDK.TLS.DISABLEDALGORIT HMS' SECURITY PROPERTY
  - IJ10310 ADD NULL CHECKING ON THE ENCRYPTION TYPES LIST TO CREDENTIALS.GETDEFAULTNA TIVECREDS() METHOD
  - IJ10491 AES/GCM CIPHER – AAD NOT RESET TO UN-INIT STATE AFTER DOFINAL( ) AND INIT( )
  - IJ08442 HTTP PUBLIC KEY PINNING FINGERPRINT,PROBLEM WITH CONVERTING TO JKS KEYSTORE
  - IJ09107 IBMPKCS11IMPL CRYPTO PROVIDER – INTERMITTENT ERROR WITH SECP521R1 SIGNATURE ON Z/OS
  - IJ10136 IBMPKCS11IMPL – INTERMITTENT ERROR WITH SECP521R1 SIG ON Z/OS AND Z/LINUX
  - IJ08530 IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER
  - IJ08723 JAAS THROWS A ‘ARRAY INDEX OUT OF RANGE’ EXCEPTION
  - IJ08704 THE SECURITY PROPERTY ‘JDK.CERTPATH.DISABLEDAL GORITHMS’ IS MISTAKENLY BEING USED TO FILTER JAR SIGNING ALGORITHMS

* z/OS Extentions

  - PH03889 ADD SUPPORT FOR TRY-WITH-RESOURCES TO COM.IBM.JZOS.ENQUEUE
  - PH03414 ROLLOVER FROM SYE TO SAE FOR ICSF REASON CODE 3059
  - PH04008 ZERTJSSE – Z SYSTEMS ENCRYPTION READINESS TOOL (ZERT) NEW SUPPORT IN THE Z/OS JAVA SDK

This includes the update to Java 8.0 Service Refresh 5 Fix Pack 22:

* Java Virtual Machine

  - IJ09139 CUDA4J NOT AVAILABLE ON ALL PLATFORMS

* JIT Compiler

  - IJ09089 CRASH DURING COMPILATION IN USEREGISTER ON X86-32
  - IJ08655 FLOATING POINT ERROR (SIGFPE) IN ZJ9SYM1 OR ANY VM/JIT MODULE ON AN INSTRUCTION FOLLOWING A VECTOR INSTRUCTION
  - IJ08850 CRASH IN ARRAYLIST$ITR.NEXT()
  - IJ09601 JVM CRASHES ON A SIGBUS SIGNAL WHEN ACCESSING A DIRECTBYTEBUFFER

* z/OS Extentions

  - PH02999 JZOS data management classes accept dataset names in code pages supported by z/OS system services
  - PH01244 OUTPUT BUFFER TOO SHORT FOR GCM MODE ENCRYPTION USING IBMJCEHYBRID

Also the update to Java 8.0 Service Refresh 5 Fix Pack 21

* Class Libraries

  - IJ08569 JAVA.IO.IOEXCEPTION OCCURS WHEN A FILECHANNEL IS BIGGER THAN 2GB ON AIX PLATFORM
  - IJ08570 JAVA.LANG.UNSATISFIEDLIN KERROR WITH JAVA OPTION -DSUN.JAVA2D.CMM=SUN.JAV A2D.CMM.KCMS.KCMSSERVICE PROVIDER ON AIX PLATFORM

* Java Virtual Machine

  - IJ08001 30% THROUGHPUT DROP FOR CERTAIN SYNCHRONIZATION WORKLOADS
  - IJ07997 TRACEASSERT IN GARBAGE COLLECTOR(MEMORYSUBSPACE)

* JIT Compiler

  - IJ08503 ASSERTION IS HIT DUE TO UNEXPECTED STACK HEIGHT IN DEBUGGING MODE
  - IJ08375 CRASH DURING HARDWARE GENERATED GUARDED STORAGE EVENT WITHIN A TRANSACTIONAL EXECUTION REGION WHEN RUNNING WITH -XGC:CONCURRENTS
  - IJ08205 CRASH WHILE COMPILING
  - IJ09575 INCORRECT RESULT WHEN USING JAVA.LANG.MATH.MIN OR MAX ON 31-BIT JVM
  - IJ07886 INCORRECT CALUCATIONS WHEN USING NUMBERFORMAT.FORMAT() AND BIGDECIMAL.{FLOAT/DOUBLE }VALUE()
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-10"/>
	<updated date="2018-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81511" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1109105" ref_url="https://bugzilla.suse.com/1109105" source="BUGZILLA"/>
		<reference ref_id="1111479" ref_url="https://bugzilla.suse.com/1111479" source="BUGZILLA"/>
		<reference ref_id="1111480" ref_url="https://bugzilla.suse.com/1111480" source="BUGZILLA"/>
		<reference ref_id="1112229" ref_url="https://bugzilla.suse.com/1112229" source="BUGZILLA"/>
		<reference ref_id="1117022" ref_url="https://bugzilla.suse.com/1117022" source="BUGZILLA"/>
		<reference ref_id="1117274" ref_url="https://bugzilla.suse.com/1117274" source="BUGZILLA"/>
		<reference ref_id="1117313" ref_url="https://bugzilla.suse.com/1117313" source="BUGZILLA"/>
		<reference ref_id="1117327" ref_url="https://bugzilla.suse.com/1117327" source="BUGZILLA"/>
		<reference ref_id="1117331" ref_url="https://bugzilla.suse.com/1117331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<description>
This update for ghostscript to version 9.26 fixes the following issues:

Security issues fixed:

- CVE-2018-19475: Fixed bypass of an intended access restriction in psi/zdevice2.c (bsc#1117327)
- CVE-2018-19476: Fixed bypass of an intended access restriction in psi/zicc.c (bsc#1117313)
- CVE-2018-19477: Fixed bypass of an intended access restriction in psi/zfjbig2.c (bsc#1117274)
- CVE-2018-19409: Check if another device is used correctly in LockSafetyParams (bsc#1117022)
- CVE-2018-18284: Fixed potential sandbox escape through 1Policy operator (bsc#1112229)
- CVE-2018-18073: Fixed leaks through operator in saved execution stacks (bsc#1111480)
- CVE-2018-17961: Fixed a -dSAFER sandbox escape by bypassing executeonly (bsc#1111479)
- CVE-2018-17183: Fixed a potential code injection by specially crafted PostScript files (bsc#1109105)

Version update to 9.26 (bsc#1117331):

- Security issues have been the primary focus
- Minor bug fixes and improvements
- For release summary see: http://www.ghostscript.com/doc/9.26/News.htm
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81512" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1110949" ref_url="https://bugzilla.suse.com/1110949" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<description>
This update for git fixes the following issue:

- CVE-2018-17456: Git allowed remote code execution during processing of a recursive 'git clone' of a superproject if a .gitmodules file has a URL field beginning with a '-' character. (boo#1110949).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-12"/>
	<updated date="2018-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530347" comment="git-core-2.12.3-27.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81513" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536695" comment="kgraft-patch-4_4_120-92_70-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81514" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536696" comment="kgraft-patch-4_4_121-92_73-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81515" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536697" comment="kgraft-patch-4_4_121-92_80-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81516" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_56 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536698" comment="kgraft-patch-4_4_103-92_56-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81517" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.103-92_53 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536699" comment="kgraft-patch-4_4_103-92_53-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81518" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536700" comment="kgraft-patch-4_4_114-92_67-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81519" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097356" ref_url="https://bugzilla.suse.com/1097356" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-14"/>
	<updated date="2018-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536701" comment="kgraft-patch-4_4_114-92_64-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81520" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1118595" ref_url="https://bugzilla.suse.com/1118595" source="BUGZILLA"/>
		<reference ref_id="1118596" ref_url="https://bugzilla.suse.com/1118596" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

Security issues fixed:

- CVE-2018-15518: Fixed double free in QXmlStreamReader (bsc#1118595)
- CVE-2018-19873: Fixed Denial of Service on malformed BMP file in QBmpHandler (bsc#1118596)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-19"/>
	<updated date="2018-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530349" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530350" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530351" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530352" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530353" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530354" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530355" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530356" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530357" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530358" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530359" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530360" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530361" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530362" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530363" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81521" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr and mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1097410" ref_url="https://bugzilla.suse.com/1097410" source="BUGZILLA"/>
		<reference ref_id="1106873" ref_url="https://bugzilla.suse.com/1106873" source="BUGZILLA"/>
		<reference ref_id="1119069" ref_url="https://bugzilla.suse.com/1119069" source="BUGZILLA"/>
		<reference ref_id="1119105" ref_url="https://bugzilla.suse.com/1119105" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-21"/>
	<updated date="2018-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81522" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1106222" ref_url="https://bugzilla.suse.com/1106222" source="BUGZILLA"/>
		<reference ref_id="1110910" ref_url="https://bugzilla.suse.com/1110910" source="BUGZILLA"/>
		<reference ref_id="1111006" ref_url="https://bugzilla.suse.com/1111006" source="BUGZILLA"/>
		<reference ref_id="1111010" ref_url="https://bugzilla.suse.com/1111010" source="BUGZILLA"/>
		<reference ref_id="1111013" ref_url="https://bugzilla.suse.com/1111013" source="BUGZILLA"/>
		<reference ref_id="1114422" ref_url="https://bugzilla.suse.com/1114422" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2018-10839: Fixed NE2000 NIC emulation support that is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS (bsc#1110910).
- CVE-2018-15746: Fixed qemu-seccomp.c that might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (bsc#1106222).
- CVE-2018-17958: Fixed a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used (bsc#1111006).
- CVE-2018-17962: Fixed a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used (bsc#1111010).
- CVE-2018-17963: Fixed qemu_deliver_packet_iov in net/net.c that accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111013)
- CVE-2018-18849: Fixed an out of bounds memory access issue that was found in the LSI53C895A SCSI Host Bus Adapter emulation while writing a message in lsi_do_msgin. It could occur during migration if the 'msg_len' field has an invalid value. A user/process could use this flaw to crash the Qemu process resulting in DoS (bsc#1114422).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-12-22"/>
	<updated date="2018-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81523" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1086774" ref_url="https://bugzilla.suse.com/1086774" source="BUGZILLA"/>
		<reference ref_id="1086775" ref_url="https://bugzilla.suse.com/1086775" source="BUGZILLA"/>
		<reference ref_id="1086813" ref_url="https://bugzilla.suse.com/1086813" source="BUGZILLA"/>
		<reference ref_id="1086814" ref_url="https://bugzilla.suse.com/1086814" source="BUGZILLA"/>
		<reference ref_id="1086817" ref_url="https://bugzilla.suse.com/1086817" source="BUGZILLA"/>
		<reference ref_id="1086820" ref_url="https://bugzilla.suse.com/1086820" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715/" source="CVE"/>
		<reference ref_id="CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-1302" ref_url="https://www.suse.com/security/cve/CVE-2018-1302/" source="CVE"/>
		<reference ref_id="CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303/" source="CVE"/>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

  * CVE-2018-1283:  when mod_session is configured to forward its session data to CGI applications 
                    (SessionEnv on, not the default), a remote user may influence their content by 
                    using a \'Session\' header leading to unexpected behavior [bsc#1086814].

  * CVE-2018-1301: due to an out of bound access after a size limit being reached by reading the HTTP header, 
                   a specially crafted request could lead to remote denial of service. [bsc#1086817]
  
  * CVE-2018-1303: a specially crafted HTTP request header could lead to crash due to an out of bound read 
                   while preparing data to be cached in shared memory.[bsc#1086813]
  
  * CVE-2017-15715: a regular expression could match '$' to a newline character in a malicious filename, 
                    rather than matching only the end of the filename. leading to corruption of uploaded files.[bsc#1086774]
  
  * CVE-2018-1312: when generating an HTTP Digest authentication challenge, the nonce sent to prevent 
                   reply attacks was not correctly generated using a pseudo-random seed. 
                   In a cluster of servers using a common Digest authentication configuration, 
                   HTTP requests could be replayed across servers by an attacker without detection. [bsc#1086775]
  
  * CVE-2017-15710: mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, 
                    uses the Accept-Language header value to lookup the right charset encoding when verifying the 
                    user's credentials. If the header value is not present in the charset conversion table, 
                    a fallback mechanism is used to truncate it to a two characters value to allow a quick retry 
                    (for example, 'en-US' is truncated to 'en'). 
                    A header value of less than two characters forces an out of bound write of one NUL byte to a 
                   memory location that is not part of the string. In the worst case, quite unlikely, the process 
                   would crash which could be used as a Denial of Service attack. In the more likely case, this memory 
                   is already reserved for future use and the issue has no effect at all. [bsc#1086820]
  
  * CVE-2018-1302: when an HTTP/2 stream was destroyed after being handled, it 
                   could have written a NULL pointer potentially to an already freed memory. 
                   The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, 
                   the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk. 
                   [bsc#1086820]
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086820">SUSE bug 1086820</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1302/">CVE-2018-1302</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81524" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1031717" ref_url="https://bugzilla.suse.com/1031717" source="BUGZILLA"/>
		<reference ref_id="1046610" ref_url="https://bugzilla.suse.com/1046610" source="BUGZILLA"/>
		<reference ref_id="1057734" ref_url="https://bugzilla.suse.com/1057734" source="BUGZILLA"/>
		<reference ref_id="1070536" ref_url="https://bugzilla.suse.com/1070536" source="BUGZILLA"/>
		<reference ref_id="1075428" ref_url="https://bugzilla.suse.com/1075428" source="BUGZILLA"/>
		<reference ref_id="1076847" ref_url="https://bugzilla.suse.com/1076847" source="BUGZILLA"/>
		<reference ref_id="1077560" ref_url="https://bugzilla.suse.com/1077560" source="BUGZILLA"/>
		<reference ref_id="1082153" ref_url="https://bugzilla.suse.com/1082153" source="BUGZILLA"/>
		<reference ref_id="1082299" ref_url="https://bugzilla.suse.com/1082299" source="BUGZILLA"/>
		<reference ref_id="1083125" ref_url="https://bugzilla.suse.com/1083125" source="BUGZILLA"/>
		<reference ref_id="1083745" ref_url="https://bugzilla.suse.com/1083745" source="BUGZILLA"/>
		<reference ref_id="1083836" ref_url="https://bugzilla.suse.com/1083836" source="BUGZILLA"/>
		<reference ref_id="1084353" ref_url="https://bugzilla.suse.com/1084353" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1084829" ref_url="https://bugzilla.suse.com/1084829" source="BUGZILLA"/>
		<reference ref_id="1085042" ref_url="https://bugzilla.suse.com/1085042" source="BUGZILLA"/>
		<reference ref_id="1085185" ref_url="https://bugzilla.suse.com/1085185" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1085402" ref_url="https://bugzilla.suse.com/1085402" source="BUGZILLA"/>
		<reference ref_id="1085404" ref_url="https://bugzilla.suse.com/1085404" source="BUGZILLA"/>
		<reference ref_id="1086162" ref_url="https://bugzilla.suse.com/1086162" source="BUGZILLA"/>
		<reference ref_id="1086194" ref_url="https://bugzilla.suse.com/1086194" source="BUGZILLA"/>
		<reference ref_id="1087088" ref_url="https://bugzilla.suse.com/1087088" source="BUGZILLA"/>
		<reference ref_id="1087260" ref_url="https://bugzilla.suse.com/1087260" source="BUGZILLA"/>
		<reference ref_id="1087845" ref_url="https://bugzilla.suse.com/1087845" source="BUGZILLA"/>
		<reference ref_id="1088241" ref_url="https://bugzilla.suse.com/1088241" source="BUGZILLA"/>
		<reference ref_id="1088242" ref_url="https://bugzilla.suse.com/1088242" source="BUGZILLA"/>
		<reference ref_id="1088600" ref_url="https://bugzilla.suse.com/1088600" source="BUGZILLA"/>
		<reference ref_id="1088684" ref_url="https://bugzilla.suse.com/1088684" source="BUGZILLA"/>
		<reference ref_id="1089198" ref_url="https://bugzilla.suse.com/1089198" source="BUGZILLA"/>
		<reference ref_id="1089608" ref_url="https://bugzilla.suse.com/1089608" source="BUGZILLA"/>
		<reference ref_id="1089644" ref_url="https://bugzilla.suse.com/1089644" source="BUGZILLA"/>
		<reference ref_id="1089752" ref_url="https://bugzilla.suse.com/1089752" source="BUGZILLA"/>
		<reference ref_id="1090643" ref_url="https://bugzilla.suse.com/1090643" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).
- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).
- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)

The following non-security bugs were fixed:

- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).
- alsa: hda: Add a power_save blacklist (bnc#1012382).
- alsa: usb-audio: Add a quirck for B&amp;W PX headphones (bnc#1012382).
- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).
- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).
- Partial revert 'e1000e: Avoid receiver overrun interrupt bursts' (bsc#1075428).
- Revert 'e1000e: Separate signaling for link check/link up' (bsc#1075428).
- Revert 'led: core: Fix brightness setting when setting delay_off=0' (bnc#1012382).
- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.
- bpf, x64: implement retpoline for tail call (bnc#1012382).
- bridge: check brport attr show in brport_show (bnc#1012382).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).
- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).
- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).
- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).
- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).
- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).
- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).
- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).
- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).
- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).
- e1000e: Fix link check race condition (bsc#1075428).
- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).
- e1000e: Remove Other from EIAC (bsc#1075428).
- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).
- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).
- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).
- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).
- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).
- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).
- ibmvnic: Fix reset return from closed state (bsc#1084610).
- ibmvnic: Fix reset scheduler error handling (bsc#1088600).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).
- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).
- ibmvnic: Update TX pool cleaning routine (bsc#1085224).
- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kvm/x86: fix icebp instruction handling (bnc#1012382).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).
- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).
- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).
- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).
- media: m88ds3103: do not call a non-initalized function (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).
- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).
- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).
- net: fix race on decreasing number of TX queues (bnc#1012382).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).
- net: mpls: Pull common label check into helper (bnc#1012382).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).
- nospec: Allow index argument to have const-qualified type (bnc#1012382).
- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).
- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).
- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).
- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).
- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).
- rpm/config.sh: ensure sorted patches.
- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).
- s390/qeth: fix IPA command submission race (bnc#1012382).
- s390/qeth: fix SETIP command handling (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).
- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).
- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).
- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).
- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).
- udplite: fix partial checksum initialization (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).
- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).
- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).
- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).
- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).
- xen-blkfront: fix mq start/stop race (bsc#1085042).
- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031717">SUSE bug 1031717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046610">SUSE bug 1046610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057734">SUSE bug 1057734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070536">SUSE bug 1070536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075428">SUSE bug 1075428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076847">SUSE bug 1076847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077560">SUSE bug 1077560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082153">SUSE bug 1082153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082299">SUSE bug 1082299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083125">SUSE bug 1083125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083745">SUSE bug 1083745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083836">SUSE bug 1083836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085042">SUSE bug 1085042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085185">SUSE bug 1085185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085402">SUSE bug 1085402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085404">SUSE bug 1085404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086194">SUSE bug 1086194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087260">SUSE bug 1087260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087845">SUSE bug 1087845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088242">SUSE bug 1088242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088600">SUSE bug 1088600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088684">SUSE bug 1088684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089198">SUSE bug 1089198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089644">SUSE bug 1089644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81525" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1086039" ref_url="https://bugzilla.suse.com/1086039" source="BUGZILLA"/>
		<reference ref_id="1089152" ref_url="https://bugzilla.suse.com/1089152" source="BUGZILLA"/>
		<reference ref_id="1089635" ref_url="https://bugzilla.suse.com/1089635" source="BUGZILLA"/>
		<reference ref_id="1090820" ref_url="https://bugzilla.suse.com/1090820" source="BUGZILLA"/>
		<reference ref_id="1090822" ref_url="https://bugzilla.suse.com/1090822" source="BUGZILLA"/>
		<reference ref_id="1090823" ref_url="https://bugzilla.suse.com/1090823" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)
- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy
  HVM guests from causing a hypervisor crash or potentially privilege
  escalation/information leaks (XSA-261, bsc#1090822)
- Prevent unbounded loop, induced by qemu allowing an attacker to permanently
  keep a physical CPU core busy (XSA-262, bsc#1090823)
- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able
  to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction
  with specifying the target file as the backing file of a snapshot
  (bsc#1089152).
- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service
  (out-of-bounds zero write and hypervisor crash) via unexpected INT 80
  processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).

These non-security issues were fixed:

- bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly
- bsc#1027519: Fixed shadow mode guests
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086039">SUSE bug 1086039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81526" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1086825" ref_url="https://bugzilla.suse.com/1086825" source="BUGZILLA"/>
		<reference ref_id="1092098" ref_url="https://bugzilla.suse.com/1092098" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<description>
This update for curl fixes several issues:

Security issues fixed:

- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)

Non security issues fixed:

- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
  (bsc#1086825)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1086825">SUSE bug 1086825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520965" comment="curl-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520966" comment="libcurl4-7.37.0-37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520967" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81527" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1092548" ref_url="https://bugzilla.suse.com/1092548" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<description>
This update for MozillaFirefox to the ESR 52.8 release fixes the following issues:

Mozil to Firefox ESR 52.8 (bsc#1092548)

Security issues fixed:

- MFSA 2018-12/CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- MFSA 2018-12/CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
- MFSA 2018-12/CVE-2018-5168: Lightweight themes can be installed without user interaction
- MFSA 2018-12/CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
- MFSA 2018-12/CVE-2018-5155: Use-after-free with SVG animations and text paths
- MFSA 2018-12/CVE-2018-5183: Backport critical security fixes in Skia
- MFSA 2018-12/CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
- MFSA 2018-12/CVE-2018-5154: Use-after-free with SVG animations and clip paths
- MFSA 2018-12/CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520970" comment="MozillaFirefox-52.8.0esr-109.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530393" comment="MozillaFirefox-devel-52.8.0esr-109.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81528" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1079405" ref_url="https://bugzilla.suse.com/1079405" source="BUGZILLA"/>
		<reference ref_id="1092885" ref_url="https://bugzilla.suse.com/1092885" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for qemu fixes several issues.

This security issue was fixed:

- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).

  Systems with microprocessors utilizing speculative execution and speculative
  execution of memory reads before the addresses of all prior memory writes are
  known may allow unauthorized disclosure of information to an attacker with
  local user access via a side-channel analysis.

  This patch permits the new x86 cpu feature flag named 'ssbd' to be
  presented to the guest, given that the host has this feature, and
  KVM exposes it to the guest as well.

  For this feature to be enabled please use the qemu commandline
  -cpu $MODEL,+spec-ctrl,+ssbd
  so the guest OS can take advantage of the feature.

  spec-ctrl and ssbd support is also required in the host.

This feature was added:

- Add support for block resize support for xen disks through the monitor

This non-security issue was fixed:

- bsc#1079405: Add new look up path 'sys/class/tpm' for tpm cancel path based
  on Linux 4.0 change
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1079405">SUSE bug 1079405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530394" comment="qemu-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530395" comment="qemu-block-curl-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530396" comment="qemu-block-rbd-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530397" comment="qemu-block-ssh-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530398" comment="qemu-guest-agent-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530399" comment="qemu-ipxe-1.0.0-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530400" comment="qemu-kvm-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530401" comment="qemu-lang-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530402" comment="qemu-seabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530403" comment="qemu-sgabios-8-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530404" comment="qemu-tools-2.6.2-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530405" comment="qemu-vgabios-1.9.1-41.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530406" comment="qemu-x86-2.6.2-41.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81529" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1056427" ref_url="https://bugzilla.suse.com/1056427" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1075087" ref_url="https://bugzilla.suse.com/1075087" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1090953" ref_url="https://bugzilla.suse.com/1090953" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1092289" ref_url="https://bugzilla.suse.com/1092289" source="BUGZILLA"/>
		<reference ref_id="1093215" ref_url="https://bugzilla.suse.com/1093215" source="BUGZILLA"/>
		<reference ref_id="1094019" ref_url="https://bugzilla.suse.com/1094019" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
  in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).

  A new boot commandline option was introduced,
  'spec_store_bypass_disable', which can have following values:

  - auto: Kernel detects whether your CPU model contains an implementation
    of Speculative Store Bypass and picks the most appropriate mitigation.
  - on: disable Speculative Store Bypass
  - off: enable Speculative Store Bypass
  - prctl: Control Speculative Store Bypass per thread via
    prctl. Speculative Store Bypass is enabled for a process by default. The
    state of the control is inherited on fork.
  - seccomp: Same as 'prctl' above, but all seccomp threads will disable
    SSB unless they explicitly opt out.

  The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.

  Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:

  - 'Vulnerable'
  - 'Mitigation: Speculative Store Bypass disabled'
  - 'Mitigation: Speculative Store Bypass disabled via prctl'
  - 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'

The following related and non-security bugs were fixed:

- cpuid: Fix cpuid.edx.7.0 propagation to guest
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1056427">SUSE bug 1056427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075087">SUSE bug 1075087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090953">SUSE bug 1090953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092289">SUSE bug 1092289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093215">SUSE bug 1093215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094019">SUSE bug 1094019</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530407" comment="kernel-default-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530408" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530409" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530413" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81530" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1000396" ref_url="https://bugzilla.suse.com/1000396" source="BUGZILLA"/>
		<reference ref_id="1001299" ref_url="https://bugzilla.suse.com/1001299" source="BUGZILLA"/>
		<reference ref_id="1086247" ref_url="https://bugzilla.suse.com/1086247" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<description>
This update for bash fixes the following issues:

Security issues fixed:

- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)

Non-security issues fixed:

- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
  external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086247">SUSE bug 1086247</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81531" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1034674" ref_url="https://bugzilla.suse.com/1034674" source="BUGZILLA"/>
		<reference ref_id="1034678" ref_url="https://bugzilla.suse.com/1034678" source="BUGZILLA"/>
		<reference ref_id="1067203" ref_url="https://bugzilla.suse.com/1067203" source="BUGZILLA"/>
		<reference ref_id="1072193" ref_url="https://bugzilla.suse.com/1072193" source="BUGZILLA"/>
		<reference ref_id="1077999" ref_url="https://bugzilla.suse.com/1077999" source="BUGZILLA"/>
		<reference ref_id="1087932" ref_url="https://bugzilla.suse.com/1087932" source="BUGZILLA"/>
		<reference ref_id="929629" ref_url="https://bugzilla.suse.com/929629" source="BUGZILLA"/>
		<reference ref_id="990636" ref_url="https://bugzilla.suse.com/990636" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293/" source="CVE"/>
		<reference ref_id="CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952/" source="CVE"/>
		<reference ref_id="CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422/" source="CVE"/>
		<reference ref_id="CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484/" source="CVE"/>
		<reference ref_id="CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867/" source="CVE"/>
		<reference ref_id="CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868/" source="CVE"/>
		<description>
icu was updated to fix two security issues.

These security issues were fixed:
- CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) used an integer data type
  that is inconsistent with a header file, which allowed remote attackers
  to cause a denial of service (incorrect malloc followed by invalid free)
  or possibly execute arbitrary code via crafted text (bsc#929629).
- CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) did not properly track
  directionally isolated pieces of text, which allowed remote attackers
  to cause a denial of service (heap-based buffer overflow) or possibly
  execute arbitrary code via crafted text (bsc#929629).
- CVE-2016-6293: The uloc_acceptLanguageFromHTTP function in
  common/uloc.cpp in International Components for Unicode (ICU) for C/C++
  did not ensure that there is a '\0' character at the end of a certain
  temporary array, which allowed remote attackers to cause a denial of
  service (out-of-bounds read) or possibly have unspecified other impact
  via a call with a long httpAcceptLanguage argument (bsc#990636).
- CVE-2017-7868: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_moveIndex32* function (bsc#1034674)
- CVE-2017-7867: International Components for Unicode (ICU) for C/C++
  2017-02-13 has an out-of-bounds write caused by a heap-based buffer
  overflow related to the utf8TextAccess function in common/utext.cpp and
  the utext_setNativeIndex* function (bsc#1034678)
- CVE-2017-14952: Double free in i18n/zonemeta.cpp in International
  Components for Unicode (ICU) for C/C++ allowed remote attackers to
  execute arbitrary code via a crafted string, aka a 'redundant UVector
  entry clean up function call' issue (bnc#1067203)
- CVE-2017-17484: The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp
  in International Components for Unicode (ICU) for C/C++ mishandled
  ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allowed remote
  attackers to cause a denial of service (stack-based buffer overflow
  and application crash) or possibly have unspecified other impact via a
  crafted string, as demonstrated by ZNC  (bnc#1072193)
- CVE-2017-15422: An integer overflow in icu during persian calendar
  date processing could lead to incorrect years shown (bnc#1077999)

		</description>
<advisory from="security@suse.de">
	<issued date="2018-10-18"/>
	<updated date="2018-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087932">SUSE bug 1087932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81532" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1106989" ref_url="https://bugzilla.suse.com/1106989" source="BUGZILLA"/>
		<reference ref_id="1106996" ref_url="https://bugzilla.suse.com/1106996" source="BUGZILLA"/>
		<reference ref_id="1107609" ref_url="https://bugzilla.suse.com/1107609" source="BUGZILLA"/>
		<reference ref_id="1120381" ref_url="https://bugzilla.suse.com/1120381" source="BUGZILLA"/>
		<reference ref_id="1122033" ref_url="https://bugzilla.suse.com/1122033" source="BUGZILLA"/>
		<reference ref_id="1124365" ref_url="https://bugzilla.suse.com/1124365" source="BUGZILLA"/>
		<reference ref_id="1124366" ref_url="https://bugzilla.suse.com/1124366" source="BUGZILLA"/>
		<reference ref_id="1124368" ref_url="https://bugzilla.suse.com/1124368" source="BUGZILLA"/>
		<reference ref_id="1128649" ref_url="https://bugzilla.suse.com/1128649" source="BUGZILLA"/>
		<reference ref_id="1130330" ref_url="https://bugzilla.suse.com/1130330" source="BUGZILLA"/>
		<reference ref_id="1131317" ref_url="https://bugzilla.suse.com/1131317" source="BUGZILLA"/>
		<reference ref_id="1132053" ref_url="https://bugzilla.suse.com/1132053" source="BUGZILLA"/>
		<reference ref_id="1132054" ref_url="https://bugzilla.suse.com/1132054" source="BUGZILLA"/>
		<reference ref_id="1132060" ref_url="https://bugzilla.suse.com/1132060" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
- CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).

- Added extra -config- packages with Postscript/EPS/PDF readers still enabled.

  Removing the PS decoders is used to harden ImageMagick against security issues within
  ghostscript. Enabling them might impact security. (bsc#1122033)

  These are two packages that can be selected:

  - ImageMagick-config-6-SUSE: This has the PS decoders disabled.
  - ImageMagick-config-6-upstream: This has the PS decoders enabled.

  Depending on your local needs install either one of them. The default is the -SUSE configuration.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122033">SUSE bug 1122033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81533" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1132549" ref_url="https://bugzilla.suse.com/1132549" source="BUGZILLA"/>
		<reference ref_id="1132664" ref_url="https://bugzilla.suse.com/1132664" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

Security issues fixed:

- CVE-2019-11235: Fixed an authentication bypass related to the EAP-PWD Commit frame and insufficent validation of elliptic curve points (bsc#1132549).
- CVE-2019-11234: Fixed an authentication bypass caused by reflecting privous values back to the server (bsc#1132664).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-25"/>
	<updated date="2019-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530416" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530417" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530418" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530419" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530420" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530421" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530422" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530423" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530424" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530425" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530426" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81534" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1133528" ref_url="https://bugzilla.suse.com/1133528" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

 - Incorrect upstream fix for CVE-2019-3859 broke public key authentication [bsc#1133528, bsc#1130103]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-27"/>
	<updated date="2019-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133528">SUSE bug 1133528</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81535" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104205" ref_url="https://bugzilla.suse.com/1104205" source="BUGZILLA"/>
		<reference ref_id="1109209" ref_url="https://bugzilla.suse.com/1109209" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

This security issue was fixed:

- CVE-2018-14526: Under certain conditions, the integrity of EAPOL-Key messages
  was not checked, leading to a decryption oracle. An attacker within range of
  the Access Point and client could have abused the vulnerability to recover
  sensitive information (bsc#1104205).

This non-security issue was fixed:

- Enabled PWD as EAP method. This allows for password-based authentication,
  which is easier to setup than most of the other methods, and is used by the
  Eduroam network (bsc#1109209).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109209">SUSE bug 1109209</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81536" version="1" class="patch">
	<metadata>
		<title>Security update for atftp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133114" ref_url="https://bugzilla.suse.com/1133114" source="BUGZILLA"/>
		<reference ref_id="1133145" ref_url="https://bugzilla.suse.com/1133145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365/" source="CVE"/>
		<reference ref_id="CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366/" source="CVE"/>
		<description>
This update for atftp fixes the following issues:

Security issues fixed:

- CVE-2019-11366: Fixed a denial of service caused by a NULL pointer dereference because thread_list_mutex was not locked (bsc#1133145).
- CVE-2019-11365: Fixed a buffer overflow which could lead to remote code execution caused by an insecure use of strncpy() (bsc#1133114).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-29"/>
	<updated date="2019-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81537" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1120489" ref_url="https://bugzilla.suse.com/1120489" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<description>
This update for krb5 fixes the following issues:

Security issue fixed:

- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-17"/>
	<updated date="2019-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530427" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530428" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530429" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530430" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530431" comment="krb5-server-1.12.5-40.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81538" version="1" class="patch">
	<metadata>
		<title>Security update for hostinfo, supportutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1054979" ref_url="https://bugzilla.suse.com/1054979" source="BUGZILLA"/>
		<reference ref_id="1099498" ref_url="https://bugzilla.suse.com/1099498" source="BUGZILLA"/>
		<reference ref_id="1115245" ref_url="https://bugzilla.suse.com/1115245" source="BUGZILLA"/>
		<reference ref_id="1117751" ref_url="https://bugzilla.suse.com/1117751" source="BUGZILLA"/>
		<reference ref_id="1117776" ref_url="https://bugzilla.suse.com/1117776" source="BUGZILLA"/>
		<reference ref_id="1118460" ref_url="https://bugzilla.suse.com/1118460" source="BUGZILLA"/>
		<reference ref_id="1118462" ref_url="https://bugzilla.suse.com/1118462" source="BUGZILLA"/>
		<reference ref_id="1118463" ref_url="https://bugzilla.suse.com/1118463" source="BUGZILLA"/>
		<reference ref_id="1125623" ref_url="https://bugzilla.suse.com/1125623" source="BUGZILLA"/>
		<reference ref_id="1125666" ref_url="https://bugzilla.suse.com/1125666" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636/" source="CVE"/>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
This update for hostinfo, supportutils fixes the following issues:
	  
Security issues fixed for supportutils:

- CVE-2018-19640: Fixed an issue where  users could kill arbitrary processes (bsc#1118463).
- CVE-2018-19638: Fixed an issue where users could overwrite arbitrary log files (bsc#1118460).
- CVE-2018-19639: Fixed a code execution if run with -v (bsc#1118462).
- CVE-2018-19637: Fixed an issue where static temporary filename could allow overwriting of files (bsc#1117776).
- CVE-2018-19636: Fixed a local root exploit via inclusion of attacker controlled shell script (bsc#1117751).

Other issues fixed for supportutils:

- Fixed invalid exit code commands (bsc#1125666)
- SUSE separation in supportconfig (bsc#1125623)
- Clarified supportconfig(8) -x option (bsc#1115245)
- supportconfig: 3.0.127
- btrfs filesystem usage
- List products.d
- Dump lsof errors
- Added ha commands for corosync
- Dumped find errors in ib_info

Issues fixed in hostinfo:
- Removed extra kernel install dates (bsc#1099498)
- Resolved network bond issue (bsc#1054979)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-30"/>
	<updated date="2019-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054979">SUSE bug 1054979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099498">SUSE bug 1099498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115245">SUSE bug 1115245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125623">SUSE bug 1125623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125666">SUSE bug 1125666</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81539" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1131291" ref_url="https://bugzilla.suse.com/1131291" source="BUGZILLA"/>
		<description>
This update for openssl fixes the following issues:

- Reject invalid EC point coordinates (bsc#1131291)

  This helps openssl using services that do not do this verification on their own.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-03"/>
	<updated date="2019-05-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521132" comment="libopenssl-devel-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521133" comment="libopenssl1_0_0-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521134" comment="libopenssl1_0_0-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530433" comment="libopenssl1_0_0-hmac-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530434" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521135" comment="openssl-1.0.2j-60.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530435" comment="openssl-doc-1.0.2j-60.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81540" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1132256" ref_url="https://bugzilla.suse.com/1132256" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551,
  CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070 (bsc#1132256).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-06"/>
	<updated date="2019-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81541" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Save registry file outside share as unprivileged user (bsc#1131060).

Non-security issue fixed:

- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-08"/>
	<updated date="2019-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530438" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81542" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1087481" ref_url="https://bugzilla.suse.com/1087481" source="BUGZILLA"/>
		<reference ref_id="1106119" ref_url="https://bugzilla.suse.com/1106119" source="BUGZILLA"/>
		<reference ref_id="1114459" ref_url="https://bugzilla.suse.com/1114459" source="BUGZILLA"/>
		<reference ref_id="1126463" ref_url="https://bugzilla.suse.com/1126463" source="BUGZILLA"/>
		<reference ref_id="1131060" ref_url="https://bugzilla.suse.com/1131060" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

Security issue fixed:

- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).

Non-security issues fixed:

- Fixed an issue where the first login failed and subsequent ones work (bsc#1126463).
- Fixed winbind running out of memory with high number of domain groups (bsc#1114459).
- Backport changes to support quotas with SMB2 (bsc#1106119).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1087481">SUSE bug 1087481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106119">SUSE bug 1106119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114459">SUSE bug 1114459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126463">SUSE bug 1126463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530439" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530440" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530441" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530442" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530443" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530444" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530445" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530446" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530447" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530448" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530449" comment="libndr0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530450" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530451" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530452" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530453" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530454" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530455" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530456" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530457" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530458" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530459" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530460" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530461" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530462" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530463" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530464" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530465" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530466" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530467" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530468" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530469" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530470" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530471" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530472" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530473" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530474" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530475" comment="samba-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530476" comment="samba-client-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530477" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530479" comment="samba-libs-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530480" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530481" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530482" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81543" version="1" class="patch">
	<metadata>
		<title>Security update for jakarta-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1128829" ref_url="https://bugzilla.suse.com/1128829" source="BUGZILLA"/>
		<reference ref_id="1128963" ref_url="https://bugzilla.suse.com/1128963" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031/" source="CVE"/>
		<description>
This update for jakarta-commons-fileupload fixes the following issue:

Security issue fixed:

- CVE-2016-1000031: Fixed remote execution (bsc#1128963, bsc#1128829).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-10"/>
	<updated date="2019-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1128829">SUSE bug 1128829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81544" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1133135" ref_url="https://bugzilla.suse.com/1133135" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:

Security issues fixed:

- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).

Non-Security issue fixed:

- Disable LTO (bsc#1133135).
- Added Japanese new era name.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-13"/>
	<updated date="2019-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133135">SUSE bug 1133135</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81545" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

- Processor             Identifier     Version       Products
- Model        Stepping F-MO-S/PI      Old-&gt;New
- ---- new platforms ----------------------------------------
- CLX-SP       B1       6-55-7/bf           05000021 Xeon Scalable Gen2
- ---- updated platforms ------------------------------------
- SNB          D2/G1/Q0 6-2a-7/12 0000002e-&gt;0000002f Core Gen2
- IVB          E1/L1    6-3a-9/12 00000020-&gt;00000021 Core Gen3
- HSW          C0       6-3c-3/32 00000025-&gt;00000027 Core Gen4
- BDW-U/Y      E0/F0    6-3d-4/c0 0000002b-&gt;0000002d Core Gen5
- IVB-E/EP     C1/M1/S1 6-3e-4/ed 0000042e-&gt;0000042f Core Gen3 X Series; Xeon E5 v2
- IVB-EX       D1       6-3e-7/ed 00000714-&gt;00000715 Xeon E7 v2
- HSX-E/EP     Cx/M1    6-3f-2/6f 00000041-&gt;00000043 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000013-&gt;00000014 Xeon E7 v3
- HSW-U        C0/D0    6-45-1/72 00000024-&gt;00000025 Core Gen4
- HSW-H        C0       6-46-1/32 0000001a-&gt;0000001b Core Gen4
- BDW-H/E3     E0/G0    6-47-1/22 0000001e-&gt;00000020 Core Gen5
- SKL-U/Y      D0/K1    6-4e-3/c0 000000c6-&gt;000000cc Core Gen6      
- SKX-SP       H0/M0/U0 6-55-4/b7 0200005a-&gt;0000005e Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200005a-&gt;0000005e Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000019-&gt;0000001a Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000016-&gt;07000017 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000014-&gt;0f000015 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000c-&gt;0e00000d Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000036-&gt;00000038 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- SKL-H/S      R0/N0    6-5e-3/36 000000c6-&gt;000000cc Core Gen6; Xeon E3 v5
- DNV          B0       6-5f-1/01 00000024-&gt;0000002e Atom Processor C Series
- GLK          B0       6-7a-1/01 0000002c-&gt;0000002e Pentium Silver N/J5xxx, Celeron N/J4xxx
- AML-Y22      H0       6-8e-9/10 0000009e-&gt;000000b4 Core Gen8 Mobile
- KBL-U/Y      H0       6-8e-9/c0 0000009a-&gt;000000b4 Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 0000009e-&gt;000000b4 Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0 000000a4-&gt;000000b8 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94 000000b2-&gt;000000b8 Core Gen8 Mobile
- KBL-G/H/S/E3 B0       6-9e-9/2a 0000009a-&gt;000000b4 Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 000000aa-&gt;000000b4 Core Gen8 Desktop, Mobile, Xeon E
- CFL-S        B0       6-9e-b/02 000000aa-&gt;000000b4 Core Gen8
- CFL-H/S      P0       6-9e-c/22 000000a2-&gt;000000ae Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-14"/>
	<updated date="2019-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521155" comment="ucode-intel-20190507-13.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81546" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1080919" ref_url="https://bugzilla.suse.com/1080919" source="BUGZILLA"/>
		<reference ref_id="1121563" ref_url="https://bugzilla.suse.com/1121563" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="1126056" ref_url="https://bugzilla.suse.com/1126056" source="BUGZILLA"/>
		<reference ref_id="1127557" ref_url="https://bugzilla.suse.com/1127557" source="BUGZILLA"/>
		<reference ref_id="1128657" ref_url="https://bugzilla.suse.com/1128657" source="BUGZILLA"/>
		<reference ref_id="1130230" ref_url="https://bugzilla.suse.com/1130230" source="BUGZILLA"/>
		<reference ref_id="1132348" ref_url="https://bugzilla.suse.com/1132348" source="BUGZILLA"/>
		<reference ref_id="1132400" ref_url="https://bugzilla.suse.com/1132400" source="BUGZILLA"/>
		<reference ref_id="1132721" ref_url="https://bugzilla.suse.com/1132721" source="BUGZILLA"/>
		<reference ref_id="955942" ref_url="https://bugzilla.suse.com/955942" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

Security issues fixed:

- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles 
  which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).
- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).

Non-security issues fixed:

- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- Do not automatically online memory on s390x (bsc#1127557)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121563">SUSE bug 1121563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126056">SUSE bug 1126056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127557">SUSE bug 1127557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128657">SUSE bug 1128657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130230">SUSE bug 1130230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132400">SUSE bug 1132400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132721">SUSE bug 1132721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955942">SUSE bug 955942</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530487" comment="libudev-devel-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81547" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1129622" ref_url="https://bugzilla.suse.com/1129622" source="BUGZILLA"/>
		<reference ref_id="1130675" ref_url="https://bugzilla.suse.com/1130675" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Following security issues were fixed:

- CVE-2019-9824: Fixed an information leak in slirp (bsc#1129622)
- CVE-2018-20815: Fix DOS possibility in device tree processing (bsc#1130675)
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091: Added x86 cpu feature 'md-clear' (bsc#1111331)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-16"/>
	<updated date="2019-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81548" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1024908" ref_url="https://bugzilla.suse.com/1024908" source="BUGZILLA"/>
		<reference ref_id="1034113" ref_url="https://bugzilla.suse.com/1034113" source="BUGZILLA"/>
		<reference ref_id="1043485" ref_url="https://bugzilla.suse.com/1043485" source="BUGZILLA"/>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1073311" ref_url="https://bugzilla.suse.com/1073311" source="BUGZILLA"/>
		<reference ref_id="1080157" ref_url="https://bugzilla.suse.com/1080157" source="BUGZILLA"/>
		<reference ref_id="1080533" ref_url="https://bugzilla.suse.com/1080533" source="BUGZILLA"/>
		<reference ref_id="1082632" ref_url="https://bugzilla.suse.com/1082632" source="BUGZILLA"/>
		<reference ref_id="1087231" ref_url="https://bugzilla.suse.com/1087231" source="BUGZILLA"/>
		<reference ref_id="1087659" ref_url="https://bugzilla.suse.com/1087659" source="BUGZILLA"/>
		<reference ref_id="1087906" ref_url="https://bugzilla.suse.com/1087906" source="BUGZILLA"/>
		<reference ref_id="1093158" ref_url="https://bugzilla.suse.com/1093158" source="BUGZILLA"/>
		<reference ref_id="1094268" ref_url="https://bugzilla.suse.com/1094268" source="BUGZILLA"/>
		<reference ref_id="1096748" ref_url="https://bugzilla.suse.com/1096748" source="BUGZILLA"/>
		<reference ref_id="1100152" ref_url="https://bugzilla.suse.com/1100152" source="BUGZILLA"/>
		<reference ref_id="1103186" ref_url="https://bugzilla.suse.com/1103186" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1109772" ref_url="https://bugzilla.suse.com/1109772" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1112178" ref_url="https://bugzilla.suse.com/1112178" source="BUGZILLA"/>
		<reference ref_id="1113399" ref_url="https://bugzilla.suse.com/1113399" source="BUGZILLA"/>
		<reference ref_id="1116841" ref_url="https://bugzilla.suse.com/1116841" source="BUGZILLA"/>
		<reference ref_id="1118338" ref_url="https://bugzilla.suse.com/1118338" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1122822" ref_url="https://bugzilla.suse.com/1122822" source="BUGZILLA"/>
		<reference ref_id="1124832" ref_url="https://bugzilla.suse.com/1124832" source="BUGZILLA"/>
		<reference ref_id="1125580" ref_url="https://bugzilla.suse.com/1125580" source="BUGZILLA"/>
		<reference ref_id="1129279" ref_url="https://bugzilla.suse.com/1129279" source="BUGZILLA"/>
		<reference ref_id="1131416" ref_url="https://bugzilla.suse.com/1131416" source="BUGZILLA"/>
		<reference ref_id="1131427" ref_url="https://bugzilla.suse.com/1131427" source="BUGZILLA"/>
		<reference ref_id="1131587" ref_url="https://bugzilla.suse.com/1131587" source="BUGZILLA"/>
		<reference ref_id="1132673" ref_url="https://bugzilla.suse.com/1132673" source="BUGZILLA"/>
		<reference ref_id="1132828" ref_url="https://bugzilla.suse.com/1132828" source="BUGZILLA"/>
		<reference ref_id="1133188" ref_url="https://bugzilla.suse.com/1133188" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.

For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736

The following security bugs were fixed:

- CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network could use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. (bnc#1096748).
- CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. (bnc#1096748).
- CVE-2016-8636: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c allowed local users to cause a denial of service (memory corruption), obtain sensitive information or possibly have unspecified other impact via a write or read request involving the 'RDMA protocol over infiniband' (aka Soft RoCE) technology (bnc#1024908).
- CVE-2017-18174: In the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free (bnc#1080533).
- CVE-2018-1091: In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service (bnc#1087231).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c has multiple race conditions (bnc#1133188).
- CVE-2019-3882: A flaw was found in the vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS) (bsc#1131427).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2017-17741: The KVM implementation allowed attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h (bnc#1073311).
- CVE-2019-9503, CVE-2019-8564: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828, bnc#1132673).

The following non-security bugs were fixed:

- ACPI: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).
- add mainline tags to four hyperv patches
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- Drivers: hv: vmbus: Define an API to retrieve virtual processor index (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the event page (bsc#1122822).
- Drivers: hv: vmbus: Define APIs to manipulate the message page (bsc#1122822).++ kernel-source.spec (revision 4)Release:    &amp;lt;RELEASE&gt;.gbd4498d
- Drivers: hv: vmbus: Define APIs to manipulate the synthetic interrupt controller (bsc#1122822).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- iommu/hyper-v: Add Hyper-V stub IOMMU driver (bsc#1122822).
- jump_label: remove bug.h, atomic.h dependencies for HAVE_JUMP_LABEL (bsc#1111331).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from &lt;linux/bitops.h&gt; to a new &lt;linux/bits.h&gt; file (bsc#1111331).
- MDS: Add CVE refs
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1129279).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1129279).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1129279).
- net: ena: complete host info to match latest ENA spec (bsc#1129279).
- net: ena: enable Low Latency Queues (bsc#1129279).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1129279).
- net: ena: fix auto casting to boolean (bsc#1129279).
- net: ena: fix compilation error in xtensa architecture (bsc#1129279).
- net: ena: fix crash during ena_remove() (bsc#1129279).
- net: ena: fix crash during failed resume from hibernation (bsc#1129279).
- net: ena: fix indentations in ena_defs for better readability (bsc#1129279).
- net: ena: Fix Kconfig dependency on X86 (bsc#1129279).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1129279).
- net: ena: fix race between link up and device initalization (bsc#1129279).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1129279).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1129279).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1129279).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1129279).
- net: ena: minor performance improvement (bsc#1129279).
- net: ena: remove ndo_poll_controller (bsc#1129279).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1129279).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1129279).
- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129279).
- net: ena: update driver version to 2.0.1 (bsc#1129279).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1129279).
- PCI: hv: Add vPCI version protocol negotiation (bnc#1043485, bsc#1122822).
- PCI: hv: Allocate interrupt descriptors with GFP_ATOMIC (bnc#1034113, bsc#1122822).
- PCI: hv: Disable/enable IRQs rather than BH in hv_compose_msi_msg() (bnc#1094268, bsc#1122822).
- PCI: hv: Do not sleep in compose_msi_msg() (bsc#1082632, bsc#1122822).
- PCI: hv: Fix 2 hang issues in hv_compose_msi_msg() (bsc#1087659, bsc#1087906, bsc#1122822).
- PCI: hv: Fix a comment typo in _hv_pcifront_read_config() (bsc#1087659, bsc#1122822).
- PCI: hv: Fix comment formatting and use proper integer fields (bnc#1043485, bsc#1122822).
- PCI: hv: Only queue new work items in hv_pci_devices_present() if necessary (bsc#1087659, bsc#1122822).
- PCI: hv: Remove the bogus test in hv_eject_device_work() (bsc#1087659, bsc#1122822).
- PCI: hv: Serialize the present and eject work items (bsc#1087659, bsc#1122822).
- PCI: hv: Specify CPU_AFFINITY_ALL for MSI affinity when &gt;= 32 CPUs (bnc#1043485, bsc#1122822).
- PCI: hv: Temporary own CPU-number-to-vCPU-number infra (bnc#1043485, bsc#1122822).
- PCI: hv: Use effective affinity mask (bsc#1109772, bsc#1122822).
- PCI: hv: Use page allocation for hbus structure (bnc#1043485, bsc#1122822).
- PCI: hv: Use vPCI protocol version 1.2 (bnc#1043485, bsc#1122822).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- powerpc/64: Disable the speculation barrier from the command line (bsc#1068032).
- powerpc/64s: Default l1d_size to 64K in RFI fallback flush (bsc#1068032, git-fixes).
- powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (bsc#1068032, bsc#1080157, git-fixes).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1118338).
- powerpc/tm: Add TM Unavailable Exception (bsc#1118338).
- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- s390: add explicit &lt;linux/stringify.h&gt; for jump label (bsc#1111331).
- sched/core: Optimize SCHED_SMT (bsc#1111331).
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331).
- scripts/git_sort/git_sort.py: Add fixes branch from mkp/scsi.git.
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: storvsc: Reduce default ring buffer size to 128 Kbytes ().
- time: Introduce jiffies64_to_nsecs() (bsc#1113399).
- Use upstream variant of two pci-hyperv patches
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382 bsc#1100152).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1111331).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331).
- x86/cpu: Rename Merrifield2 to Moorefield (bsc#1111331).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772, bsc#1122822).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mds=full,nosmt cmdline option (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add 'mitigations=' support for MDS (bsc#1111331).
- x86/speculation/mds: Add SMT warning message (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (bsc#1111331).
- x86/speculation: Move arch_smt_update() call to after mitigation decisions (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86: stop exporting msr-index.h to userland (bsc#1111331).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382 bsc#1100152).
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (bnc#1012382 bsc#1100152).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-17"/>
	<updated date="2019-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024908">SUSE bug 1024908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034113">SUSE bug 1034113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043485">SUSE bug 1043485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080157">SUSE bug 1080157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082632">SUSE bug 1082632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087659">SUSE bug 1087659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087906">SUSE bug 1087906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094268">SUSE bug 1094268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100152">SUSE bug 1100152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109772">SUSE bug 1109772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112178">SUSE bug 1112178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113399">SUSE bug 1113399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118338">SUSE bug 1118338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122822">SUSE bug 1122822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124832">SUSE bug 1124832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125580">SUSE bug 1125580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129279">SUSE bug 1129279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131587">SUSE bug 1131587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81549" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

ucode-intel was updated to official QSR 2019.1 microcode release (bsc#1111331
  CVE-2018-12126 CVE-2018-12130 CVE-2018-12127 CVE-2019-11091)

---- new platforms ----------------------------------------
VLV          C0       6-37-8/02           00000838 Atom Z series
VLV          C0       6-37-8/0C           00000838 Celeron N2xxx, Pentium N35xx
VLV          D0       6-37-9/0F           0000090c Atom E38xx
CHV          C0       6-4c-3/01           00000368 Atom X series
CHV          D0       6-4c-4/01           00000411 Atom X series

Readded Broadwell CPU ucode that was missing in last update:

BDX-ML       B0/M0/R0 6-4f-1/ef 0b00002e-&gt;00000036 Xeon E5/E7 v4; Core i7-69xx/68xx
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-21"/>
	<updated date="2019-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521192" comment="ucode-intel-20190514-13.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81550" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1121571" ref_url="https://bugzilla.suse.com/1121571" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121818" ref_url="https://bugzilla.suse.com/1121818" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security issue fixed:

- CVE-2018-20685: Fixed an issue where scp client allows remote SSH servers to bypass intended access restrictions (bsc#1121571)
- CVE-2019-6109: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate terminal output via the object name, e.g. by inserting ANSI escape sequences (bsc#1121816)
- CVE-2019-6110: Fixed an issue where the scp client would allow malicious remote SSH servers to manipulate stderr output, e.g. by inserting ANSI escape sequences (bsc#1121818)
- CVE-2019-6111: Fixed an issue where the scp client would allow malicious remote SSH servers to execute directory traversal attacks and overwrite files (bsc#1121821)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530509" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81551" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 45.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-24"/>
	<updated date="2019-05-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81552" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1005023" ref_url="https://bugzilla.suse.com/1005023" source="BUGZILLA"/>
		<reference ref_id="1076696" ref_url="https://bugzilla.suse.com/1076696" source="BUGZILLA"/>
		<reference ref_id="1101591" ref_url="https://bugzilla.suse.com/1101591" source="BUGZILLA"/>
		<reference ref_id="1114981" ref_url="https://bugzilla.suse.com/1114981" source="BUGZILLA"/>
		<reference ref_id="1115518" ref_url="https://bugzilla.suse.com/1115518" source="BUGZILLA"/>
		<reference ref_id="1119971" ref_url="https://bugzilla.suse.com/1119971" source="BUGZILLA"/>
		<reference ref_id="1120323" ref_url="https://bugzilla.suse.com/1120323" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<description>
This update for systemd provides the following fixes:

Security issues fixed:

- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)

Non-security issues fixed:

- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add.  In SLE-12-SP3,
  80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
  detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
  detected _none_ state.  The exit failure code causes that the hot-add memory block can
  not be set to online. (bsc#1076696)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-21"/>
	<updated date="2019-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1005023">SUSE bug 1005023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076696">SUSE bug 1076696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101591">SUSE bug 1101591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114981">SUSE bug 1114981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115518">SUSE bug 1115518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119971">SUSE bug 1119971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81553" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1135170" ref_url="https://bugzilla.suse.com/1135170" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521212" comment="curl-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521213" comment="libcurl4-7.37.0-37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521214" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81554" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1130680" ref_url="https://bugzilla.suse.com/1130680" source="BUGZILLA"/>
		<reference ref_id="1133818" ref_url="https://bugzilla.suse.com/1133818" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Fixed an issue with live migration when spectre is enabled on xen boot cmdline (bsc#1116380).
- Fixed an issue with live migration (bsc#1133818).
- Added upstream bug fix (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-28"/>
	<updated date="2019-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133818">SUSE bug 1133818</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81555" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1135824" ref_url="https://bugzilla.suse.com/1135824" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- CVE-2019-11691: Use-after-free in XMLHttpRequest
- CVE-2019-11692: Use-after-free removing listeners in the event listener manager
- CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
- CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
- CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
- CVE-2019-7317: Use-after-free in png_image_free of libpng library
- CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
- CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
- CVE-2019-9816: Type confusion with object groups and UnboxedObjects
- CVE-2019-9817: Stealing of cross-domain images using canvas
- CVE-2019-9818: Use-after-free in crash generation server
- CVE-2019-9819: Compartment mismatch with fetch API
- CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

Non-security issues fixed:

- Font and date adjustments to accommodate the new Reiwa era in Japan
- Update to Firefox ESR 60.7 (bsc#1135824)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81556" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1134297" ref_url="https://bugzilla.suse.com/1134297" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)

Security issues fixed:

- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).

Bug fixes:

- Please check the package Changelog for detailed information.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-05-31"/>
	<updated date="2019-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81557" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104129" ref_url="https://bugzilla.suse.com/1104129" source="BUGZILLA"/>
		<reference ref_id="1126068" ref_url="https://bugzilla.suse.com/1126068" source="BUGZILLA"/>
		<reference ref_id="1126069" ref_url="https://bugzilla.suse.com/1126069" source="BUGZILLA"/>
		<reference ref_id="1133185" ref_url="https://bugzilla.suse.com/1133185" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

Security issues fixed:

- CVE-2018-5740: Fixed a denial of service vulnerability in the 'deny-answer-aliases' feature (bsc#1104129).
- CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069).
- CVE-2018-5745: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. (bsc#1126068)
- CVE-2018-5743: Limiting simultaneous TCP clients is ineffective. (bsc#1133185)

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-03"/>
	<updated date="2019-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81558" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes one issue.

The following security issue was fixed:

- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-05"/>
	<updated date="2019-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552400" comment="kgraft-patch-4_4_121-92_109-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81559" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1131390" ref_url="https://bugzilla.suse.com/1131390" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes one issue.

The following security issue was fixed:

- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free) (bsc#1131390).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-05"/>
	<updated date="2019-06-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131390">SUSE bug 1131390</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536891" comment="kgraft-patch-4_4_121-92_85-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81560" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="1131595" ref_url="https://bugzilla.suse.com/1131595" source="BUGZILLA"/>
		<reference ref_id="1135273" ref_url="https://bugzilla.suse.com/1135273" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the libvirt adjustments, that pass through the new 'md-clear' CPU flag (bsc#1135273).

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other security issues fixed:

- CVE-2019-3886: Fixed an information leak which allowed to retrieve the guest hostname under readonly mode (bsc#1131595).
- qemu: Add support for using AES secret for SCSI hotplug
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135273">SUSE bug 1135273</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81561" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="1130847" ref_url="https://bugzilla.suse.com/1130847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-9948: Fixed a 'file:' blacklist bypass in URIs by using the 'local-file:' scheme instead (bsc#1130847).
- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-06"/>
	<updated date="2019-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81562" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122319" ref_url="https://bugzilla.suse.com/1122319" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<description>
This update for ghostscript to version 9.26a fixes the following issues:

Security issue fixed:

- CVE-2019-6116: subroutines within pseudo-operators must themselves be pseudo-operators (bsc#1122319)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81563" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1137443" ref_url="https://bugzilla.suse.com/1137443" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This update for vim fixes the following issue:

Security issue fixed: 

- CVE-2019-12735: Fixed a potential arbitrary code execution vulnerability in getchar.c (bsc#1137443).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-11"/>
	<updated date="2019-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81564" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119553" ref_url="https://bugzilla.suse.com/1119553" source="BUGZILLA"/>
		<reference ref_id="1119554" ref_url="https://bugzilla.suse.com/1119554" source="BUGZILLA"/>
		<reference ref_id="1119555" ref_url="https://bugzilla.suse.com/1119555" source="BUGZILLA"/>
		<reference ref_id="1119556" ref_url="https://bugzilla.suse.com/1119556" source="BUGZILLA"/>
		<reference ref_id="1119557" ref_url="https://bugzilla.suse.com/1119557" source="BUGZILLA"/>
		<reference ref_id="1119558" ref_url="https://bugzilla.suse.com/1119558" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4438: Fixed a logic issue which lead to memory corruption (bsc#1119554)
- CVE-2018-4437, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464: 
  Fixed multiple memory corruption issues with improved memory handling 
  (bsc#1119553, bsc#1119555, bsc#1119556, bsc#1119557, bsc#1119558)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-23"/>
	<updated date="2019-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81565" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1065237" ref_url="https://bugzilla.suse.com/1065237" source="BUGZILLA"/>
		<reference ref_id="1090671" ref_url="https://bugzilla.suse.com/1090671" source="BUGZILLA"/>
		<reference ref_id="1119183" ref_url="https://bugzilla.suse.com/1119183" source="BUGZILLA"/>
		<reference ref_id="1121816" ref_url="https://bugzilla.suse.com/1121816" source="BUGZILLA"/>
		<reference ref_id="1121821" ref_url="https://bugzilla.suse.com/1121821" source="BUGZILLA"/>
		<reference ref_id="1131709" ref_url="https://bugzilla.suse.com/1131709" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
  the scp client that could be used to manipulate client output, allowing
  for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
  prevent arbitrary file overwrites when interacting with a malicious SSH server
  (bsc#1121821).

Other issues fixed: 

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1065237">SUSE bug 1065237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090671">SUSE bug 1090671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119183">SUSE bug 1119183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131709">SUSE bug 1131709</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530557" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81566" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1099658" ref_url="https://bugzilla.suse.com/1099658" source="BUGZILLA"/>
		<reference ref_id="1106284" ref_url="https://bugzilla.suse.com/1106284" source="BUGZILLA"/>
		<reference ref_id="1110785" ref_url="https://bugzilla.suse.com/1110785" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1120843" ref_url="https://bugzilla.suse.com/1120843" source="BUGZILLA"/>
		<reference ref_id="1120885" ref_url="https://bugzilla.suse.com/1120885" source="BUGZILLA"/>
		<reference ref_id="1131543" ref_url="https://bugzilla.suse.com/1131543" source="BUGZILLA"/>
		<reference ref_id="1131565" ref_url="https://bugzilla.suse.com/1131565" source="BUGZILLA"/>
		<reference ref_id="1132374" ref_url="https://bugzilla.suse.com/1132374" source="BUGZILLA"/>
		<reference ref_id="1132472" ref_url="https://bugzilla.suse.com/1132472" source="BUGZILLA"/>
		<reference ref_id="1134537" ref_url="https://bugzilla.suse.com/1134537" source="BUGZILLA"/>
		<reference ref_id="1134596" ref_url="https://bugzilla.suse.com/1134596" source="BUGZILLA"/>
		<reference ref_id="1134848" ref_url="https://bugzilla.suse.com/1134848" source="BUGZILLA"/>
		<reference ref_id="1135281" ref_url="https://bugzilla.suse.com/1135281" source="BUGZILLA"/>
		<reference ref_id="1135603" ref_url="https://bugzilla.suse.com/1135603" source="BUGZILLA"/>
		<reference ref_id="1136424" ref_url="https://bugzilla.suse.com/1136424" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136586" ref_url="https://bugzilla.suse.com/1136586" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137586" ref_url="https://bugzilla.suse.com/1137586" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel version 4.4.121 was updated to receive
various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote
  attacker such that one can trigger an integer overflow, leading to a kernel
  panic. (bsc#1137586).

- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which
  would fragment the TCP retransmission queue. A remote attacker may have been
  able to further exploit the fragmented queue to cause an expensive linked-list
  walk for subsequent SACKs received for that same TCP connection.

- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which
  would fragment the RACK send map. A remote attacker may be able to further
  exploit the fragmented send map to cause an expensive linked-list walk for
  subsequent SACKs received for that same TCP connection. This would have
  resulted in excess resource consumption due to low mss values.

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly
  escalate privileges was found in the mwifiex kernel module while connecting
  to a malicious wireless network. (bnc#1136424)

- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in
  drivers/gpu/drm/drm_edid_load.c in the Linux kernel There is an unchecked
  kstrdup of fwstr, which may have allowed an attacker to cause a denial of service
  (NULL pointer dereference and system crash). (bnc#1136586)

- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux
  kernel allowed local attackers to observe page cache access patterns of other
  processes on the same system, potentially allowing sniffing of secret
  information. (Fixing this affects the output of the fincore program.) Limited
  remote exploitation may have been possible, as demonstrated by latency differences
  in accessing public files from an Apache HTTP Server. (bnc#1120843)

- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the
  unused memory region in the extent tree block, which might have allowed local users
  to obtain sensitive information by reading uninitialized data in the
  filesystem. (bnc#1135281)

- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was
  not called before register_netdevice. This allowed local users to cause a denial of 
  service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev
  name containing a / character. This is similar to CVE-2013-4343. (bnc#1135603)

- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid
  programs (such as /bin/su) because install_exec_creds() is called too late in
  load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check
  had a race condition when reading /proc/pid/stat. (bnc#1131543)

- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c
  in the Linux kernel There was a race condition leading to a use-after-free,
  related to net namespace cleanup. (bnc#1134537)

- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c
  in the Linux kernel allowed a local user to obtain potentially sensitive
  information from kernel stack memory via a HIDPCONNADD command, because a
  name field may not have ended with a '\0' character. (bnc#1134848)

- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in
  fs/proc/base.c in the Linux kernel It did not ensure that only root may
  inspect the kernel stack of an arbitrary task, allowing a local attacker to
  exploit racy stack unwinding and leak kernel task stack contents.
  (bnc#1110785)

The following non-security bugs were fixed:

- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1134596).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1134596).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-17"/>
	<updated date="2019-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099658">SUSE bug 1099658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106284">SUSE bug 1106284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131565">SUSE bug 1131565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134596">SUSE bug 1134596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81567" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1137832" ref_url="https://bugzilla.suse.com/1137832" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This update for dbus-1 fixes the following issue:
	  
Security issue fixed:     
    
- CVE-2019-12749: Fixed an implementation flaw in DBUS_COOKIE_SHA1 which 
  could have allowed local attackers to bypass authentication (bsc#1137832).   
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530566" comment="dbus-1-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530567" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530568" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530569" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81568" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-plugins-base fixes the following issue:
Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81569" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136976" ref_url="https://bugzilla.suse.com/1136976" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issue fixed:	  

- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81570" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133375" ref_url="https://bugzilla.suse.com/1133375" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
This update for gstreamer-0_10-plugins-base fixes the following issues:

Security issue fixed:

- CVE-2019-9928: Fixed a heap-based overflow in the rtsp connection parser (bsc#1133375).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521520" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521523" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521525" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81571" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1136570" ref_url="https://bugzilla.suse.com/1136570" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

- Fix the previous fix for CVE-2019-3860 (bsc#1136570, bsc#1128481)
  (Out-of-bounds reads with specially crafted SFTP packets)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-21"/>
	<updated date="2019-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81572" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1132728" ref_url="https://bugzilla.suse.com/1132728" source="BUGZILLA"/>
		<reference ref_id="1132729" ref_url="https://bugzilla.suse.com/1132729" source="BUGZILLA"/>
		<reference ref_id="1132732" ref_url="https://bugzilla.suse.com/1132732" source="BUGZILLA"/>
		<reference ref_id="1132734" ref_url="https://bugzilla.suse.com/1132734" source="BUGZILLA"/>
		<reference ref_id="1134718" ref_url="https://bugzilla.suse.com/1134718" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 35.

Security issues fixed:

- CVE-2019-10245: Fixed Java bytecode verifier issue causing crashes (bsc#1134718).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2697: Fixed flaw inside the 2D component (bsc#1132734).
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw was found in the RMI registry implementation (bsc#1132732).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81573" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536962" comment="kgraft-patch-4_4_121-92_92-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81574" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81575" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552401" comment="kgraft-patch-4_4_121-92_95-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81576" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552402" comment="kgraft-patch-4_4_121-92_98-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81577" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552403" comment="kgraft-patch-4_4_121-92_109-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81578" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552404" comment="kgraft-patch-4_4_121-92_104-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81579" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-21"/>
	<updated date="2019-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552405" comment="kgraft-patch-4_4_121-92_101-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81580" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1138872" ref_url="https://bugzilla.suse.com/1138872" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox Firefox 60.7.2
  MFSA 2019-19 (bsc#1138872)

- CVE-2019-11708: Fix sandbox escape using Prompt:Open.
  * Insufficient vetting of parameters passed with the Prompt:Open IPC
    message between child and parent processes could result in the non-sandboxed
    parent process opening web content chosen by a compromised child process.
    When combined with additional vulnerabilities this could result in executing
    arbitrary code on the user's computer.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-06-22"/>
	<updated date="2019-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530574" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81581" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1133191" ref_url="https://bugzilla.suse.com/1133191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2019-11487: The Linux kernel allowed page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
- CVE-2018-5390: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-08"/>
	<updated date="2019-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552406" comment="kgraft-patch-4_4_121-92_114-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81582" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1138034" ref_url="https://bugzilla.suse.com/1138034" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<description>
This update for postgresql10 to version 10.9 fixes the following issue:

Security issue fixed:	  

- CVE-2019-10164: Fixed buffer-overflow vulnerabilities in SCRAM verifier parsing (bsc#1138034).

More information at https://www.postgresql.org/docs/10/release-10-9.html
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-09"/>
	<updated date="2019-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530577" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530578" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530579" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81583" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1096254" ref_url="https://bugzilla.suse.com/1096254" source="BUGZILLA"/>
		<reference ref_id="1108382" ref_url="https://bugzilla.suse.com/1108382" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1133190" ref_url="https://bugzilla.suse.com/1133190" source="BUGZILLA"/>
		<reference ref_id="1133738" ref_url="https://bugzilla.suse.com/1133738" source="BUGZILLA"/>
		<reference ref_id="1134395" ref_url="https://bugzilla.suse.com/1134395" source="BUGZILLA"/>
		<reference ref_id="1134701" ref_url="https://bugzilla.suse.com/1134701" source="BUGZILLA"/>
		<reference ref_id="1136922" ref_url="https://bugzilla.suse.com/1136922" source="BUGZILLA"/>
		<reference ref_id="1136935" ref_url="https://bugzilla.suse.com/1136935" source="BUGZILLA"/>
		<reference ref_id="1137194" ref_url="https://bugzilla.suse.com/1137194" source="BUGZILLA"/>
		<reference ref_id="1138291" ref_url="https://bugzilla.suse.com/1138291" source="BUGZILLA"/>
		<reference ref_id="1140575" ref_url="https://bugzilla.suse.com/1140575" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#)
- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#)
- CVE-2019-12818: An issue was discovered in the Linux kernel The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. (bnc#1137194)
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() in drivers/net/phy/mdio_bus.c called put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bnc#1138291)
- CVE-2019-12456 a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#)
- CVE-2019-11487: The Linux kernel allowed page-_refcount reference count to overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (bnc#1133190)

The following non-security bugs were fixed:

- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).' This reverts commit 4cc83da426b53d47f1fde9328112364eab1e9a19.
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- x86/cpu: Unify CPU family, model, stepping calculation (bsc#1134701).
- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).
- x86/microcode/AMD: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/AMD: Fix load of builtin microcode with randomized memory (bsc#1134701).
- x86/microcode/AMD: Reload proper initrd start address (bsc#1134701).
- x86/microcode/amd: Hand down the CPU family (bsc#1134701).
- x86/microcode/amd: Move private inlines to .c and mark local functions static (bsc#1134701).
- x86/microcode/intel: Drop stashed AP patch pointer optimization (bsc#1134701).
- x86/microcode/intel: Fix allocation size of struct ucode_patch (bsc#1134701).
- x86/microcode/intel: Fix initrd loading with CONFIG_RANDOMIZE_MEMORY=y (bsc#1134701).
- x86/microcode/intel: Remove intel_lib.c (bsc#1134701).
- x86/microcode/intel: Remove unused arg of get_matching_model_microcode() (bsc#1134701).
- x86/microcode/intel: Rename load_microcode_early() to find_microcode_patch() (bsc#1134701).
- x86/microcode/intel: Rename local variables of type struct mc_saved_data (bsc#1134701).
- x86/microcode/intel: Rename mc_intel variable to mc (bsc#1134701).
- x86/microcode/intel: Rename mc_saved_in_initrd (bsc#1134701).
- x86/microcode/intel: Simplify generic_load_microcode() (bsc#1134701).
- x86/microcode/intel: Unexport save_mc_for_early() (bsc#1134701).
- x86/microcode/intel: Use correct buffer size for saving microcode data (bsc#1134701).
- x86/microcode: Collect CPU info on resume (bsc#1134701).
- x86/microcode: Export the microcode cache linked list (bsc#1134701).
- x86/microcode: Fix loading precedence (bsc#1134701).
- x86/microcode: Get rid of find_cpio_data()'s dummy offset arg (bsc#1134701).
- x86/microcode: Issue the debug printk on resume only on success (bsc#1134701).
- x86/microcode: Rework microcode loading (bsc#1134701).
- x86/microcode: Run the AP-loading routine only on the application processors (bsc#1134701).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1096254">SUSE bug 1096254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108382">SUSE bug 1108382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134701">SUSE bug 1134701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81584" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1139959" ref_url="https://bugzilla.suse.com/1139959" source="BUGZILLA"/>
		<reference ref_id="1140122" ref_url="https://bugzilla.suse.com/1140122" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

Security issue fixed:

- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).

Non-security issue fixed:

- Added explicit requires between libglib2 and libgio2 (bsc#1140122).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-12"/>
	<updated date="2019-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140122">SUSE bug 1140122</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81585" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This update for MozillaFirefox, mozilla-nss fixes the following issues:

MozillaFirefox to version ESR 60.8:

- CVE-2019-9811: Sandbox escape via installation of malicious language pack (bsc#1140868).
- CVE-2019-11711: Script injection within domain through inner window reuse (bsc#1140868).
- CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (bsc#1140868).
- CVE-2019-11713: Use-after-free with HTTP/2 cached stream (bsc#1140868).
- CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (bsc#1140868).
- CVE-2019-11715: HTML parsing error can contribute to content XSS (bsc#1140868).
- CVE-2019-11717: Caret character improperly escaped in origins (bsc#1140868).
- CVE-2019-11719: Out-of-bounds read when importing curve25519 private key (bsc#1140868).
- CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin (bsc#1140868).
- CVE-2019-11709: Multiple Memory safety bugs fixed (bsc#1140868).

mozilla-nss to version 3.44.1:

* Added IPSEC IKE support to softoken 
* Many new FIPS test cases
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-17"/>
	<updated date="2019-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521974" comment="MozillaFirefox-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530589" comment="MozillaFirefox-devel-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521975" comment="MozillaFirefox-translations-common-60.8.0-109.83.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81586" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1118277" ref_url="https://bugzilla.suse.com/1118277" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2018-19788: Fixed handling of UIDs over MAX_UINT (bsc#1118277)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81587" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81588" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552407" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81589" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552408" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81590" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552409" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81591" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552410" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81592" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136446" ref_url="https://bugzilla.suse.com/1136446" source="BUGZILLA"/>
		<reference ref_id="1137597" ref_url="https://bugzilla.suse.com/1137597" source="BUGZILLA"/>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137597">SUSE bug 1137597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552411" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81593" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1140747" ref_url="https://bugzilla.suse.com/1140747" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes one issue.

The following security issue was fixed:

This update contains a regression fix for CVE-2019-11478 (bsc#1140747).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1140747">SUSE bug 1140747</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552412" comment="kgraft-patch-4_4_121-92_114-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81594" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111331" ref_url="https://bugzilla.suse.com/1111331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

This update contains the Intel QSR 2019.1 Microcode release (bsc#1111331)

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the CPU Microcode adjustments for the software mitigations.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Release notes:

---- updated platforms ------------------------------------
SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061d-&gt;0000061f Xeon E3/E5, Core X
SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000714-&gt;00000718 Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81595" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="985657" ref_url="https://bugzilla.suse.com/985657" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

Security issue fixed:

- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81596" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1127223" ref_url="https://bugzilla.suse.com/1127223" source="BUGZILLA"/>
		<reference ref_id="1127308" ref_url="https://bugzilla.suse.com/1127308" source="BUGZILLA"/>
		<reference ref_id="1128574" ref_url="https://bugzilla.suse.com/1128574" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).

Non-security issues fixed:

- Added cfi information for start routines in order to stop unwinding on S390 (bsc#1128574).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-23"/>
	<updated date="2019-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128574">SUSE bug 1128574</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81597" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1105528" ref_url="https://bugzilla.suse.com/1105528" source="BUGZILLA"/>
		<reference ref_id="1108940" ref_url="https://bugzilla.suse.com/1108940" source="BUGZILLA"/>
		<reference ref_id="1114423" ref_url="https://bugzilla.suse.com/1114423" source="BUGZILLA"/>
		<reference ref_id="1115040" ref_url="https://bugzilla.suse.com/1115040" source="BUGZILLA"/>
		<reference ref_id="1115045" ref_url="https://bugzilla.suse.com/1115045" source="BUGZILLA"/>
		<reference ref_id="1115047" ref_url="https://bugzilla.suse.com/1115047" source="BUGZILLA"/>
		<reference ref_id="1116380" ref_url="https://bugzilla.suse.com/1116380" source="BUGZILLA"/>
		<reference ref_id="1117756" ref_url="https://bugzilla.suse.com/1117756" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
  various Bluetooth functions, allowing this to crash qemu process resulting in
  Denial of Service (DoS). (bsc#1117756).
- CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI
  host bus adapter emulation, which allowed a user and/or process to crash the
  qemu process resulting in a Denial of Service (DoS). (bsc#1114423)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed an issue with live migrations, which used to fail when spectre is
  enabled on xen boot cmdline (bsc#1116380)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-04"/>
	<updated date="2019-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105528">SUSE bug 1105528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108940">SUSE bug 1108940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116380">SUSE bug 1116380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81598" version="1" class="patch">
	<metadata>
		<title>Security update for bzip2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1139083" ref_url="https://bugzilla.suse.com/1139083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for bzip2 fixes the following issues:

- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
  with files that used many selectors (bsc#1139083).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-29"/>
	<updated date="2019-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81599" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<description>
This update for polkit fixes the following issues:

Security issue fixed:

- CVE-2019-6133: Fixed improper caching of auth decisions, which could bypass 
  uid checking in the interactive backend (bsc#1121826).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81600" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1115375" ref_url="https://bugzilla.suse.com/1115375" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141784" ref_url="https://bugzilla.suse.com/1141784" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141786" ref_url="https://bugzilla.suse.com/1141786" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u222 fixes the following issues:

Security issues fixed:

- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
- CVE-2019-2762: Exceptional throw cases (bsc#1141782).
- CVE-2019-2766: Improve file protocol handling (bsc#1141789).
- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
- CVE-2019-2786: More limited privilege usage (bsc#1141787).
- CVE-2019-2816: Normalize normalization (bsc#1141785).
- CVE-2019-2842: Extended AES support (bsc#1141786).
- CVE-2019-7317: Improve PNG support (bsc#1141780).
- Certificate validation improvements

Non-security issue fixed:

- Fixed an issue where the installation failed when the manpages are not present (bsc#1115375)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-01"/>
	<updated date="2019-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1115375">SUSE bug 1115375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81601" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1013882" ref_url="https://bugzilla.suse.com/1013882" source="BUGZILLA"/>
		<reference ref_id="1101676" ref_url="https://bugzilla.suse.com/1101676" source="BUGZILLA"/>
		<reference ref_id="1101677" ref_url="https://bugzilla.suse.com/1101677" source="BUGZILLA"/>
		<reference ref_id="1101678" ref_url="https://bugzilla.suse.com/1101678" source="BUGZILLA"/>
		<reference ref_id="1103342" ref_url="https://bugzilla.suse.com/1103342" source="BUGZILLA"/>
		<reference ref_id="1112368" ref_url="https://bugzilla.suse.com/1112368" source="BUGZILLA"/>
		<reference ref_id="1112397" ref_url="https://bugzilla.suse.com/1112397" source="BUGZILLA"/>
		<reference ref_id="1112417" ref_url="https://bugzilla.suse.com/1112417" source="BUGZILLA"/>
		<reference ref_id="1112421" ref_url="https://bugzilla.suse.com/1112421" source="BUGZILLA"/>
		<reference ref_id="1112432" ref_url="https://bugzilla.suse.com/1112432" source="BUGZILLA"/>
		<reference ref_id="1116686" ref_url="https://bugzilla.suse.com/1116686" source="BUGZILLA"/>
		<reference ref_id="1118754" ref_url="https://bugzilla.suse.com/1118754" source="BUGZILLA"/>
		<reference ref_id="1132666" ref_url="https://bugzilla.suse.com/1132666" source="BUGZILLA"/>
		<reference ref_id="1136037" ref_url="https://bugzilla.suse.com/1136037" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

Update to MariaDB 10.0.38 GA (bsc#1136037).

Security issues fixed:

- CVE-2019-2537: Denial of service via multiple protocols (bsc#1136037)
- CVE-2019-2529: Denial of service via multiple protocols (bsc#1136037)
- CVE-2018-3282: Server Storage Engines unspecified vulnerability (CPU Oct 2018) (bsc#1112432)
- CVE-2018-3251: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112397)
- CVE-2018-3174: Client programs unspecified vulnerability (CPU Oct 2018) (bsc#1112368)
- CVE-2018-3156: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112417)
- CVE-2018-3143: InnoDB unspecified vulnerability (CPU Oct 2018) (bsc#1112421)
- CVE-2018-3066: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Options). (bsc#1101678)
- CVE-2018-3064: InnoDB unspecified vulnerability (CPU Jul 2018) (bsc#1103342)
- CVE-2018-3063: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent Server Security Privileges). (bsc#1101677)
- CVE-2018-3058: Unspecified vulnerability in the MySQL Server component of Oracle MySQL (subcomponent MyISAM). (bsc#1101676)
- CVE-2016-9843: Big-endian out-of-bounds pointer (bsc#1013882)

Non-security changes:

- Removed PerconaFT from the package as it has AGPL licence (bsc#1118754).
- Do not just remove tokudb plugin but don't build it at all (missing jemalloc dependency).
- Fixed reading options for multiple instances if my${INSTANCE}.cnf is used (bsc#1132666).
- Removed 'umask 077' from mysql-systemd-helper that caused new datadirs created 
  with wrong permissions (bsc#1132666).

Release notes and changelog:

- https://kb.askmonty.org/en/mariadb-10038-release-notes
- https://kb.askmonty.org/en/mariadb-10038-changelog
- https://kb.askmonty.org/en/mariadb-10037-release-notes
- https://kb.askmonty.org/en/mariadb-10037-changelog
- https://kb.askmonty.org/en/mariadb-10036-release-notes
- https://kb.askmonty.org/en/mariadb-10036-changelog
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-05"/>
	<updated date="2019-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118754">SUSE bug 1118754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132666">SUSE bug 1132666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81602" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1109663" ref_url="https://bugzilla.suse.com/1109663" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-14647: Fixed a denial of service vulnerability caused by a crafted XML document (bsc#1109847).
- CVE-2018-1000802: Fixed a command injection in the shutil module (bsc#1109663).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-06"/>
	<updated date="2019-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81603" version="1" class="patch">
	<metadata>
		<title>Security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133037" ref_url="https://bugzilla.suse.com/1133037" source="BUGZILLA"/>
		<reference ref_id="1141619" ref_url="https://bugzilla.suse.com/1141619" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
This update for evince fixes the following issues:

Security issues fixed: 	  

- CVE-2019-11459: Fixed an improper error handling in which could have led to use of uninitialized use of memory (bsc#1133037).
- CVE-2019-1010006: Fixed a buffer overflow in backend/tiff/tiff-document.c (bsc#1141619).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-07"/>
	<updated date="2019-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81604" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1140738" ref_url="https://bugzilla.suse.com/1140738" source="BUGZILLA"/>
		<reference ref_id="1141329" ref_url="https://bugzilla.suse.com/1141329" source="BUGZILLA"/>
		<reference ref_id="1141332" ref_url="https://bugzilla.suse.com/1141332" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

Security issue fixed:

- CVE-2019-12529: Fixed a potential denial of service associated with HTTP Basic Authentication credentials (bsc#1141329).
- CVE-2019-12525: Fixed a denial of service during processing of HTTP Digest Authentication credentials (bsc#1141332).
- CVE-2019-13345: Fixed a cross site scripting vulnerability via user_name or auth parameter in cachemgr.cgi (bsc#1140738).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-08"/>
	<updated date="2019-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81605" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1138459" ref_url="https://bugzilla.suse.com/1138459" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-10160: Fixed a regression in urlparse() and urlsplit() introduced by the fix for CVE-2019-9636 (bsc#1138459).
- CVE-2018-20852: Fixed an information leak where cookies could be send to the wrong server because of incorrect domain validation (bsc#1141853).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-23"/>
	<updated date="2019-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81606" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1133719" ref_url="https://bugzilla.suse.com/1133719" source="BUGZILLA"/>
		<reference ref_id="1138301" ref_url="https://bugzilla.suse.com/1138301" source="BUGZILLA"/>
		<reference ref_id="1138303" ref_url="https://bugzilla.suse.com/1138303" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed:

- CVE-2019-10161: Fixed virDomainSaveImageGetXMLDesc API which could accept a path
  parameter pointing anywhere on the system and potentially leading to execution
  of a malicious file with root privileges by libvirtd (bsc#1138301).
- CVE-2019-10167: Fixed an issue with virConnectGetDomainCapabilities API which
  could have been used to execute arbitrary emulators (bsc#1138303).

Non-security issue fixed:

- qemu: Add support for overriding max threads per process limit (bsc#1133719)
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-09"/>
	<updated date="2019-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133719">SUSE bug 1133719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530630" comment="libvirt-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530631" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530632" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530633" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530634" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530635" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530637" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530638" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530639" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530640" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530641" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530642" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530643" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530644" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530645" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530646" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530648" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530649" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530650" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81607" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1135902" ref_url="https://bugzilla.suse.com/1135902" source="BUGZILLA"/>
		<reference ref_id="1140402" ref_url="https://bugzilla.suse.com/1140402" source="BUGZILLA"/>
		<reference ref_id="1143794" ref_url="https://bugzilla.suse.com/1143794" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-14378: Security fix for heap overflow in ip_reass on big packet input (bsc#1143794).
- CVE-2019-12155: Security fix for null pointer dereference while releasing spice resources (bsc#1135902).
- CVE-2019-13164: Security fix for qemu-bridge-helper ACL can be bypassed when names are too long (bsc#1140402).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-06"/>
	<updated date="2019-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530651" comment="qemu-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530652" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530654" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530655" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530657" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530658" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530661" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81608" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql94 fixes the following issues:

Security issue fixed:

- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530664" comment="postgresql94-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530665" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530667" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530668" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530669" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530670" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81609" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1145092" ref_url="https://bugzilla.suse.com/1145092" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:                    
                                                                                          
Security issue fixed:                                                                                 
                                                                                  
- CVE-2019-10208: Fixed arbitrary SQL execution via suitable SECURITY DEFINER function under the identity of the function owner (bsc#1145092).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81610" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes one issue.

The following security issue was fixed:

- CVE-2018-5390: Fixed expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-08-28"/>
	<updated date="2019-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552413" comment="kgraft-patch-4_4_121-92_117-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81611" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1114674" ref_url="https://bugzilla.suse.com/1114674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

Security issue fixed:

- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81612" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1049825" ref_url="https://bugzilla.suse.com/1049825" source="BUGZILLA"/>
		<reference ref_id="1109893" ref_url="https://bugzilla.suse.com/1109893" source="BUGZILLA"/>
		<reference ref_id="1110542" ref_url="https://bugzilla.suse.com/1110542" source="BUGZILLA"/>
		<reference ref_id="1111319" ref_url="https://bugzilla.suse.com/1111319" source="BUGZILLA"/>
		<reference ref_id="1112911" ref_url="https://bugzilla.suse.com/1112911" source="BUGZILLA"/>
		<reference ref_id="1113296" ref_url="https://bugzilla.suse.com/1113296" source="BUGZILLA"/>
		<reference ref_id="1116995" ref_url="https://bugzilla.suse.com/1116995" source="BUGZILLA"/>
		<reference ref_id="1120629" ref_url="https://bugzilla.suse.com/1120629" source="BUGZILLA"/>
		<reference ref_id="1120630" ref_url="https://bugzilla.suse.com/1120630" source="BUGZILLA"/>
		<reference ref_id="1120631" ref_url="https://bugzilla.suse.com/1120631" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1131823" ref_url="https://bugzilla.suse.com/1131823" source="BUGZILLA"/>
		<reference ref_id="1134226" ref_url="https://bugzilla.suse.com/1134226" source="BUGZILLA"/>
		<reference ref_id="1137977" ref_url="https://bugzilla.suse.com/1137977" source="BUGZILLA"/>
		<reference ref_id="1140039" ref_url="https://bugzilla.suse.com/1140039" source="BUGZILLA"/>
		<reference ref_id="1145521" ref_url="https://bugzilla.suse.com/1145521" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This update for libsolv, libzypp and zypper fixes the following issues:

libsolv was updated to version 0.6.36 and fixes the following issues:

Security issues fixed:

- CVE-2018-20532: Fixed a NULL pointer dereference in testcase_read() (bsc#1120629).
- CVE-2018-20533: Fixed a NULL pointer dereference in testcase_str2dep_complex() (bsc#1120630).
- CVE-2018-20534: Fixed a NULL pointer dereference in pool_whatprovides() (bsc#1120631).

Non-security issues fixed:

- Made cleandeps jobs on patterns work (bsc#1137977).
- Fixed an issue multiversion packages that obsolete their own name (bsc#1127155).
- Keep consistent package name if there are multiple alternatives (bsc#1131823).

Fixes for libzypp:

- Fixes a bug where locking the kernel was not possible (bsc#1113296)
- Fixes a file descriptor leak (bsc#1116995)
- Will now run file conflict check on dry-run (best with download-only) (bsc#1140039)

Fixes for zypper:

- Fixes a bug where the wrong exit code was set when refreshing repos if --root was used (bsc#1134226)
- Improved the displaying of locks (bsc#1112911)
- Fixes an issue where `https` repository urls caused an error prompt to appear twice (bsc#1110542)
- zypper will now always warn when no repositories are defined (bsc#1109893)
- Fixes bash completion option detection (bsc#1049825)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-02"/>
	<updated date="2019-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1049825">SUSE bug 1049825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109893">SUSE bug 1109893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110542">SUSE bug 1110542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111319">SUSE bug 1111319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112911">SUSE bug 1112911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113296">SUSE bug 1113296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116995">SUSE bug 1116995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131823">SUSE bug 1131823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134226">SUSE bug 1134226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137977">SUSE bug 1137977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140039">SUSE bug 1140039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145521">SUSE bug 1145521</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81613" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1045640" ref_url="https://bugzilla.suse.com/1045640" source="BUGZILLA"/>
		<reference ref_id="1076033" ref_url="https://bugzilla.suse.com/1076033" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="1130972" ref_url="https://bugzilla.suse.com/1130972" source="BUGZILLA"/>
		<reference ref_id="1134399" ref_url="https://bugzilla.suse.com/1134399" source="BUGZILLA"/>
		<reference ref_id="1139358" ref_url="https://bugzilla.suse.com/1139358" source="BUGZILLA"/>
		<reference ref_id="1140012" ref_url="https://bugzilla.suse.com/1140012" source="BUGZILLA"/>
		<reference ref_id="1140652" ref_url="https://bugzilla.suse.com/1140652" source="BUGZILLA"/>
		<reference ref_id="1140903" ref_url="https://bugzilla.suse.com/1140903" source="BUGZILLA"/>
		<reference ref_id="1140945" ref_url="https://bugzilla.suse.com/1140945" source="BUGZILLA"/>
		<reference ref_id="1141401" ref_url="https://bugzilla.suse.com/1141401" source="BUGZILLA"/>
		<reference ref_id="1141402" ref_url="https://bugzilla.suse.com/1141402" source="BUGZILLA"/>
		<reference ref_id="1141452" ref_url="https://bugzilla.suse.com/1141452" source="BUGZILLA"/>
		<reference ref_id="1141453" ref_url="https://bugzilla.suse.com/1141453" source="BUGZILLA"/>
		<reference ref_id="1141454" ref_url="https://bugzilla.suse.com/1141454" source="BUGZILLA"/>
		<reference ref_id="1141628" ref_url="https://bugzilla.suse.com/1141628" source="BUGZILLA"/>
		<reference ref_id="1142023" ref_url="https://bugzilla.suse.com/1142023" source="BUGZILLA"/>
		<reference ref_id="1142098" ref_url="https://bugzilla.suse.com/1142098" source="BUGZILLA"/>
		<reference ref_id="1142857" ref_url="https://bugzilla.suse.com/1142857" source="BUGZILLA"/>
		<reference ref_id="1143045" ref_url="https://bugzilla.suse.com/1143045" source="BUGZILLA"/>
		<reference ref_id="1143048" ref_url="https://bugzilla.suse.com/1143048" source="BUGZILLA"/>
		<reference ref_id="1143189" ref_url="https://bugzilla.suse.com/1143189" source="BUGZILLA"/>
		<reference ref_id="1143191" ref_url="https://bugzilla.suse.com/1143191" source="BUGZILLA"/>
		<reference ref_id="1144257" ref_url="https://bugzilla.suse.com/1144257" source="BUGZILLA"/>
		<reference ref_id="1144273" ref_url="https://bugzilla.suse.com/1144273" source="BUGZILLA"/>
		<reference ref_id="1144288" ref_url="https://bugzilla.suse.com/1144288" source="BUGZILLA"/>
		<reference ref_id="1144920" ref_url="https://bugzilla.suse.com/1144920" source="BUGZILLA"/>
		<reference ref_id="1145920" ref_url="https://bugzilla.suse.com/1145920" source="BUGZILLA"/>
		<reference ref_id="1145922" ref_url="https://bugzilla.suse.com/1145922" source="BUGZILLA"/>
		<reference ref_id="1146163" ref_url="https://bugzilla.suse.com/1146163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<description>
 The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).


The following non-security bugs were fixed:

- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
- i40e: add functions to control default VSI (bsc#1141628).
- i40e: set default VSI without a reset (bsc#1141628).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
- sched/fair: Do not free p-&gt;numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for -&gt;numa_group (bsc#1144920).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-05"/>
	<updated date="2019-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1045640">SUSE bug 1045640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076033">SUSE bug 1076033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130972">SUSE bug 1130972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140012">SUSE bug 1140012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140652">SUSE bug 1140652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140903">SUSE bug 1140903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140945">SUSE bug 1140945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141401">SUSE bug 1141401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141402">SUSE bug 1141402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141452">SUSE bug 1141452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141453">SUSE bug 1141453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141454">SUSE bug 1141454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141628">SUSE bug 1141628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142098">SUSE bug 1142098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144257">SUSE bug 1144257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144273">SUSE bug 1144273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144288">SUSE bug 1144288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144920">SUSE bug 1144920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81614" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122706" ref_url="https://bugzilla.suse.com/1122706" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

Security issue fixed:

- CVE-2019-3813: Fixed a out-of-bounds read in the memslot_get_virt function that could lead to denial-of-service or code-execution (bsc#1122706).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530687" comment="libspice-server1-0.12.7-10.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81615" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Update to Java 7.1 Service Refresh 4 Fix Pack 50.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-09"/>
	<updated date="2019-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81616" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1149496" ref_url="https://bugzilla.suse.com/1149496" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81617" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1135715" ref_url="https://bugzilla.suse.com/1135715" source="BUGZILLA"/>
		<reference ref_id="1148931" ref_url="https://bugzilla.suse.com/1148931" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Updated to version 2.24.4 (bsc#1148931).

Security issues fixed:
	  
- CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8669, CVE-2019-8678,
  CVE-2019-8680, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8595,
  CVE-2019-8607, CVE-2019-8615, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658,
  CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673,
  CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680,
  CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687,
  CVE-2019-8688, CVE-2019-8689, CVE-2019-8690

Non-security issues fixed:
	  
- Improved loading of multimedia streams to avoid memory exhaustion due to excessive caching.
- Updated the user agent string to make happy certain websites which would claim that the browser being used was unsupported.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-11"/>
	<updated date="2019-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81618" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1141780" ref_url="https://bugzilla.suse.com/1141780" source="BUGZILLA"/>
		<reference ref_id="1141782" ref_url="https://bugzilla.suse.com/1141782" source="BUGZILLA"/>
		<reference ref_id="1141783" ref_url="https://bugzilla.suse.com/1141783" source="BUGZILLA"/>
		<reference ref_id="1141785" ref_url="https://bugzilla.suse.com/1141785" source="BUGZILLA"/>
		<reference ref_id="1141787" ref_url="https://bugzilla.suse.com/1141787" source="BUGZILLA"/>
		<reference ref_id="1141789" ref_url="https://bugzilla.suse.com/1141789" source="BUGZILLA"/>
		<reference ref_id="1147021" ref_url="https://bugzilla.suse.com/1147021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 5 Fix Pack 40.

Security issues fixed:

- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-12"/>
	<updated date="2019-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81619" version="1" class="patch">
	<metadata>
		<title>Security update for ibus (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1150011" ref_url="https://bugzilla.suse.com/1150011" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
This update for ibus fixes the following issues:

Security issue fixed:

- CVE-2019-14822: Fixed a misconfiguration of the DBus server that allowed an unprivileged user to monitor and send method calls to the ibus bus of another user. (bsc#1150011)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-17"/>
	<updated date="2019-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81620" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1150003" ref_url="https://bugzilla.suse.com/1150003" source="BUGZILLA"/>
		<reference ref_id="1150250" ref_url="https://bugzilla.suse.com/1150250" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance (bsc#1150003).
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-20"/>
	<updated date="2019-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81621" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1120644" ref_url="https://bugzilla.suse.com/1120644" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-05"/>
	<updated date="2019-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81622" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1149294" ref_url="https://bugzilla.suse.com/1149294" source="BUGZILLA"/>
		<reference ref_id="1149295" ref_url="https://bugzilla.suse.com/1149295" source="BUGZILLA"/>
		<reference ref_id="1149296" ref_url="https://bugzilla.suse.com/1149296" source="BUGZILLA"/>
		<reference ref_id="1149297" ref_url="https://bugzilla.suse.com/1149297" source="BUGZILLA"/>
		<reference ref_id="1149298" ref_url="https://bugzilla.suse.com/1149298" source="BUGZILLA"/>
		<reference ref_id="1149299" ref_url="https://bugzilla.suse.com/1149299" source="BUGZILLA"/>
		<reference ref_id="1149303" ref_url="https://bugzilla.suse.com/1149303" source="BUGZILLA"/>
		<reference ref_id="1149304" ref_url="https://bugzilla.suse.com/1149304" source="BUGZILLA"/>
		<reference ref_id="1149324" ref_url="https://bugzilla.suse.com/1149324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox to ESR 60.9 fixes the following issues:

Security issues fixed:

- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-23"/>
	<updated date="2019-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522212" comment="MozillaFirefox-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530709" comment="MozillaFirefox-devel-60.9.0-109.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522213" comment="MozillaFirefox-translations-common-60.9.0-109.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81623" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1145559" ref_url="https://bugzilla.suse.com/1145559" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2019-11500: Fixed a potential remote code execution in the IMAP and ManageSieve protocol parsers (bsc#1145559).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-24"/>
	<updated date="2019-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81624" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1129180" ref_url="https://bugzilla.suse.com/1129180" source="BUGZILLA"/>
		<reference ref_id="1131863" ref_url="https://bugzilla.suse.com/1131863" source="BUGZILLA"/>
		<reference ref_id="1134156" ref_url="https://bugzilla.suse.com/1134156" source="BUGZILLA"/>
		<reference ref_id="1140359" ref_url="https://bugzilla.suse.com/1140359" source="BUGZILLA"/>
		<reference ref_id="1146882" ref_url="https://bugzilla.suse.com/1146882" source="BUGZILLA"/>
		<reference ref_id="1146884" ref_url="https://bugzilla.suse.com/1146884" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<description>
This update for ghostscript to 9.27 fixes the following issues:

Security issues fixed:

- CVE-2019-3835: Fixed an unauthorized file system access caused by an available superexec operator.  (bsc#1129180)
- CVE-2019-3839: Fixed an unauthorized file system access caused by available privileged operators. (bsc#1134156)
- CVE-2019-12973: Fixed a denial-of-service vulnerability in the OpenJPEG function opj_t1_encode_cblks. (bsc#1140359)
- CVE-2019-14811: Fixed a safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator. (bsc#1146882)
- CVE-2019-14812: Fixed a safer mode bypass by .forceput exposure in setuserparams. (bsc#1146882)
- CVE-2019-14813: Fixed a safer mode bypass by .forceput exposure in setsystemparams. (bsc#1146882)
- CVE-2019-14817: Fixed a safer mode bypass by .forceput exposure in .pdfexectoken and other procedures. (bsc#1146884)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-09-26"/>
	<updated date="2019-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131863">SUSE bug 1131863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81625" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1123371" ref_url="https://bugzilla.suse.com/1123371" source="BUGZILLA"/>
		<reference ref_id="1123377" ref_url="https://bugzilla.suse.com/1123377" source="BUGZILLA"/>
		<reference ref_id="1123378" ref_url="https://bugzilla.suse.com/1123378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-06"/>
	<updated date="2019-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81626" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1148987" ref_url="https://bugzilla.suse.com/1148987" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This update for libgcrypt fixes the following issues:

Security issues fixed:
	  
- CVE-2019-13627: Mitigated ECDSA timing attack. (bsc#1148987)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-01"/>
	<updated date="2019-10-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81627" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552414" comment="kgraft-patch-4_4_121-92_95-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81628" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552415" comment="kgraft-patch-4_4_121-92_98-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81629" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2018-5390: Fixed a denial of service ('SegmentSmack') in tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552416" comment="kgraft-patch-4_4_121-92_120-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81630" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552417" comment="kgraft-patch-4_4_121-92_117-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81631" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552418" comment="kgraft-patch-4_4_121-92_114-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81632" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552419" comment="kgraft-patch-4_4_121-92_109-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81633" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552420" comment="kgraft-patch-4_4_121-92_104-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81634" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1151021" ref_url="https://bugzilla.suse.com/1151021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes one issue.

The following security issue was fixed:

- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-08"/>
	<updated date="2019-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552421" comment="kgraft-patch-4_4_121-92_101-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81635" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1087200" ref_url="https://bugzilla.suse.com/1087200" source="BUGZILLA"/>
		<reference ref_id="1109465" ref_url="https://bugzilla.suse.com/1109465" source="BUGZILLA"/>
		<reference ref_id="1117473" ref_url="https://bugzilla.suse.com/1117473" source="BUGZILLA"/>
		<reference ref_id="1123482" ref_url="https://bugzilla.suse.com/1123482" source="BUGZILLA"/>
		<reference ref_id="1124525" ref_url="https://bugzilla.suse.com/1124525" source="BUGZILLA"/>
		<reference ref_id="1133810" ref_url="https://bugzilla.suse.com/1133810" source="BUGZILLA"/>
		<reference ref_id="1140868" ref_url="https://bugzilla.suse.com/1140868" source="BUGZILLA"/>
		<reference ref_id="1145665" ref_url="https://bugzilla.suse.com/1145665" source="BUGZILLA"/>
		<reference ref_id="1149323" ref_url="https://bugzilla.suse.com/1149323" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Updated to new ESR version 68.1 (bsc#1149323).

In addition to the already fixed vulnerabilities released in previous ESR updates,
the following were also fixed:
    CVE-2019-11751, CVE-2019-11736, CVE-2019-9812, CVE-2019-11748, CVE-2019-11749,
    CVE-2019-11750, CVE-2019-11738, CVE-2019-11747, CVE-2019-11735.

Several run-time issues were also resolved (bsc#1117473, bsc#1124525, bsc#1133810).

The version displayed in Help &gt; About is now correct (bsc#1087200).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-09"/>
	<updated date="2019-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087200">SUSE bug 1087200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109465">SUSE bug 1109465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117473">SUSE bug 1117473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123482">SUSE bug 1123482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124525">SUSE bug 1124525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133810">SUSE bug 1133810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81636" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1109412" ref_url="https://bugzilla.suse.com/1109412" source="BUGZILLA"/>
		<reference ref_id="1109413" ref_url="https://bugzilla.suse.com/1109413" source="BUGZILLA"/>
		<reference ref_id="1109414" ref_url="https://bugzilla.suse.com/1109414" source="BUGZILLA"/>
		<reference ref_id="1111996" ref_url="https://bugzilla.suse.com/1111996" source="BUGZILLA"/>
		<reference ref_id="1112534" ref_url="https://bugzilla.suse.com/1112534" source="BUGZILLA"/>
		<reference ref_id="1112535" ref_url="https://bugzilla.suse.com/1112535" source="BUGZILLA"/>
		<reference ref_id="1113247" ref_url="https://bugzilla.suse.com/1113247" source="BUGZILLA"/>
		<reference ref_id="1113252" ref_url="https://bugzilla.suse.com/1113252" source="BUGZILLA"/>
		<reference ref_id="1113255" ref_url="https://bugzilla.suse.com/1113255" source="BUGZILLA"/>
		<reference ref_id="1116827" ref_url="https://bugzilla.suse.com/1116827" source="BUGZILLA"/>
		<reference ref_id="1118830" ref_url="https://bugzilla.suse.com/1118830" source="BUGZILLA"/>
		<reference ref_id="1118831" ref_url="https://bugzilla.suse.com/1118831" source="BUGZILLA"/>
		<reference ref_id="1120640" ref_url="https://bugzilla.suse.com/1120640" source="BUGZILLA"/>
		<reference ref_id="1121034" ref_url="https://bugzilla.suse.com/1121034" source="BUGZILLA"/>
		<reference ref_id="1121035" ref_url="https://bugzilla.suse.com/1121035" source="BUGZILLA"/>
		<reference ref_id="1121056" ref_url="https://bugzilla.suse.com/1121056" source="BUGZILLA"/>
		<reference ref_id="1133131" ref_url="https://bugzilla.suse.com/1133131" source="BUGZILLA"/>
		<reference ref_id="1133232" ref_url="https://bugzilla.suse.com/1133232" source="BUGZILLA"/>
		<reference ref_id="1141913" ref_url="https://bugzilla.suse.com/1141913" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to current 2.32 branch @7b468db3 [jsc#ECO-368]:

Includes the following security fixes:

- CVE-2018-17358: Fixed invalid memory access in _bfd_stab_section_find_nearest_line in syms.c (bsc#1109412)
- CVE-2018-17359: Fixed invalid memory access exists in bfd_zalloc in opncls.c (bsc#1109413)
- CVE-2018-17360: Fixed heap-based buffer over-read in bfd_getl32 in libbfd.c (bsc#1109414)
- CVE-2018-17985: Fixed a stack consumption problem caused by the cplus_demangle_type (bsc#1116827)
- CVE-2018-18309: Fixed an invalid memory address dereference was discovered in read_reloc in reloc.c (bsc#1111996)
- CVE-2018-18483: Fixed get_count function provided by libiberty that allowed attackers to cause a denial of service or other unspecified impact (bsc#1112535)
- CVE-2018-18484: Fixed stack exhaustion in the C++ demangling functions provided by libiberty, caused by recursive stack frames (bsc#1112534)
- CVE-2018-18605: Fixed a heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup causing a denial of service (bsc#1113255)
- CVE-2018-18606: Fixed a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments, causing denial of service (bsc#1113252)
- CVE-2018-18607: Fixed a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section, causing denial of service (bsc#1113247)
- CVE-2018-19931: Fixed a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h (bsc#1118831)
- CVE-2018-19932: Fixed an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA (bsc#1118830)
- CVE-2018-20623: Fixed a use-after-free in the error function in elfcomm.c (bsc#1121035)
- CVE-2018-20651: Fixed a denial of service via a NULL pointer dereference in elf_link_add_object_symbols in elflink.c (bsc#1121034)
- CVE-2018-20671: Fixed an integer overflow that can trigger a heap-based buffer overflow in  load_specific_debug_section in objdump.c (bsc#1121056)
- CVE-2018-1000876: Fixed integer overflow in bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc in objdump (bsc#1120640)
- CVE-2019-1010180: Fixed an out of bound memory access that could lead to crashes (bsc#1142772)

- Enable xtensa architecture (Tensilica lc6 and related)
- Use -ffat-lto-objects in order to provide assembly for static libs
  (bsc#1141913).
- Fixed some LTO problems (bsc#1133131 bsc#1133232).
- riscv: Don't check ABI flags if no code section

Update to binutils 2.32:

* The binutils now support for the C-SKY processor series.
* The x86 assembler now supports a -mvexwig=[0|1] option to control
  encoding of VEX.W-ignored (WIG) VEX instructions.
  It also has a new -mx86-used-note=[yes|no] option to generate (or
  not) x86 GNU property notes.
* The MIPS assembler now supports the Loongson EXTensions R2 (EXT2),
  the Loongson EXTensions (EXT) instructions, the Loongson Content
  Address Memory (CAM) ASE and the Loongson MultiMedia extensions
  Instructions (MMI) ASE.
* The addr2line, c++filt, nm and objdump tools now have a default
  limit on the maximum amount of recursion that is allowed whilst
  demangling strings.  This limit can be disabled if necessary.
* Objdump's --disassemble option can now take a parameter,
  specifying the starting symbol for disassembly.  Disassembly will
  continue from this symbol up to the next symbol or the end of the
  function.
* The BFD linker will now report property change in linker map file
  when merging GNU properties.
* The BFD linker's -t option now doesn't report members within
  archives, unless -t is given twice.  This makes it more useful
  when generating a list of files that should be packaged for a
  linker bug report.
* The GOLD linker has improved warning messages for relocations that
  refer to discarded sections.

- Improve relro support on s390 [fate#326356]
- Handle ELF compressed header alignment correctly.

  		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-14"/>
	<updated date="2019-10-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133131">SUSE bug 1133131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133232">SUSE bug 1133232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141913">SUSE bug 1141913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81637" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153674" ref_url="https://bugzilla.suse.com/1153674" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2019-14287: Fixed an issue where a user with sudo privileges 
  that allowed them to run commands with an arbitrary uid, could 
  run commands as root, despite being forbidden to do so in sudoers
  (bsc#1153674).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530718" comment="sudo-1.8.10p3-10.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81638" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153332" ref_url="https://bugzilla.suse.com/1153332" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2019-15165: Added sanity checks for PHB header length before allocating memory (bsc#1153332).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-15"/>
	<updated date="2019-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81639" version="1" class="patch">
	<metadata>
		<title>Security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1150733" ref_url="https://bugzilla.suse.com/1150733" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
This update for nfs-utils fixes the following issues:

- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530719" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81640" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1143797" ref_url="https://bugzilla.suse.com/1143797" source="BUGZILLA"/>
		<reference ref_id="1146874" ref_url="https://bugzilla.suse.com/1146874" source="BUGZILLA"/>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340/" source="CVE"/>
		<reference ref_id="CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341/" source="CVE"/>
		<reference ref_id="CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342/" source="CVE"/>
		<reference ref_id="CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343/" source="CVE"/>
		<reference ref_id="CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344/" source="CVE"/>
		<reference ref_id="CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346/" source="CVE"/>
		<reference ref_id="CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347/" source="CVE"/>
		<reference ref_id="CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348/" source="CVE"/>
		<description>
This update for xen fixes the following issues:
	  
- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator
  which could have led to Denial of Service (bsc#1149813).
- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of 
  service (bsc#1146874).
- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU 
  emulator which could have led to execution of  arbitrary code with privileges of the 
  QEMU process (bsc#1143797).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-25"/>
	<updated date="2019-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81641" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552422" comment="kgraft-patch-4_4_121-92_98-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81642" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552423" comment="kgraft-patch-4_4_121-92_101-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81643" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552424" comment="kgraft-patch-4_4_121-92_104-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81644" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552425" comment="kgraft-patch-4_4_121-92_109-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81645" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552426" comment="kgraft-patch-4_4_121-92_114-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81646" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552427" comment="kgraft-patch-4_4_121-92_117-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81647" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1153161" ref_url="https://bugzilla.suse.com/1153161" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-30"/>
	<updated date="2019-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552428" comment="kgraft-patch-4_4_121-92_120-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81648" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1010399" ref_url="https://bugzilla.suse.com/1010399" source="BUGZILLA"/>
		<reference ref_id="1010405" ref_url="https://bugzilla.suse.com/1010405" source="BUGZILLA"/>
		<reference ref_id="1010406" ref_url="https://bugzilla.suse.com/1010406" source="BUGZILLA"/>
		<reference ref_id="1010408" ref_url="https://bugzilla.suse.com/1010408" source="BUGZILLA"/>
		<reference ref_id="1010409" ref_url="https://bugzilla.suse.com/1010409" source="BUGZILLA"/>
		<reference ref_id="1010421" ref_url="https://bugzilla.suse.com/1010421" source="BUGZILLA"/>
		<reference ref_id="1010423" ref_url="https://bugzilla.suse.com/1010423" source="BUGZILLA"/>
		<reference ref_id="1010424" ref_url="https://bugzilla.suse.com/1010424" source="BUGZILLA"/>
		<reference ref_id="1010425" ref_url="https://bugzilla.suse.com/1010425" source="BUGZILLA"/>
		<reference ref_id="1010426" ref_url="https://bugzilla.suse.com/1010426" source="BUGZILLA"/>
		<reference ref_id="1025108" ref_url="https://bugzilla.suse.com/1025108" source="BUGZILLA"/>
		<reference ref_id="1043008" ref_url="https://bugzilla.suse.com/1043008" source="BUGZILLA"/>
		<reference ref_id="1047281" ref_url="https://bugzilla.suse.com/1047281" source="BUGZILLA"/>
		<reference ref_id="1074235" ref_url="https://bugzilla.suse.com/1074235" source="BUGZILLA"/>
		<reference ref_id="1092611" ref_url="https://bugzilla.suse.com/1092611" source="BUGZILLA"/>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1137990" ref_url="https://bugzilla.suse.com/1137990" source="BUGZILLA"/>
		<reference ref_id="1149429" ref_url="https://bugzilla.suse.com/1149429" source="BUGZILLA"/>
		<reference ref_id="1154738" ref_url="https://bugzilla.suse.com/1154738" source="BUGZILLA"/>
		<reference ref_id="959933" ref_url="https://bugzilla.suse.com/959933" source="BUGZILLA"/>
		<reference ref_id="983922" ref_url="https://bugzilla.suse.com/983922" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151/" source="CVE"/>
		<reference ref_id="CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152/" source="CVE"/>
		<reference ref_id="CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160/" source="CVE"/>
		<reference ref_id="CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163/" source="CVE"/>
		<reference ref_id="CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164/" source="CVE"/>
		<reference ref_id="CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165/" source="CVE"/>
		<reference ref_id="CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166/" source="CVE"/>
		<reference ref_id="CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169/" source="CVE"/>
		<reference ref_id="CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172/" source="CVE"/>
		<reference ref_id="CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175/" source="CVE"/>
		<reference ref_id="CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176/" source="CVE"/>
		<reference ref_id="CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179/" source="CVE"/>
		<reference ref_id="CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180/" source="CVE"/>
		<reference ref_id="CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181/" source="CVE"/>
		<reference ref_id="CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This update for MozillaFirefox to 68.2.0 ESR fixes the following issues:

Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).

Security issues fixed:

-  CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
-  CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
-  CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
-  CVE-2019-11759: Fixed a stack buffer overflow in HKDF output (bsc#1154738).
-  CVE-2019-11760: Fixed a stack buffer overflow in WebRTC networking (bsc#1154738).
-  CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
-  CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
-  CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
-  CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).

Non-security issues fixed:

- Firefox 60.7 ESR changed the user interface language (bsc#1137990).
- Wrong Firefox GUI Language (bsc#1120374).
- Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
- Firefox hangs randomly when browsing and scrolling (bsc#1043008).
- Firefox stops loading page until mouse is moved (bsc#1025108).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025108">SUSE bug 1025108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043008">SUSE bug 1043008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074235">SUSE bug 1074235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137990">SUSE bug 1137990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959933">SUSE bug 959933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81649" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-10-31"/>
	<updated date="2019-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530727" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81650" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144902" ref_url="https://bugzilla.suse.com/1144902" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This update for samba fixes the following issue:

- CVE-2019-10218: Fixed a path injection caused by filenames containing path separators (bso#14071) (bsc#1144902).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-05"/>
	<updated date="2019-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530728" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530729" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530730" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530731" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530732" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530733" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530734" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530735" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530736" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530737" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530738" comment="libndr0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530739" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530740" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530741" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530742" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530743" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530744" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530745" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530746" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530747" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530748" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530749" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530750" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530751" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530752" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530753" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530754" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530755" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530756" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530757" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530758" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530759" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530760" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530761" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530762" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530763" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530764" comment="samba-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530765" comment="samba-client-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530766" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530768" comment="samba-libs-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530769" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530770" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530771" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81651" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1115034" ref_url="https://bugzilla.suse.com/1115034" source="BUGZILLA"/>
		<reference ref_id="1142772" ref_url="https://bugzilla.suse.com/1142772" source="BUGZILLA"/>
		<reference ref_id="1145692" ref_url="https://bugzilla.suse.com/1145692" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This update for gdb fixes the following issues:

Update to gdb 8.3.1: (jsc#ECO-368)

Security issues fixed:

- CVE-2019-1010180: Fixed a potential buffer overflow when loading ELF sections larger than the file. (bsc#1142772)

Upgrade libipt from v2.0 to v2.0.1.

- Enable librpm for version &gt; librpm.so.3 [bsc#1145692]:
  * Allow any librpm.so.x
  * Add %build test to check for 'zypper install &lt;rpm-packagename&gt;'
    message

- Copy gdbinit from fedora master @ 25caf28.  Add
  gdbinit.without-python, and use it for --without=python.

Rebase to 8.3 release (as in fedora 30 @ 1e222a3).

* DWARF index cache: GDB can now automatically save indices of DWARF
  symbols on disk to speed up further loading of the same binaries.
* Ada task switching is now supported on aarch64-elf targets when
  debugging a program using the Ravenscar Profile.
* Terminal styling is now available for the CLI and the TUI.
* Removed support for old demangling styles arm, edg, gnu, hp and
  lucid.
* Support for new native configuration RISC-V GNU/Linux (riscv*-*-linux*).

- Implemented access to more POWER8 registers.  [fate#326120, fate#325178]

- Add gdb-s390-handle-arch13.diff to handle most new s390 arch13 instructions.  [fate#327369, jsc#ECO-368]
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-07"/>
	<updated date="2019-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115034">SUSE bug 1115034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145692">SUSE bug 1145692</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530772" comment="gdb-8.3.1-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81652" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154862" ref_url="https://bugzilla.suse.com/1154862" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issue:

- CVE-2019-17498: Fixed an integer overflow in a bounds check that might have led to the disclosure of sensitive information or a denial of service (bsc#1154862).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-08"/>
	<updated date="2019-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81653" version="1" class="patch">
	<metadata>
		<title>Security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1128828" ref_url="https://bugzilla.suse.com/1128828" source="BUGZILLA"/>
		<reference ref_id="1142614" ref_url="https://bugzilla.suse.com/1142614" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
This update for libseccomp fixes the following issues:

Update to new upstream release 2.4.1:

* Fix a BPF generation bug where the optimizer mistakenly
  identified duplicate BPF code blocks.

Updated to 2.4.0 (bsc#1128828 CVE-2019-9893):

* Update the syscall table for Linux v5.0-rc5
* Added support for the SCMP_ACT_KILL_PROCESS action
* Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
* Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
* Added support for the parisc and parisc64 architectures
* Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
* Return -EDOM on an endian mismatch when adding an architecture to a filter
* Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
* Fix PFC generation when a syscall is prioritized, but no rule exists
* Numerous fixes to the seccomp-bpf filter generation code
* Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
* Numerous tests added to the included test suite, coverage now at ~92%
* Update our Travis CI configuration to use Ubuntu 16.04
* Numerous documentation fixes and updates

Update to release 2.3.3:

* Updated the syscall table for Linux v4.15-rc7

Update to release 2.3.2:

* Achieved full compliance with the CII Best Practices program
* Added Travis CI builds to the GitHub repository
* Added code coverage reporting with the '--enable-code-coverage' configure
  flag and added Coveralls to the GitHub repository
* Updated the syscall tables to match Linux v4.10-rc6+
* Support for building with Python v3.x
* Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
  set to true
* Several small documentation fixes

- ignore make check error for ppc64/ppc64le, bypass bsc#1142614
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142614">SUSE bug 1142614</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81654" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 security release (bsc#1155988)
  - Processor             Identifier     Version       Products
  - Model        Stepping F-MO-S/PI      Old-&gt;New
  - ---- new platforms ----------------------------------------
  - CML-U62      A0       6-a6-0/80           000000c6 Core Gen10 Mobile
  - CNL-U        D0       6-66-3/80           0000002a Core Gen8 Mobile
  - SKX-SP       B1       6-55-3/97           01000150 Xeon Scalable
  - ICL U/Y      D1       6-7e-5/80           00000046 Core Gen10 Mobile
  - ---- updated platforms ------------------------------------
  - SKL U/Y      D0       6-4e-3/c0 000000cc-&gt;000000d4 Core Gen6 Mobile
  - SKL H/S/E3   R0/N0    6-5e-3/36 000000cc-&gt;000000d4 Core Gen6
  - AML-Y22      H0       6-8e-9/10 000000b4-&gt;000000c6 Core Gen8 Mobile
  - KBL-U/Y      H0       6-8e-9/c0 000000b4-&gt;000000c6 Core Gen7 Mobile
  - CFL-U43e     D0       6-8e-a/c0 000000b4-&gt;000000c6 Core Gen8 Mobile
  - WHL-U        W0       6-8e-b/d0 000000b8-&gt;000000c6 Core Gen8 Mobile
  - AML-Y        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - CML-U42      V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen10 Mobile
  - WHL-U        V0       6-8e-c/94 000000b8-&gt;000000c6 Core Gen8 Mobile
  - KBL-G/X      H0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7/Gen8
  - KBL-H/S/E3   B0       6-9e-9/2a 000000b4-&gt;000000c6 Core Gen7; Xeon E3 v6
  - CFL-H/S/E3   U0       6-9e-a/22 000000b4-&gt;000000c6 Core Gen8 Desktop, Mobile, Xeon E
  - CFL-S        B0       6-9e-b/02 000000b4-&gt;000000c6 Core Gen8
  - CFL-H        R0       6-9e-d/22 000000b8-&gt;000000c6 Core Gen9 Mobile
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)

- requires coreutils for the %post script (bsc#1154043)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-12"/>
	<updated date="2019-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522370" comment="ucode-intel-20191112-13.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81655" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-14"/>
	<updated date="2019-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81656" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1156275" ref_url="https://bugzilla.suse.com/1156275" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issue:
	  
- CVE-2019-14869: Fixed a possible  dSAFER escape which could have allowed 
  an attacker to gain high privileges by a specially crafted Postscript 
  code (bsc#1156275).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81657" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1068032" ref_url="https://bugzilla.suse.com/1068032" source="BUGZILLA"/>
		<reference ref_id="1084878" ref_url="https://bugzilla.suse.com/1084878" source="BUGZILLA"/>
		<reference ref_id="1092497" ref_url="https://bugzilla.suse.com/1092497" source="BUGZILLA"/>
		<reference ref_id="1106913" ref_url="https://bugzilla.suse.com/1106913" source="BUGZILLA"/>
		<reference ref_id="1117665" ref_url="https://bugzilla.suse.com/1117665" source="BUGZILLA"/>
		<reference ref_id="1135966" ref_url="https://bugzilla.suse.com/1135966" source="BUGZILLA"/>
		<reference ref_id="1135967" ref_url="https://bugzilla.suse.com/1135967" source="BUGZILLA"/>
		<reference ref_id="1137865" ref_url="https://bugzilla.suse.com/1137865" source="BUGZILLA"/>
		<reference ref_id="1139550" ref_url="https://bugzilla.suse.com/1139550" source="BUGZILLA"/>
		<reference ref_id="1140671" ref_url="https://bugzilla.suse.com/1140671" source="BUGZILLA"/>
		<reference ref_id="1141054" ref_url="https://bugzilla.suse.com/1141054" source="BUGZILLA"/>
		<reference ref_id="1144338" ref_url="https://bugzilla.suse.com/1144338" source="BUGZILLA"/>
		<reference ref_id="1144903" ref_url="https://bugzilla.suse.com/1144903" source="BUGZILLA"/>
		<reference ref_id="1145477" ref_url="https://bugzilla.suse.com/1145477" source="BUGZILLA"/>
		<reference ref_id="1146285" ref_url="https://bugzilla.suse.com/1146285" source="BUGZILLA"/>
		<reference ref_id="1146361" ref_url="https://bugzilla.suse.com/1146361" source="BUGZILLA"/>
		<reference ref_id="1146378" ref_url="https://bugzilla.suse.com/1146378" source="BUGZILLA"/>
		<reference ref_id="1146391" ref_url="https://bugzilla.suse.com/1146391" source="BUGZILLA"/>
		<reference ref_id="1146413" ref_url="https://bugzilla.suse.com/1146413" source="BUGZILLA"/>
		<reference ref_id="1146425" ref_url="https://bugzilla.suse.com/1146425" source="BUGZILLA"/>
		<reference ref_id="1146512" ref_url="https://bugzilla.suse.com/1146512" source="BUGZILLA"/>
		<reference ref_id="1146514" ref_url="https://bugzilla.suse.com/1146514" source="BUGZILLA"/>
		<reference ref_id="1146516" ref_url="https://bugzilla.suse.com/1146516" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146584" ref_url="https://bugzilla.suse.com/1146584" source="BUGZILLA"/>
		<reference ref_id="1147122" ref_url="https://bugzilla.suse.com/1147122" source="BUGZILLA"/>
		<reference ref_id="1148394" ref_url="https://bugzilla.suse.com/1148394" source="BUGZILLA"/>
		<reference ref_id="1148938" ref_url="https://bugzilla.suse.com/1148938" source="BUGZILLA"/>
		<reference ref_id="1149376" ref_url="https://bugzilla.suse.com/1149376" source="BUGZILLA"/>
		<reference ref_id="1149522" ref_url="https://bugzilla.suse.com/1149522" source="BUGZILLA"/>
		<reference ref_id="1149527" ref_url="https://bugzilla.suse.com/1149527" source="BUGZILLA"/>
		<reference ref_id="1149555" ref_url="https://bugzilla.suse.com/1149555" source="BUGZILLA"/>
		<reference ref_id="1149612" ref_url="https://bugzilla.suse.com/1149612" source="BUGZILLA"/>
		<reference ref_id="1149849" ref_url="https://bugzilla.suse.com/1149849" source="BUGZILLA"/>
		<reference ref_id="1150025" ref_url="https://bugzilla.suse.com/1150025" source="BUGZILLA"/>
		<reference ref_id="1150112" ref_url="https://bugzilla.suse.com/1150112" source="BUGZILLA"/>
		<reference ref_id="1150223" ref_url="https://bugzilla.suse.com/1150223" source="BUGZILLA"/>
		<reference ref_id="1150452" ref_url="https://bugzilla.suse.com/1150452" source="BUGZILLA"/>
		<reference ref_id="1150457" ref_url="https://bugzilla.suse.com/1150457" source="BUGZILLA"/>
		<reference ref_id="1150465" ref_url="https://bugzilla.suse.com/1150465" source="BUGZILLA"/>
		<reference ref_id="1150466" ref_url="https://bugzilla.suse.com/1150466" source="BUGZILLA"/>
		<reference ref_id="1151347" ref_url="https://bugzilla.suse.com/1151347" source="BUGZILLA"/>
		<reference ref_id="1151350" ref_url="https://bugzilla.suse.com/1151350" source="BUGZILLA"/>
		<reference ref_id="1152685" ref_url="https://bugzilla.suse.com/1152685" source="BUGZILLA"/>
		<reference ref_id="1152782" ref_url="https://bugzilla.suse.com/1152782" source="BUGZILLA"/>
		<reference ref_id="1152788" ref_url="https://bugzilla.suse.com/1152788" source="BUGZILLA"/>
		<reference ref_id="1153158" ref_url="https://bugzilla.suse.com/1153158" source="BUGZILLA"/>
		<reference ref_id="1154372" ref_url="https://bugzilla.suse.com/1154372" source="BUGZILLA"/>
		<reference ref_id="1155671" ref_url="https://bugzilla.suse.com/1155671" source="BUGZILLA"/>
		<reference ref_id="1155898" ref_url="https://bugzilla.suse.com/1155898" source="BUGZILLA"/>
		<reference ref_id="1156187" ref_url="https://bugzilla.suse.com/1156187" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906/" source="CVE"/>
		<reference ref_id="CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
  condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
  Exception during Page Size Change, causing the CPU core to be non-functional.

  The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
  executable pages by splitting / merging huge pages into small pages as
  needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735

- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
  failed to add a port, which may have caused denial of service (bsc#1152685).

- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
  Transactional Memory support could be used to facilitate sidechannel
  information leaks out of microarchitectural buffers, similar to the
  previously described 'Microarchitectural Data Sampling' attack.

  The Linux kernel was supplemented with the option to disable TSX operation
  altogether (requiring CPU Microcode updates on older systems) and better
  flushing of microarchitectural buffers (VERW).

  The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251

- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
  alloc_workqueue return value, leading to a NULL pointer dereference.
  (bsc#1150457).

- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
  space. (bsc#1144903).

- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).

- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
  leading to a Buffer Overflow (bsc#1153158).

- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
  libertas driver (bsc#1150465).

- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
  value, leading to a NULL pointer dereference. (bsc#1150452).

- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
  enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
  socket (bnc#1152782).

- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
  meant that unprivileged users could create a raw socket (bsc#1152788).

- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
  which caused an i_size_read() infinite loop and denial of service on SMP
  systems (bnc#1151347).

- CVE-2019-15902: A backporting issue was discovered that re-introduced the
  Spectre vulnerability it had aimed to eliminate. This occurred because the
  backport process depends on cherry picking specific commits, and because two
  (correctly ordered) code lines were swapped (bnc#1149376).

- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
  by a malicious USB device (bnc#1146519).

- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
  to cause denial of service (bnc#1148938).

- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
  process that wants to create a ptrace relationship, which allowed local users
  to obtain root access by leveraging certain scenarios with a parent-child
  process relationship, where a parent drops privileges and calls execve
  (potentially allowing control by an attacker). (bnc#1140671).

- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm
  hypervisor. An unprivileged host user or process with access to '/dev/kvm'
  device could use this flaw to crash the host kernel, resulting in a denial of
  service or potentially escalating privileges on the system (bnc#1151350).

- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
  crafted USB device traffic (bnc#1147122).

- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
  (bnc#1149555).

- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
  functionality that translates virtqueue buffers to IOVs. A privileged guest
  user able to pass descriptors with invalid length to the host could use this
  flaw to increase their privileges on the host (bnc#1150112).

- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
  USB device (bnc#1146361).

- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
  drivers/net/ethernet/intel/fm10k module (bnc#1149612).

- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
  fixed. This issue could lead to local escalation of privilege with System
  execution privileges needed. (bnc#1150025).

- CVE-2019-15926: An out-of-bounds access was fixed in the
  drivers/net/wireless/ath/ath6kl module. (bnc#1149527).

- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
  module (bnc#1149522).

- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
  module that could cause denial of service (bnc#1148394).

- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
  a malicious USB device (bnc#1146519 1146524).

- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
  malicious USB device (bnc#1146519 1146526).

- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
  a malicious USB device (bnc#1146519 1146529).

- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
  chip driver. That issue allowed local users to cause a denial of service
  (system crash) or possibly execute arbitrary code (bnc#1146512).

- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
  (bsc#1146512, bsc#1146514, bsc#1146516).

- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
  was fixed. Local users would have abused this issue to cause a denial of
  service (system crash) or possibly execute arbitrary code (bnc#1146516).

- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
  option, an attacker could control a pointer in kernel land and cause an
  inet_csk_listen_stop general protection fault, or potentially execute
  arbitrary code under certain circumstances. The issue can be triggered as
  root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
  capability) or after namespace unsharing. (bnc#1145477)

- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
  low encryption key length and did not prevent an attacker from influencing
  the key length negotiation. This allowed practical brute-force attacks (aka
  'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
  the victim noticing (bnc#1137865).

- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
  fixed (bnc#1146378).

- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
  was fixed (bsc#1146378).

- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
  (bnc#1146391).

- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
  (bnc#1146584).

- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/v4l2-core driver (bnc#1146519).

- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
  device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).

- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
  (bnc#1146519).

- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
  was fixed in the drivers/media/usb/siano driver (bnc#1146413).

- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
  fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).

- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
  (bnc#1146285).

- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
  that could have been abused to facilitate a local denial-of-service attack.
  (bsc#1135966)

- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
  i915 module that allowed batch buffers from user mode to gain super user
  privileges. (bsc#1135967)

- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)

- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)

- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)

The following non-security bugs were fixed:

- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)
- ipv6: Update ipv6 defrag code (add bsc#1141054).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm kABI Fix for NX patches (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- mm: use upstream patch for bsc#1106913
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).
- x86/mitigations: Backport the STIBP pile See bsc#1139550
- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-20"/>
	<updated date="2019-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084878">SUSE bug 1084878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106913">SUSE bug 1106913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139550">SUSE bug 1139550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141054">SUSE bug 1141054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144338">SUSE bug 1144338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149849">SUSE bug 1149849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150223">SUSE bug 1150223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155671">SUSE bug 1155671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81658" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1139073" ref_url="https://bugzilla.suse.com/1139073" source="BUGZILLA"/>
		<reference ref_id="1141035" ref_url="https://bugzilla.suse.com/1141035" source="BUGZILLA"/>
		<reference ref_id="1155988" ref_url="https://bugzilla.suse.com/1155988" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to 20191112 official security release (bsc#1155988)
- Includes security fixes for:
  - CVE-2019-11135: Added feature allowing to disable TSX RTM (bsc#1139073)
  - CVE-2019-11139: A CPU microcode only fix for Voltage modulation issues (bsc#1141035)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-15"/>
	<updated date="2019-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155988">SUSE bug 1155988</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81659" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1155787" ref_url="https://bugzilla.suse.com/1155787" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2017-2518: Fixed a use-after-free vulnerability which could have 
  led to buffer overflow via a crafted SQL statement (bsc#1155787).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81660" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1146358" ref_url="https://bugzilla.suse.com/1146358" source="BUGZILLA"/>
		<reference ref_id="1146359" ref_url="https://bugzilla.suse.com/1146359" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2019-8675: Fixed a stack buffer overflow in libcups's asn1_get_type function(bsc#1146358). 
- CVE-2019-8696: Fixed a stack buffer overflow in libcups's asn1_get_packed function (bsc#1146359).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-25"/>
	<updated date="2019-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81661" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1151839" ref_url="https://bugzilla.suse.com/1151839" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

Security issue fixed:

- CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and heuristics for zips with overlapping files (bsc#1144504).
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1149458).

Non-security issues fixed:

- Added the --max-scantime clamscan option and MaxScanTime clamd configuration option (bsc#1144504).
- Increased the startup timeout of clamd to 5 minutes to cater for the grown virus database as a workaround until clamd has learned to talk to systemd to extend the timeout as long as needed (bsc#1151839).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151839">SUSE bug 1151839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81662" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154328" ref_url="https://bugzilla.suse.com/1154328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:
	  
- CVE-2019-3693: Fixed a local privilege escalation from wwwrun to root (bsc#1154328).

		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-26"/>
	<updated date="2019-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81663" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1152856" ref_url="https://bugzilla.suse.com/1152856" source="BUGZILLA"/>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Security issues fixed (October 2019 CPU  bsc#1154212):	  

- CVE-2019-2933: Windows file handling redux
- CVE-2019-2945: Better socket support
- CVE-2019-2949: Better Kerberos ccache handling
- CVE-2019-2958: Build Better Processes
- CVE-2019-2964: Better support for patterns
- CVE-2019-2962: Better Glyph Images
- CVE-2019-2973: Better pattern compilation
- CVE-2019-2978: Improved handling of jar files
- CVE-2019-2981: Better Path supports
- CVE-2019-2983: Better serial attributes
- CVE-2019-2987: Better rendering of native glyphs
- CVE-2019-2988: Better Graphics2D drawing
- CVE-2019-2989: Improve TLS connection support
- CVE-2019-2992: Enhance font glyph mapping
- CVE-2019-2999: Commentary on Javadoc comments
- CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-11-27"/>
	<updated date="2019-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81664" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1123823" ref_url="https://bugzilla.suse.com/1123823" source="BUGZILLA"/>
		<reference ref_id="1123828" ref_url="https://bugzilla.suse.com/1123828" source="BUGZILLA"/>
		<reference ref_id="1123832" ref_url="https://bugzilla.suse.com/1123832" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:
	  
Security issues fixed:

- CVE-2018-20749: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123828)
- CVE-2018-20750: Fixed a heap out of bounds write vulnerability in rfbserver.c (bsc#1123832)
- CVE-2018-20748: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1123823)  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-09"/>
	<updated date="2019-02-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530784" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530785" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81665" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:
	  
- CVE-2019-15961: Fixed a denial of service which might occur when 
  scanning a specially crafted email file as (bsc#1157763).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522421" comment="clamav-0.100.3-33.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81666" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1093414" ref_url="https://bugzilla.suse.com/1093414" source="BUGZILLA"/>
		<reference ref_id="1150734" ref_url="https://bugzilla.suse.com/1150734" source="BUGZILLA"/>
		<reference ref_id="1157198" ref_url="https://bugzilla.suse.com/1157198" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
  which could have allowed a squid user to gain persistence by changing the 
  binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic 
  links (bsc#1150734).
- Fixed a regression which caused segmentation fault (bsc#1157198).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-05"/>
	<updated date="2019-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157198">SUSE bug 1157198</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81667" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). 
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by 
  leveraging certain scenarios with a parent-child process relationship (bsc#1156321). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-10"/>
	<updated date="2019-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552429" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81668" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). 
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging 
  certain scenarios with a parent-child process relationship (bsc#1156321). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552430" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81669" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331). 
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552431" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81670" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552432" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81671" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1156331" ref_url="https://bugzilla.suse.com/1156331" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2018-20856: Fixed a use-after-free in __blk_drain_queue() due to an improper error handling (bsc#1156331).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552433" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81672" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1153108" ref_url="https://bugzilla.suse.com/1153108" source="BUGZILLA"/>
		<reference ref_id="1156321" ref_url="https://bugzilla.suse.com/1156321" source="BUGZILLA"/>
		<reference ref_id="1157770" ref_url="https://bugzilla.suse.com/1157770" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-11"/>
	<updated date="2019-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157770">SUSE bug 1157770</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552434" comment="kgraft-patch-4_4_121-92_120-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81673" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1082023" ref_url="https://bugzilla.suse.com/1082023" source="BUGZILLA"/>
		<reference ref_id="1158785" ref_url="https://bugzilla.suse.com/1158785" source="BUGZILLA"/>
		<reference ref_id="1158787" ref_url="https://bugzilla.suse.com/1158787" source="BUGZILLA"/>
		<reference ref_id="1158788" ref_url="https://bugzilla.suse.com/1158788" source="BUGZILLA"/>
		<reference ref_id="1158789" ref_url="https://bugzilla.suse.com/1158789" source="BUGZILLA"/>
		<reference ref_id="1158790" ref_url="https://bugzilla.suse.com/1158790" source="BUGZILLA"/>
		<reference ref_id="1158791" ref_url="https://bugzilla.suse.com/1158791" source="BUGZILLA"/>
		<reference ref_id="1158792" ref_url="https://bugzilla.suse.com/1158792" source="BUGZILLA"/>
		<reference ref_id="1158793" ref_url="https://bugzilla.suse.com/1158793" source="BUGZILLA"/>
		<reference ref_id="1158795" ref_url="https://bugzilla.suse.com/1158795" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<description>
This update for git fixes the following issues:

Security issues fixed:

- CVE-2019-1349: Fixed issue on Windows, when submodules are cloned recursively, under certain circumstances Git could be fooled into using the same Git directory twice (bsc#1158787).
- CVE-2019-19604: Fixed a recursive clone followed by a submodule update could execute code contained within the repository without the user explicitly having asked for that (bsc#1158795).
- CVE-2019-1387: Fixed recursive clones that are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones (bsc#1158793).
- CVE-2019-1354: Fixed issue on Windows that refuses to write tracked files with filenames that contain backslashes (bsc#1158792).
- CVE-2019-1353: Fixed issue when run in the Windows Subsystem for Linux while accessing a working directory on a regular Windows drive, none of the NTFS protections were active (bsc#1158791).
- CVE-2019-1352: Fixed issue on Windows was unaware of NTFS Alternate Data Streams (bsc#1158790).
- CVE-2019-1351: Fixed issue on Windows mistakes drive letters outside of the US-English alphabet as relative paths (bsc#1158789).
- CVE-2019-1350: Fixed incorrect quoting of command-line arguments allowed remote code execution during a recursive clone in conjunction with SSH URLs (bsc#1158788).
- CVE-2019-1348: Fixed the --export-marks option of fast-import is exposed also via  the in-stream command feature export-marks=... and it allows overwriting arbitrary paths (bsc#1158785).
- Fixed an issue where git send-email fails to authenticate with SMTP server (bsc#1082023)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-16"/>
	<updated date="2019-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082023">SUSE bug 1082023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81674" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1158328" ref_url="https://bugzilla.suse.com/1158328" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Mozilla Firefox was updated to 68.3esr (MFSA 2019-37 bsc#1158328)	  
	  
Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-12-19"/>
	<updated date="2019-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81675" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1120374" ref_url="https://bugzilla.suse.com/1120374" source="BUGZILLA"/>
		<reference ref_id="1122983" ref_url="https://bugzilla.suse.com/1122983" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issues fixed:

CVE-2018-18500: Fixed a use-after-free parsing HTML5 stream (boo#1122983).
CVE-2018-18501: Fixed multiple memory safety bugs (boo#1122983).
CVE-2018-18505: Fixed a privilege escalation through IPC channel messages (boo#1122983).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-12"/>
	<updated date="2019-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120374">SUSE bug 1120374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530790" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530791" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530792" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530793" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530794" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81676" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537265" comment="kgraft-patch-4_4_121-92_80-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81677" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537266" comment="kgraft-patch-4_4_121-92_85-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81678" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537267" comment="kgraft-patch-4_4_120-92_70-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81679" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537268" comment="kgraft-patch-4_4_121-92_73-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81680" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537269" comment="kgraft-patch-4_4_121-92_92-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81681" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_64 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537270" comment="kgraft-patch-4_4_114-92_64-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81682" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.114-92_67 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537271" comment="kgraft-patch-4_4_114-92_67-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81683" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552435" comment="kgraft-patch-4_4_121-92_98-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81684" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes one issue.

The following security issue was fixed:

- CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time could make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user could cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bsc#1119947).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-13"/>
	<updated date="2019-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552436" comment="kgraft-patch-4_4_121-92_95-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81685" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111498" ref_url="https://bugzilla.suse.com/1111498" source="BUGZILLA"/>
		<reference ref_id="1117025" ref_url="https://bugzilla.suse.com/1117025" source="BUGZILLA"/>
		<reference ref_id="1117382" ref_url="https://bugzilla.suse.com/1117382" source="BUGZILLA"/>
		<reference ref_id="1120658" ref_url="https://bugzilla.suse.com/1120658" source="BUGZILLA"/>
		<reference ref_id="1122000" ref_url="https://bugzilla.suse.com/1122000" source="BUGZILLA"/>
		<reference ref_id="1122344" ref_url="https://bugzilla.suse.com/1122344" source="BUGZILLA"/>
		<reference ref_id="1123333" ref_url="https://bugzilla.suse.com/1123333" source="BUGZILLA"/>
		<reference ref_id="1123892" ref_url="https://bugzilla.suse.com/1123892" source="BUGZILLA"/>
		<reference ref_id="1125352" ref_url="https://bugzilla.suse.com/1125352" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

Security vulnerability fixed:

- CVE-2019-6454: Fixed a crash of PID1 by sending specially crafted D-BUS
  message on the system bus by an unprivileged user (bsc#1125352)

Other bug fixes and changes:

- journal-remote: set a limit on the number of fields in a message
- journal-remote: verify entry length from header
- journald: set a limit on the number of fields (1k)
- journald: do not store the iovec entry for process commandline on stack
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- manager: don't skip sigchld handler for main and control pid for services (#3738)
- core: Add helper functions unit_{main, control}_pid
- manager: Fixing a debug printf formatting mistake (#3640)
- manager: Only invoke a single sigchld per unit within a cleanup cycle (bsc#1117382)
- core: update invoke_sigchld_event() to handle NULL -&gt;sigchld_event()
- sd-event: expose the event loop iteration counter via sd_event_get_iteration() (#3631)
- unit: rework a bit how we keep the service fdstore from being destroyed during service restart (bsc#1122344)
- core: when restarting services, don't close fds
- cryptsetup: Add dependency on loopback setup to generated units
- journal-gateway: use localStorage['cursor'] only when it has valid value
- journal-gateway: explicitly declare local variables
- analyze: actually select longest activated-time of services
- sd-bus: fix implicit downcast of bitfield reported by LGTM
- core: free lines after reading them (bsc#1123892)
- pam_systemd: reword message about not creating a session (bsc#1111498)
- pam_systemd: suppress LOG_DEBUG log messages if debugging is off (bsc#1111498)
- main: improve RLIMIT_NOFILE handling (#5795) (bsc#1120658)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- units: add Wants=initrd-cleanup.service to initrd-switch-root.target (#4345) (bsc#1123333)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111498">SUSE bug 1111498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117025">SUSE bug 1117025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117382">SUSE bug 1117382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120658">SUSE bug 1120658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122000">SUSE bug 1122000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122344">SUSE bug 1122344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123333">SUSE bug 1123333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123892">SUSE bug 1123892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521621" comment="libsystemd0-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521622" comment="libsystemd0-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521623" comment="libudev1-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521624" comment="libudev1-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521625" comment="systemd-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521626" comment="systemd-32bit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521627" comment="systemd-bash-completion-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521628" comment="systemd-sysvinit-228-150.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521629" comment="udev-228-150.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81686" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1023175" ref_url="https://bugzilla.suse.com/1023175" source="BUGZILLA"/>
		<reference ref_id="1042286" ref_url="https://bugzilla.suse.com/1042286" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065726" ref_url="https://bugzilla.suse.com/1065726" source="BUGZILLA"/>
		<reference ref_id="1070805" ref_url="https://bugzilla.suse.com/1070805" source="BUGZILLA"/>
		<reference ref_id="1084721" ref_url="https://bugzilla.suse.com/1084721" source="BUGZILLA"/>
		<reference ref_id="1086095" ref_url="https://bugzilla.suse.com/1086095" source="BUGZILLA"/>
		<reference ref_id="1086535" ref_url="https://bugzilla.suse.com/1086535" source="BUGZILLA"/>
		<reference ref_id="1091158" ref_url="https://bugzilla.suse.com/1091158" source="BUGZILLA"/>
		<reference ref_id="1091171" ref_url="https://bugzilla.suse.com/1091171" source="BUGZILLA"/>
		<reference ref_id="1091197" ref_url="https://bugzilla.suse.com/1091197" source="BUGZILLA"/>
		<reference ref_id="1094825" ref_url="https://bugzilla.suse.com/1094825" source="BUGZILLA"/>
		<reference ref_id="1095344" ref_url="https://bugzilla.suse.com/1095344" source="BUGZILLA"/>
		<reference ref_id="1098996" ref_url="https://bugzilla.suse.com/1098996" source="BUGZILLA"/>
		<reference ref_id="1099523" ref_url="https://bugzilla.suse.com/1099523" source="BUGZILLA"/>
		<reference ref_id="1099597" ref_url="https://bugzilla.suse.com/1099597" source="BUGZILLA"/>
		<reference ref_id="1100105" ref_url="https://bugzilla.suse.com/1100105" source="BUGZILLA"/>
		<reference ref_id="1101555" ref_url="https://bugzilla.suse.com/1101555" source="BUGZILLA"/>
		<reference ref_id="1103624" ref_url="https://bugzilla.suse.com/1103624" source="BUGZILLA"/>
		<reference ref_id="1104731" ref_url="https://bugzilla.suse.com/1104731" source="BUGZILLA"/>
		<reference ref_id="1105025" ref_url="https://bugzilla.suse.com/1105025" source="BUGZILLA"/>
		<reference ref_id="1105931" ref_url="https://bugzilla.suse.com/1105931" source="BUGZILLA"/>
		<reference ref_id="1106293" ref_url="https://bugzilla.suse.com/1106293" source="BUGZILLA"/>
		<reference ref_id="1107256" ref_url="https://bugzilla.suse.com/1107256" source="BUGZILLA"/>
		<reference ref_id="1107299" ref_url="https://bugzilla.suse.com/1107299" source="BUGZILLA"/>
		<reference ref_id="1107385" ref_url="https://bugzilla.suse.com/1107385" source="BUGZILLA"/>
		<reference ref_id="1107866" ref_url="https://bugzilla.suse.com/1107866" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1108498" ref_url="https://bugzilla.suse.com/1108498" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1110837" ref_url="https://bugzilla.suse.com/1110837" source="BUGZILLA"/>
		<reference ref_id="1111062" ref_url="https://bugzilla.suse.com/1111062" source="BUGZILLA"/>
		<reference ref_id="1113192" ref_url="https://bugzilla.suse.com/1113192" source="BUGZILLA"/>
		<reference ref_id="1113751" ref_url="https://bugzilla.suse.com/1113751" source="BUGZILLA"/>
		<reference ref_id="1113769" ref_url="https://bugzilla.suse.com/1113769" source="BUGZILLA"/>
		<reference ref_id="1114190" ref_url="https://bugzilla.suse.com/1114190" source="BUGZILLA"/>
		<reference ref_id="1114648" ref_url="https://bugzilla.suse.com/1114648" source="BUGZILLA"/>
		<reference ref_id="1114763" ref_url="https://bugzilla.suse.com/1114763" source="BUGZILLA"/>
		<reference ref_id="1115433" ref_url="https://bugzilla.suse.com/1115433" source="BUGZILLA"/>
		<reference ref_id="1115440" ref_url="https://bugzilla.suse.com/1115440" source="BUGZILLA"/>
		<reference ref_id="1116027" ref_url="https://bugzilla.suse.com/1116027" source="BUGZILLA"/>
		<reference ref_id="1116183" ref_url="https://bugzilla.suse.com/1116183" source="BUGZILLA"/>
		<reference ref_id="1116345" ref_url="https://bugzilla.suse.com/1116345" source="BUGZILLA"/>
		<reference ref_id="1117186" ref_url="https://bugzilla.suse.com/1117186" source="BUGZILLA"/>
		<reference ref_id="1117187" ref_url="https://bugzilla.suse.com/1117187" source="BUGZILLA"/>
		<reference ref_id="1118152" ref_url="https://bugzilla.suse.com/1118152" source="BUGZILLA"/>
		<reference ref_id="1118319" ref_url="https://bugzilla.suse.com/1118319" source="BUGZILLA"/>
		<reference ref_id="1119714" ref_url="https://bugzilla.suse.com/1119714" source="BUGZILLA"/>
		<reference ref_id="1119946" ref_url="https://bugzilla.suse.com/1119946" source="BUGZILLA"/>
		<reference ref_id="1119947" ref_url="https://bugzilla.suse.com/1119947" source="BUGZILLA"/>
		<reference ref_id="1120743" ref_url="https://bugzilla.suse.com/1120743" source="BUGZILLA"/>
		<reference ref_id="1120758" ref_url="https://bugzilla.suse.com/1120758" source="BUGZILLA"/>
		<reference ref_id="1121621" ref_url="https://bugzilla.suse.com/1121621" source="BUGZILLA"/>
		<reference ref_id="1123161" ref_url="https://bugzilla.suse.com/1123161" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).

The following non-security bugs were fixed:

- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ata: Fix racy link clearance (bsc#1107866).
- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ip: hash fragments consistently (bsc#1042286 bsc#1108145).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- libfc: sync strings with upstream versions (bsc#1114763).
- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.
- mm: add support for releasing multiple instances of a page (bsc#1100105).
- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- NFS: add nostatflush mount option (bsc#1065726).
- nospec: Include &lt;asm/barrier.h&gt; dependency (bsc#1114648).
- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-&gt;REGs (bsc#1105931).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-19"/>
	<updated date="2019-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023175">SUSE bug 1023175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042286">SUSE bug 1042286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065726">SUSE bug 1065726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070805">SUSE bug 1070805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084721">SUSE bug 1084721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086095">SUSE bug 1086095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086535">SUSE bug 1086535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091158">SUSE bug 1091158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091171">SUSE bug 1091171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091197">SUSE bug 1091197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095344">SUSE bug 1095344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098996">SUSE bug 1098996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099523">SUSE bug 1099523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099597">SUSE bug 1099597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100105">SUSE bug 1100105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101555">SUSE bug 1101555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103624">SUSE bug 1103624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104731">SUSE bug 1104731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105931">SUSE bug 1105931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106293">SUSE bug 1106293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107256">SUSE bug 1107256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107299">SUSE bug 1107299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107385">SUSE bug 1107385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107866">SUSE bug 1107866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110837">SUSE bug 1110837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111062">SUSE bug 1111062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113192">SUSE bug 1113192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114190">SUSE bug 1114190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114648">SUSE bug 1114648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114763">SUSE bug 1114763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115433">SUSE bug 1115433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115440">SUSE bug 1115440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116027">SUSE bug 1116027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116183">SUSE bug 1116183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116345">SUSE bug 1116345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117187">SUSE bug 1117187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121621">SUSE bug 1121621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81687" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1092100" ref_url="https://bugzilla.suse.com/1092100" source="BUGZILLA"/>
		<reference ref_id="1121753" ref_url="https://bugzilla.suse.com/1121753" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>

  
This update for procps fixes the following security issues:

- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
  with HOME unset in an attacker-controlled directory, the attacker could have
  achieved privilege escalation by exploiting one of several vulnerabilities in
  the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
  Inbuilt protection in ps maped a guard page at the end of the overflowed
  buffer, ensuring that the impact of this flaw is limited to a crash (temporary
  denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
  corruption in file2strvec function. This allowed a privilege escalation for a
  local attacker who can create entries in procfs by starting processes, which
  could result in crashes or arbitrary code execution in proc utilities run by
  other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
  mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
  truncation/integer overflow issues (bsc#1092100).

(These issues were previously released for SUSE Linux Enterprise 12 SP3 and SP4.)

Also the following non-security issue was fixed:

- Fix CPU summary showing old data. (bsc#1121753)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-20"/>
	<updated date="2019-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121753">SUSE bug 1121753</bugzilla>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81688" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1109673" ref_url="https://bugzilla.suse.com/1109673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<description>
This update for texlive fixes the following issue:

- CVE-2018-17407: Prevent buffer overflow when handling of Type 1 fonts allowed
  arbitrary code execution when a malicious font was loaded by one of the
  vulnerable tools: pdflatex, pdftex, dvips, or luatex (bsc#1109673)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-21"/>
	<updated date="2019-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009520140" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81689" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104301" ref_url="https://bugzilla.suse.com/1104301" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<description>
This update for kernel-firmware fixes the following issues:
  
Security issue fixed:

- CVE-2018-5383: Fixed an implementation issue in Bluetooth where the eliptic curve parameters 
  were not sufficiently validated during Diffie-Hellman key exchange (bsc#1104301).
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-22"/>
	<updated date="2019-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81690" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1109847" ref_url="https://bugzilla.suse.com/1109847" source="BUGZILLA"/>
		<reference ref_id="1122191" ref_url="https://bugzilla.suse.com/1122191" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<description>
This update for python fixes the following issues:

Security issues fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191).
- CVE-2018-14647: Fixed a denial-of-service vulnerability in Expat (bsc#1109847).

Non-security issue fixed:

- Fixed a bug where PyWeakReference struct was not initialized correctly leading to a crash (bsc#1073748).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-25"/>
	<updated date="2019-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530816" comment="python-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530817" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530818" comment="python-demo-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530821" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530822" comment="python-idle-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81691" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1084604" ref_url="https://bugzilla.suse.com/1084604" source="BUGZILLA"/>
		<reference ref_id="1113231" ref_url="https://bugzilla.suse.com/1113231" source="BUGZILLA"/>
		<reference ref_id="1116717" ref_url="https://bugzilla.suse.com/1116717" source="BUGZILLA"/>
		<reference ref_id="1117275" ref_url="https://bugzilla.suse.com/1117275" source="BUGZILLA"/>
		<reference ref_id="1119493" ref_url="https://bugzilla.suse.com/1119493" source="BUGZILLA"/>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364/" source="CVE"/>
		<reference ref_id="CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2019-6778: Fixed a heap buffer overflow issue in the SLiRP networking implementation (bsc#1123156).
- CVE-2018-16872: Fixed a host security vulnerability related to handling symlinks in usb-mtp (bsc#1119493).
- CVE-2018-19489: Fixed a denial of service vulnerability in virtfs (bsc#1117275).
- CVE-2018-19364: Fixed a use-after-free if the virtfs interface resulting in a denial of service (bsc#1116717).
- CVE-2018-7858: Fixed a denial of service which could occur while updating the VGA display, after guest has adjusted the display dimensions (bsc#1084604).
- CVE-2017-13673: Fixed a denial of service in the cpu_physical_memory_snapshot_get_dirty function.
- CVE-2017-13672: Fixed a denial of service via vectors involving display update.

Non-security issues fixed:

- Fixed bad guest time after migration (bsc#1113231).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-26"/>
	<updated date="2019-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113231">SUSE bug 1113231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81692" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1101644" ref_url="https://bugzilla.suse.com/1101644" source="BUGZILLA"/>
		<reference ref_id="1101645" ref_url="https://bugzilla.suse.com/1101645" source="BUGZILLA"/>
		<reference ref_id="1101651" ref_url="https://bugzilla.suse.com/1101651" source="BUGZILLA"/>
		<reference ref_id="1101656" ref_url="https://bugzilla.suse.com/1101656" source="BUGZILLA"/>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
- CVE-2018-2938: Support Derby connections (bsc#1101644)
- CVE-2018-2940: Better stack walking (bsc#1101645)
- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)
- CVE-2018-2973: Improve LDAP support (bsc#1101656)
- CVE-2018-3639 cpu speculative store bypass mitigation
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-09"/>
	<updated date="2019-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81693" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124937" ref_url="https://bugzilla.suse.com/1124937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.22.6 fixes the following issues:

Security issues fixed:

- CVE-2019-6212: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6215: Fixed a type confusion vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6216: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6217: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content. 
- CVE-2019-6226: Fixed multiple memory corruption vulnerabilities which could allow arbitrary code execution during the processing
  of special crafted web-content.  
- CVE-2019-6227: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6229: Fixed a logic issue by improving validation which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6233: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.
- CVE-2019-6234: Fixed a memory corruption vulnerability which could allow arbitrary code execution during the processing
  of special crafted web-content.

Other issues addressed:   
- Update to version 2.22.6 (bsc#1124937).
- Kinetic scrolling slow down smoothly when reaching the ends of pages, instead of abruptly, to better match the GTK+ behaviour.
- Fixed Web inspector magnifier under Wayland.
- Fixed garbled rendering of some websites (e.g. YouTube) while scrolling under X11.
- Fixed several crashes, race conditions, and rendering issues.

		</description>
<advisory from="security@suse.de">
	<issued date="2019-02-28"/>
	<updated date="2019-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81694" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1104662" ref_url="https://bugzilla.suse.com/1104662" source="BUGZILLA"/>
		<reference ref_id="1120813" ref_url="https://bugzilla.suse.com/1120813" source="BUGZILLA"/>
		<reference ref_id="1127458" ref_url="https://bugzilla.suse.com/1127458" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

Security issues fixed: 

- CVE-2019-3840: Fixed a null pointer dereference vulnerability in virJSONValueObjectHasKey function which could
  have resulted in a remote denial of service via the guest agent (bsc#1127458).

Other issues fixed:   

- libxl: save current memory value after successful balloon (bsc#1120813).
- spec: Don't restart libvirt-guests when updating libvirt-client (bsc#1104662).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104662">SUSE bug 1104662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120813">SUSE bug 1120813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530840" comment="libvirt-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530841" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530842" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530843" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530844" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530845" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530847" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530848" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530849" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530850" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530851" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530852" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530853" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530854" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530855" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530856" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530858" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530859" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530860" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81695" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1112142" ref_url="https://bugzilla.suse.com/1112142" source="BUGZILLA"/>
		<reference ref_id="1112143" ref_url="https://bugzilla.suse.com/1112143" source="BUGZILLA"/>
		<reference ref_id="1112144" ref_url="https://bugzilla.suse.com/1112144" source="BUGZILLA"/>
		<reference ref_id="1112146" ref_url="https://bugzilla.suse.com/1112146" source="BUGZILLA"/>
		<reference ref_id="1112147" ref_url="https://bugzilla.suse.com/1112147" source="BUGZILLA"/>
		<reference ref_id="1112148" ref_url="https://bugzilla.suse.com/1112148" source="BUGZILLA"/>
		<reference ref_id="1112152" ref_url="https://bugzilla.suse.com/1112152" source="BUGZILLA"/>
		<reference ref_id="1112153" ref_url="https://bugzilla.suse.com/1112153" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version 8u191 fixes the following issues:

Security issues fixed:

- CVE-2018-3136: Manifest better support (bsc#1112142)
- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)
- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)
- CVE-2018-3169: Improve field accesses (bsc#1112146)
- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)
- CVE-2018-3214: Better RIFF reading support (bsc#1112152)
- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)
- CVE-2018-3183: Improve script engine support (bsc#1112148)
- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81696" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1110279" ref_url="https://bugzilla.suse.com/1110279" source="BUGZILLA"/>
		<reference ref_id="1116998" ref_url="https://bugzilla.suse.com/1116998" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.22.4 fixes the following issues:

Security issues fixed:

  CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4392,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
  CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361,
  CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4416,
  CVE-2018-4378, CVE-2018-4382, CVE-2018-4386 (bsc#1110279, bsc#1116998). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81697" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1120114" ref_url="https://bugzilla.suse.com/1120114" source="BUGZILLA"/>
		<reference ref_id="1120115" ref_url="https://bugzilla.suse.com/1120115" source="BUGZILLA"/>
		<reference ref_id="1120116" ref_url="https://bugzilla.suse.com/1120116" source="BUGZILLA"/>
		<reference ref_id="1120117" ref_url="https://bugzilla.suse.com/1120117" source="BUGZILLA"/>
		<reference ref_id="1120118" ref_url="https://bugzilla.suse.com/1120118" source="BUGZILLA"/>
		<reference ref_id="1120119" ref_url="https://bugzilla.suse.com/1120119" source="BUGZILLA"/>
		<reference ref_id="1120120" ref_url="https://bugzilla.suse.com/1120120" source="BUGZILLA"/>
		<reference ref_id="1120121" ref_url="https://bugzilla.suse.com/1120121" source="BUGZILLA"/>
		<reference ref_id="1120122" ref_url="https://bugzilla.suse.com/1120122" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

Security issues fixed:

- CVE-2018-15126: Fixed use-after-free in file transfer extension (bsc#1120114)
- CVE-2018-6307: Fixed use-after-free in file transfer extension server code (bsc#1120115)
- CVE-2018-20020: Fixed heap out-of-bound write inside structure in VNC client code (bsc#1120116)
- CVE-2018-15127: Fixed heap out-of-bounds write in rfbserver.c (bsc#1120117)
- CVE-2018-20019: Fixed multiple heap out-of-bound writes in VNC client code (bsc#1120118)
- CVE-2018-20023: Fixed information disclosure through improper initialization in VNC Repeater client code (bsc#1120119)
- CVE-2018-20022: Fixed information disclosure through improper initialization in VNC client code (bsc#1120120)
- CVE-2018-20024: Fixed NULL pointer dereference in VNC client code (bsc#1120121)
- CVE-2018-20021: Fixed infinite loop in VNC client code (bsc#1120122)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-01-10"/>
	<updated date="2019-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81698" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:

Security issues fixed: 

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).	  

More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-13"/>
	<updated date="2019-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530865" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81699" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1122292" ref_url="https://bugzilla.suse.com/1122292" source="BUGZILLA"/>
		<reference ref_id="1122293" ref_url="https://bugzilla.suse.com/1122293" source="BUGZILLA"/>
		<reference ref_id="1122299" ref_url="https://bugzilla.suse.com/1122299" source="BUGZILLA"/>
		<reference ref_id="1128158" ref_url="https://bugzilla.suse.com/1128158" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:

Security issues fixed:

- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). 

More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-15"/>
	<updated date="2019-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530870" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530872" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81700" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1091236" ref_url="https://bugzilla.suse.com/1091236" source="BUGZILLA"/>
		<reference ref_id="1128471" ref_url="https://bugzilla.suse.com/1128471" source="BUGZILLA"/>
		<reference ref_id="1128472" ref_url="https://bugzilla.suse.com/1128472" source="BUGZILLA"/>
		<reference ref_id="1128474" ref_url="https://bugzilla.suse.com/1128474" source="BUGZILLA"/>
		<reference ref_id="1128476" ref_url="https://bugzilla.suse.com/1128476" source="BUGZILLA"/>
		<reference ref_id="1128480" ref_url="https://bugzilla.suse.com/1128480" source="BUGZILLA"/>
		<reference ref_id="1128481" ref_url="https://bugzilla.suse.com/1128481" source="BUGZILLA"/>
		<reference ref_id="1128490" ref_url="https://bugzilla.suse.com/1128490" source="BUGZILLA"/>
		<reference ref_id="1128492" ref_url="https://bugzilla.suse.com/1128492" source="BUGZILLA"/>
		<reference ref_id="1128493" ref_url="https://bugzilla.suse.com/1128493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This update for libssh2_org fixes the following issues:

Security issues fixed: 	  

- CVE-2019-3861: Fixed Out-of-bounds reads with specially crafted SSH packets (bsc#1128490).
- CVE-2019-3862: Fixed Out-of-bounds memory comparison with specially crafted message channel request packet (bsc#1128492).
- CVE-2019-3860: Fixed Out-of-bounds reads with specially crafted SFTP packets (bsc#1128481).
- CVE-2019-3863: Fixed an Integer overflow in user authenticate keyboard interactive which could allow out-of-bounds writes 
  with specially crafted keyboard responses (bsc#1128493).
- CVE-2019-3856: Fixed a potential Integer overflow in keyboard interactive handling which could allow out-of-bounds write 
  with specially crafted payload (bsc#1128472).
- CVE-2019-3859: Fixed Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require 
  and _libssh2_packet_requirev (bsc#1128480).
- CVE-2019-3855: Fixed a potential Integer overflow in transport read which could allow out-of-bounds write with specially 
  crafted payload (bsc#1128471).
- CVE-2019-3858: Fixed a potential zero-byte allocation which could lead to an out-of-bounds read with a specially crafted 
  SFTP packet (bsc#1128476).
- CVE-2019-3857: Fixed a potential Integer overflow which could lead to zero-byte allocation and out-of-bounds with specially 
  crafted message channel request SSH packet (bsc#1128474).

Other issue addressed: 

- Libbssh2 will stop using keys unsupported types in the known_hosts file (bsc#1091236).
 		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-20"/>
	<updated date="2019-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091236">SUSE bug 1091236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81701" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81702" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_73 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81703" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.120-92_70 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81704" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_80 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-21"/>
	<updated date="2019-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81705" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552437" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81706" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_92 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81707" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1129186" ref_url="https://bugzilla.suse.com/1129186" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issue:
	  
Security issue fixed:

- CVE-2019-3838: Fixed a vulnerability which made forceput operator in DefineResource to be still accessible
  which could allow access to file system outside of the constraints of -dSAFER (bsc#1129186).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-22"/>
	<updated date="2019-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81708" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552438" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81709" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1129231" ref_url="https://bugzilla.suse.com/1129231" source="BUGZILLA"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to the 20190312 bundle release (bsc#1129231)

New Platforms:

- AML-Y22      H0       6-8e-9/10           0000009e Core Gen8 Mobile
- WHL-U        W0       6-8e-b/d0           000000a4 Core Gen8 Mobile
- WHL-U        V0       6-8e-d/94           000000b2 Core Gen8 Mobile
- CFL-S        P0       6-9e-c/22           000000a2 Core Gen9 Desktop
- CFL-H        R0       6-9e-d/22           000000b0 Core Gen9 Mobile

Updated Platforms:

- HSX-E/EP     Cx/M1    6-3f-2/6f 0000003d-&gt;00000041 Core Gen4 X series; Xeon E5 v3
- HSX-EX       E0       6-3f-4/80 00000012-&gt;00000013 Xeon E7 v3
- SKX-SP       H0/M0/U0 6-55-4/b7 0200004d-&gt;0000005a Xeon Scalable
- SKX-D        M1       6-55-4/b7 0200004d-&gt;0000005a Xeon D-21xx
- BDX-DE       V1       6-56-2/10 00000017-&gt;00000019 Xeon D-1520/40
- BDX-DE       V2/3     6-56-3/10 07000013-&gt;07000016 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
- BDX-DE       Y0       6-56-4/10 0f000012-&gt;0f000014 Xeon D-1557/59/67/71/77/81/87
- BDX-NS       A0       6-56-5/10 0e00000a-&gt;0e00000c Xeon D-1513N/23/33/43/53
- APL          D0       6-5c-9/03 00000032-&gt;00000036 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
- APL          E0       6-5c-a/03 0000000c-&gt;00000010 Atom x5/7-E39xx
- GLK          B0       6-7a-1/01 00000028-&gt;0000002c Pentium Silver N/J5xxx, Celeron N/J4xxx
- KBL-U/Y      H0       6-8e-9/c0 0000008e-&gt;0000009a Core Gen7 Mobile
- CFL-U43e     D0       6-8e-a/c0 00000096-&gt;0000009e Core Gen8 Mobile
- KBL-H/S/E3   B0       6-9e-9/2a 0000008e-&gt;0000009a Core Gen7; Xeon E3 v6
- CFL-H/S/E3   U0       6-9e-a/22 00000096-&gt;000000aa Core Gen8 Desktop, Mobile, Xeon E
- CFL-S B0 6-9e-b/02 0000008e-&gt;000000aa Core Gen8

		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-25"/>
	<updated date="2019-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1129231">SUSE bug 1129231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521698" comment="ucode-intel-20190312-13.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81710" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1128525" ref_url="https://bugzilla.suse.com/1128525" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

Security issue fixed: 	  

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause 
  segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81711" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="1107832" ref_url="https://bugzilla.suse.com/1107832" source="BUGZILLA"/>
		<reference ref_id="1124729" ref_url="https://bugzilla.suse.com/1124729" source="BUGZILLA"/>
		<reference ref_id="1124734" ref_url="https://bugzilla.suse.com/1124734" source="BUGZILLA"/>
		<reference ref_id="1128378" ref_url="https://bugzilla.suse.com/1128378" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-9213: Expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bsc#1128378).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124734).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bsc#1124729).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-28"/>
	<updated date="2019-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552439" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81712" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1100078" ref_url="https://bugzilla.suse.com/1100078" source="BUGZILLA"/>
		<reference ref_id="1113975" ref_url="https://bugzilla.suse.com/1113975" source="BUGZILLA"/>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1127080" ref_url="https://bugzilla.suse.com/1127080" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issues fixed: 

- The 9 Lives of Bleichenbacher's CAT: Cache Attacks on TLS Implementations (bsc#1117951)
- CVE-2019-1559: Fixed OpenSSL 0-byte Record Padding Oracle which under certain circumstances
  a TLS server can be forced to respond differently to a client and lead to the decryption of the data (bsc#1127080).

Other issues addressed: 

- Fixed IV handling in SHAEXT paths: aes/asm/aesni-sha*-x86_64.pl (bsc#1113975).
- Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-03-29"/>
	<updated date="2019-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100078">SUSE bug 1100078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113975">SUSE bug 1113975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521711" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521712" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521713" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530874" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530875" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521714" comment="openssl-1.0.2j-60.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81713" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1012382" ref_url="https://bugzilla.suse.com/1012382" source="BUGZILLA"/>
		<reference ref_id="1075697" ref_url="https://bugzilla.suse.com/1075697" source="BUGZILLA"/>
		<reference ref_id="1082943" ref_url="https://bugzilla.suse.com/1082943" source="BUGZILLA"/>
		<reference ref_id="1098599" ref_url="https://bugzilla.suse.com/1098599" source="BUGZILLA"/>
		<reference ref_id="1102959" ref_url="https://bugzilla.suse.com/1102959" source="BUGZILLA"/>
		<reference ref_id="1105402" ref_url="https://bugzilla.suse.com/1105402" source="BUGZILLA"/>
		<reference ref_id="1107829" ref_url="https://bugzilla.suse.com/1107829" source="BUGZILLA"/>
		<reference ref_id="1108145" ref_url="https://bugzilla.suse.com/1108145" source="BUGZILLA"/>
		<reference ref_id="1109137" ref_url="https://bugzilla.suse.com/1109137" source="BUGZILLA"/>
		<reference ref_id="1109330" ref_url="https://bugzilla.suse.com/1109330" source="BUGZILLA"/>
		<reference ref_id="1110286" ref_url="https://bugzilla.suse.com/1110286" source="BUGZILLA"/>
		<reference ref_id="1117645" ref_url="https://bugzilla.suse.com/1117645" source="BUGZILLA"/>
		<reference ref_id="1119019" ref_url="https://bugzilla.suse.com/1119019" source="BUGZILLA"/>
		<reference ref_id="1120691" ref_url="https://bugzilla.suse.com/1120691" source="BUGZILLA"/>
		<reference ref_id="1121698" ref_url="https://bugzilla.suse.com/1121698" source="BUGZILLA"/>
		<reference ref_id="1121805" ref_url="https://bugzilla.suse.com/1121805" source="BUGZILLA"/>
		<reference ref_id="1122821" ref_url="https://bugzilla.suse.com/1122821" source="BUGZILLA"/>
		<reference ref_id="1124728" ref_url="https://bugzilla.suse.com/1124728" source="BUGZILLA"/>
		<reference ref_id="1124732" ref_url="https://bugzilla.suse.com/1124732" source="BUGZILLA"/>
		<reference ref_id="1124735" ref_url="https://bugzilla.suse.com/1124735" source="BUGZILLA"/>
		<reference ref_id="1125315" ref_url="https://bugzilla.suse.com/1125315" source="BUGZILLA"/>
		<reference ref_id="1127155" ref_url="https://bugzilla.suse.com/1127155" source="BUGZILLA"/>
		<reference ref_id="1127758" ref_url="https://bugzilla.suse.com/1127758" source="BUGZILLA"/>
		<reference ref_id="1127961" ref_url="https://bugzilla.suse.com/1127961" source="BUGZILLA"/>
		<reference ref_id="1128166" ref_url="https://bugzilla.suse.com/1128166" source="BUGZILLA"/>
		<reference ref_id="1129080" ref_url="https://bugzilla.suse.com/1129080" source="BUGZILLA"/>
		<reference ref_id="1129179" ref_url="https://bugzilla.suse.com/1129179" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>


The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).
- CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).

The following non-security bugs were fixed:

- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).
- scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-01"/>
	<updated date="2019-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1012382">SUSE bug 1012382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075697">SUSE bug 1075697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082943">SUSE bug 1082943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098599">SUSE bug 1098599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102959">SUSE bug 1102959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105402">SUSE bug 1105402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108145">SUSE bug 1108145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109137">SUSE bug 1109137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109330">SUSE bug 1109330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110286">SUSE bug 1110286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117645">SUSE bug 1117645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119019">SUSE bug 1119019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120691">SUSE bug 1120691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121698">SUSE bug 1121698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121805">SUSE bug 1121805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122821">SUSE bug 1122821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125315">SUSE bug 1125315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127155">SUSE bug 1127155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127758">SUSE bug 1127758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127961">SUSE bug 1127961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129080">SUSE bug 1129080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81714" version="1" class="patch">
	<metadata>
		<title>Security update for bash (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1130324" ref_url="https://bugzilla.suse.com/1130324" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<description>
This update for bash fixes the following issues:
	  
Security issue fixed: 

- CVE-2019-9924: Fixed a vulnerability in which shell did not prevent user BASH_CMDS 
  allowing the user to execute any command with the permissions of the shell (bsc#1130324).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-07-05"/>
	<updated date="2019-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81715" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1125330" ref_url="https://bugzilla.suse.com/1125330" source="BUGZILLA"/>
		<reference ref_id="1127987" ref_url="https://bugzilla.suse.com/1127987" source="BUGZILLA"/>
		<reference ref_id="1129821" ref_url="https://bugzilla.suse.com/1129821" source="BUGZILLA"/>
		<reference ref_id="1130262" ref_url="https://bugzilla.suse.com/1130262" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Security issuess addressed:	  

- update to Firefox ESR 60.6.1 (bsc#1130262):

- CVE-2019-9813: Fixed Ionmonkey type confusion with __proto__ mutations
- CVE-2019-9810: Fixed IonMonkey MArraySlice incorrect alias information

- Update to Firefox ESR 60.6 (bsc#1129821):

- CVE-2018-18506: Fixed an issue with Proxy Auto-Configuration file 
- CVE-2019-9801: Fixed an issue which could allow Windows programs to be exposed to web content
- CVE-2019-9788: Fixed multiple memory safety bugs
- CVE-2019-9790: Fixed a Use-after-free vulnerability when removing in-use DOM elements
- CVE-2019-9791: Fixed an incorrect Type inference for constructors entered through on-stack replacement 
  with IonMonkey
- CVE-2019-9792: Fixed an issue where IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
- CVE-2019-9793: Fixed multiple improper bounds checks when Spectre mitigations are disabled
- CVE-2019-9794: Fixed an issue where command line arguments not discarded during execution
- CVE-2019-9795: Fixed a Type-confusion vulnerability in IonMonkey JIT compiler
- CVE-2019-9796: Fixed a Use-after-free vulnerability in SMIL animation controller


- Update to Firefox ESR 60.5.1 (bsc#1125330):

- CVE-2018-18356: Fixed a use-after-free vulnerability in the Skia library which can occur when
    creating a path, leading to a potentially exploitable crash.
- CVE-2019-5785: Fixed an integer overflow vulnerability in the Skia library which can occur
  after specific transform operations, leading to a potentially exploitable crash.
- CVE-2018-18335: Fixed a buffer overflow vulnerability in the Skia library which can occur with
  Canvas 2D acceleration on macOS. This issue was addressed by disabling Canvas 2D acceleration 
  in Firefox ESR.  Note: this does not affect other versions and platforms where Canvas 2D
  acceleration is already disabled by default.

Other issue addressed: 

- Fixed an issue with MozillaFirefox-translations-common which was causing error on update (bsc#1127987).

Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-12/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-08/
Release notes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/	  
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-03"/>
	<updated date="2019-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127987">SUSE bug 1127987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81716" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1131233" ref_url="https://bugzilla.suse.com/1131233" source="BUGZILLA"/>
		<reference ref_id="1131237" ref_url="https://bugzilla.suse.com/1131237" source="BUGZILLA"/>
		<reference ref_id="1131239" ref_url="https://bugzilla.suse.com/1131239" source="BUGZILLA"/>
		<reference ref_id="1131241" ref_url="https://bugzilla.suse.com/1131241" source="BUGZILLA"/>
		<reference ref_id="1131245" ref_url="https://bugzilla.suse.com/1131245" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]

		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-04"/>
	<updated date="2019-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81717" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
This update for clamav to version 0.100.3 fixes the following issues:

Security issues fixed (bsc#1130721): 	  

- CVE-2019-1787: Fixed an out-of-bounds heap read condition which may occur
  when scanning PDF documents.   
- CVE-2019-1789: Fixed an out-of-bounds heap read condition which may occur
  when scanning PE files (i.e. Windows EXE and DLL files).
- CVE-2019-1788: Fixed an out-of-bounds heap write condition which may occur
  when scanning OLE2 files such as Microsoft Office 97-2003 documents. 
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81718" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111789" ref_url="https://bugzilla.suse.com/1111789" source="BUGZILLA"/>
		<reference ref_id="1123022" ref_url="https://bugzilla.suse.com/1123022" source="BUGZILLA"/>
		<reference ref_id="1130116" ref_url="https://bugzilla.suse.com/1130116" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

Security issues fixed: 

- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing 
  local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).

Other issue fixed: 
- Fixed handling of command continuation(bsc#1111789)
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-08"/>
	<updated date="2019-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1111789">SUSE bug 1111789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530892" comment="dovecot22-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530893" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530894" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530895" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81719" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1119687" ref_url="https://bugzilla.suse.com/1119687" source="BUGZILLA"/>
		<reference ref_id="1131576" ref_url="https://bugzilla.suse.com/1131576" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506/" source="CVE"/>
		<description>
This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-09"/>
	<updated date="2019-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81720" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1026236" ref_url="https://bugzilla.suse.com/1026236" source="BUGZILLA"/>
		<reference ref_id="1114988" ref_url="https://bugzilla.suse.com/1114988" source="BUGZILLA"/>
		<reference ref_id="1123157" ref_url="https://bugzilla.suse.com/1123157" source="BUGZILLA"/>
		<reference ref_id="1126140" ref_url="https://bugzilla.suse.com/1126140" source="BUGZILLA"/>
		<reference ref_id="1126141" ref_url="https://bugzilla.suse.com/1126141" source="BUGZILLA"/>
		<reference ref_id="1126192" ref_url="https://bugzilla.suse.com/1126192" source="BUGZILLA"/>
		<reference ref_id="1126195" ref_url="https://bugzilla.suse.com/1126195" source="BUGZILLA"/>
		<reference ref_id="1126196" ref_url="https://bugzilla.suse.com/1126196" source="BUGZILLA"/>
		<reference ref_id="1126198" ref_url="https://bugzilla.suse.com/1126198" source="BUGZILLA"/>
		<reference ref_id="1126201" ref_url="https://bugzilla.suse.com/1126201" source="BUGZILLA"/>
		<reference ref_id="1127400" ref_url="https://bugzilla.suse.com/1127400" source="BUGZILLA"/>
		<reference ref_id="1129623" ref_url="https://bugzilla.suse.com/1129623" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed: 

- Fixed an issue which could allow malicious PV guests may cause a host crash or 
  gain access to data pertaining to other guests.Additionally, vulnerable configurations 
  are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow 
  a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege 
  to that of other userspace processes in the same guest and potentially thereby to that 
  of the guest operating system (bsc#1126201).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
  attack affecting the whole system (bsc#1126196).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own 
  pagetables leading to privilege escalation (bsc#1126195).
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to  be able to 
  escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory 
  leaks were also possible (bsc#1126140).
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that 
  of the hypervisor (bsc#1126141).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process 
  to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
  resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)

Other issue addressed: 

- Added Xen cmdline option 'suse_vtsc_tolerance' to avoid TSC emulation for HVM domUs (bsc#1026236).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-10"/>
	<updated date="2019-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1026236">SUSE bug 1026236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81721" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102682" ref_url="https://bugzilla.suse.com/1102682" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes one issue.

The following security issue was fixed:

- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552440" comment="kgraft-patch-4_4_121-92_104-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81722" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1131493" ref_url="https://bugzilla.suse.com/1131493" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
This update for wget fixes the following issues:

Security issue fixed:

- CVE-2019-5953: Fixed a buffer overflow vulnerability which might cause code execution (bsc#1131493).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81723" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1129346" ref_url="https://bugzilla.suse.com/1129346" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-9636: Fixed an information disclosure because of incorrect handling of Unicode encoding during NFKC normalization (bsc#1129346).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-16"/>
	<updated date="2019-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81724" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1112758" ref_url="https://bugzilla.suse.com/1112758" source="BUGZILLA"/>
		<reference ref_id="1131886" ref_url="https://bugzilla.suse.com/1131886" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

Security issue fixed:

- CVE-2018-16839: Fixed a buffer overflow in the SASL authentication code (bsc#1112758).
		</description>
<advisory from="security@suse.de">
	<issued date="2019-04-23"/>
	<updated date="2019-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009521781" comment="curl-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521782" comment="libcurl4-7.37.0-37.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009521783" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81725" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1168422" ref_url="https://bugzilla.suse.com/1168422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-3898: Fixed a heap buffer overflow in ppdFindOption() (bsc#1168422).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-23"/>
	<updated date="2020-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81726" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1141670" ref_url="https://bugzilla.suse.com/1141670" source="BUGZILLA"/>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: Fixed a buffer overflow in password field (bsc#1163933).
- On s390x didn't decrypt passwords correctly (bsc#1141670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-27"/>
	<updated date="2020-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141670">SUSE bug 1141670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81727" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1155321" ref_url="https://bugzilla.suse.com/1155321" source="BUGZILLA"/>
		<reference ref_id="1156318" ref_url="https://bugzilla.suse.com/1156318" source="BUGZILLA"/>
		<reference ref_id="1159329" ref_url="https://bugzilla.suse.com/1159329" source="BUGZILLA"/>
		<reference ref_id="1161719" ref_url="https://bugzilla.suse.com/1161719" source="BUGZILLA"/>
		<reference ref_id="1163809" ref_url="https://bugzilla.suse.com/1163809" source="BUGZILLA"/>
		<reference ref_id="1165528" ref_url="https://bugzilla.suse.com/1165528" source="BUGZILLA"/>
		<reference ref_id="1169658" ref_url="https://bugzilla.suse.com/1169658" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<description>
This update for webkit2gtk3 to version 2.28.1 fixes the following issues:

Security issues fixed:

- CVE-2020-10018: Fixed a denial of service because the m_deferredFocusedNodeChange data structure was mishandled (bsc#1165528).
- CVE-2020-11793: Fixed a potential arbitrary code execution caused by a use-after-free vulnerability (bsc#1169658).
- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).
- CVE-2020-3864,CVE-2020-3865: Fixed logic issues in the DOM object context handling (bsc#1163809).

Non-security issues fixed:

- Add API to enable Process Swap on (Cross-site) Navigation.
- Add user messages API for the communication with the web extension.
- Add support for same-site cookies.
- Service workers are enabled by default.
- Add support for Pointer Lock API.
- Add flatpak sandbox support.
- Make ondemand hardware acceleration policy never leave accelerated compositing mode.
- Always use a light theme for rendering form controls.
- Add about:gpu to show information about the graphics stack.
- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-29"/>
	<updated date="2020-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159329">SUSE bug 1159329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81728" version="1" class="patch">
	<metadata>
		<title>Security update for shibboleth-sp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1157471" ref_url="https://bugzilla.suse.com/1157471" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<description>
This update for shibboleth-sp fixes the following issues:

Security issue fixed:

- CVE-2019-19191: Fixed escalation to root by fixing ownership of log files (bsc#1157471).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-16"/>
	<updated date="2020-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81729" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1155419" ref_url="https://bugzilla.suse.com/1155419" source="BUGZILLA"/>
		<reference ref_id="1160471" ref_url="https://bugzilla.suse.com/1160471" source="BUGZILLA"/>
		<reference ref_id="1170441" ref_url="https://bugzilla.suse.com/1170441" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2019-15690: Fixed a heap buffer overflow (bsc#1160471).
- CVE-2019-15681: Fixed a memory leak which could have allowed to a remote attacker to read stack memory (bsc#1155419).
- CVE-2019-20788: Fixed a integer overflow and heap-based buffer overflow via a large height or width value (bsc#1170441).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-04"/>
	<updated date="2020-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81730" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed integer overflow in UnicodeString:doAppend() (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81731" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1170771" ref_url="https://bugzilla.suse.com/1170771" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-05"/>
	<updated date="2020-05-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530931" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81732" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1170643" ref_url="https://bugzilla.suse.com/1170643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Security issue fixed:

- CVE-2020-3899: Fixed a memory consumption issue that could have led to remote code execution (bsc#1170643).

Non-security issues fixed:

- Update to version 2.28.2 (bsc#1170643):
  + Fix excessive CPU usage due to GdkFrameClock not being stopped.
  + Fix UI process crash when EGL_WL_bind_wayland_display extension
    is not available.
  + Fix position of select popup menus in X11.
  + Fix playing of Youtube 'live stream'/H264 URLs.
  + Fix a crash under X11 when cairo uses xcb.
  + Fix the build in MIPS64.
  + Fix several crashes and rendering issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530937" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530939" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81733" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1170603" ref_url="https://bugzilla.suse.com/1170603" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<description>
This update for ghostscript to version 9.52 fixes the following issues:

- CVE-2020-12268: Fixed a heap-based buffer overflow in jbig2_image_compose (bsc#1170603).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81734" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171186" ref_url="https://bugzilla.suse.com/1171186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 68.8.0 ESR (bsc#1171186):

- CVE-2020-12387: Use-after-free during worker shutdown
- CVE-2020-12388: Sandbox escape with improperly guarded Access Tokens
- CVE-2020-12389: Sandbox escape with improperly separated process types
- CVE-2020-6831: Buffer overflow in SCTP chunk input validation
- CVE-2020-12392: Arbitrary local file access with 'Copy as cURL'
- CVE-2020-12393: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection
- CVE-2020-12395: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-07"/>
	<updated date="2020-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81735" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1169659" ref_url="https://bugzilla.suse.com/1169659" source="BUGZILLA"/>
		<reference ref_id="1170313" ref_url="https://bugzilla.suse.com/1170313" source="BUGZILLA"/>
		<reference ref_id="1170423" ref_url="https://bugzilla.suse.com/1170423" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12519, CVE-2019-12521: fixes incorrect buffer handling that can 
  result in cache poisoning, remote execution, and denial of service attacks
  when processing ESI responses (bsc#1169659).
- CVE-2020-11945: fixes a potential remote execution vulnerability
  when using HTTP Digest Authentication (bsc#1170313).
- CVE-2019-12520, CVE-2019-12524: fixes a potential ACL bypass, cache-bypass
  and cross-site scripting attack when processing invalid HTTP
  Request messages (bsc#1170423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-08"/>
	<updated date="2020-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81736" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1037216" ref_url="https://bugzilla.suse.com/1037216" source="BUGZILLA"/>
		<reference ref_id="1075091" ref_url="https://bugzilla.suse.com/1075091" source="BUGZILLA"/>
		<reference ref_id="1075994" ref_url="https://bugzilla.suse.com/1075994" source="BUGZILLA"/>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1087813" ref_url="https://bugzilla.suse.com/1087813" source="BUGZILLA"/>
		<reference ref_id="1091041" ref_url="https://bugzilla.suse.com/1091041" source="BUGZILLA"/>
		<reference ref_id="1099279" ref_url="https://bugzilla.suse.com/1099279" source="BUGZILLA"/>
		<reference ref_id="1120386" ref_url="https://bugzilla.suse.com/1120386" source="BUGZILLA"/>
		<reference ref_id="1131107" ref_url="https://bugzilla.suse.com/1131107" source="BUGZILLA"/>
		<reference ref_id="1133147" ref_url="https://bugzilla.suse.com/1133147" source="BUGZILLA"/>
		<reference ref_id="1136449" ref_url="https://bugzilla.suse.com/1136449" source="BUGZILLA"/>
		<reference ref_id="1137325" ref_url="https://bugzilla.suse.com/1137325" source="BUGZILLA"/>
		<reference ref_id="1146519" ref_url="https://bugzilla.suse.com/1146519" source="BUGZILLA"/>
		<reference ref_id="1146544" ref_url="https://bugzilla.suse.com/1146544" source="BUGZILLA"/>
		<reference ref_id="1146612" ref_url="https://bugzilla.suse.com/1146612" source="BUGZILLA"/>
		<reference ref_id="1149591" ref_url="https://bugzilla.suse.com/1149591" source="BUGZILLA"/>
		<reference ref_id="1153811" ref_url="https://bugzilla.suse.com/1153811" source="BUGZILLA"/>
		<reference ref_id="1154844" ref_url="https://bugzilla.suse.com/1154844" source="BUGZILLA"/>
		<reference ref_id="1155311" ref_url="https://bugzilla.suse.com/1155311" source="BUGZILLA"/>
		<reference ref_id="1155897" ref_url="https://bugzilla.suse.com/1155897" source="BUGZILLA"/>
		<reference ref_id="1156060" ref_url="https://bugzilla.suse.com/1156060" source="BUGZILLA"/>
		<reference ref_id="1157038" ref_url="https://bugzilla.suse.com/1157038" source="BUGZILLA"/>
		<reference ref_id="1157042" ref_url="https://bugzilla.suse.com/1157042" source="BUGZILLA"/>
		<reference ref_id="1157070" ref_url="https://bugzilla.suse.com/1157070" source="BUGZILLA"/>
		<reference ref_id="1157143" ref_url="https://bugzilla.suse.com/1157143" source="BUGZILLA"/>
		<reference ref_id="1157155" ref_url="https://bugzilla.suse.com/1157155" source="BUGZILLA"/>
		<reference ref_id="1157157" ref_url="https://bugzilla.suse.com/1157157" source="BUGZILLA"/>
		<reference ref_id="1157158" ref_url="https://bugzilla.suse.com/1157158" source="BUGZILLA"/>
		<reference ref_id="1157303" ref_url="https://bugzilla.suse.com/1157303" source="BUGZILLA"/>
		<reference ref_id="1157324" ref_url="https://bugzilla.suse.com/1157324" source="BUGZILLA"/>
		<reference ref_id="1157333" ref_url="https://bugzilla.suse.com/1157333" source="BUGZILLA"/>
		<reference ref_id="1157464" ref_url="https://bugzilla.suse.com/1157464" source="BUGZILLA"/>
		<reference ref_id="1157804" ref_url="https://bugzilla.suse.com/1157804" source="BUGZILLA"/>
		<reference ref_id="1157923" ref_url="https://bugzilla.suse.com/1157923" source="BUGZILLA"/>
		<reference ref_id="1158021" ref_url="https://bugzilla.suse.com/1158021" source="BUGZILLA"/>
		<reference ref_id="1158132" ref_url="https://bugzilla.suse.com/1158132" source="BUGZILLA"/>
		<reference ref_id="1158381" ref_url="https://bugzilla.suse.com/1158381" source="BUGZILLA"/>
		<reference ref_id="1158394" ref_url="https://bugzilla.suse.com/1158394" source="BUGZILLA"/>
		<reference ref_id="1158398" ref_url="https://bugzilla.suse.com/1158398" source="BUGZILLA"/>
		<reference ref_id="1158410" ref_url="https://bugzilla.suse.com/1158410" source="BUGZILLA"/>
		<reference ref_id="1158413" ref_url="https://bugzilla.suse.com/1158413" source="BUGZILLA"/>
		<reference ref_id="1158417" ref_url="https://bugzilla.suse.com/1158417" source="BUGZILLA"/>
		<reference ref_id="1158427" ref_url="https://bugzilla.suse.com/1158427" source="BUGZILLA"/>
		<reference ref_id="1158445" ref_url="https://bugzilla.suse.com/1158445" source="BUGZILLA"/>
		<reference ref_id="1158819" ref_url="https://bugzilla.suse.com/1158819" source="BUGZILLA"/>
		<reference ref_id="1158823" ref_url="https://bugzilla.suse.com/1158823" source="BUGZILLA"/>
		<reference ref_id="1158824" ref_url="https://bugzilla.suse.com/1158824" source="BUGZILLA"/>
		<reference ref_id="1158827" ref_url="https://bugzilla.suse.com/1158827" source="BUGZILLA"/>
		<reference ref_id="1158834" ref_url="https://bugzilla.suse.com/1158834" source="BUGZILLA"/>
		<reference ref_id="1158900" ref_url="https://bugzilla.suse.com/1158900" source="BUGZILLA"/>
		<reference ref_id="1158903" ref_url="https://bugzilla.suse.com/1158903" source="BUGZILLA"/>
		<reference ref_id="1158904" ref_url="https://bugzilla.suse.com/1158904" source="BUGZILLA"/>
		<reference ref_id="1159199" ref_url="https://bugzilla.suse.com/1159199" source="BUGZILLA"/>
		<reference ref_id="1159285" ref_url="https://bugzilla.suse.com/1159285" source="BUGZILLA"/>
		<reference ref_id="1159297" ref_url="https://bugzilla.suse.com/1159297" source="BUGZILLA"/>
		<reference ref_id="1159841" ref_url="https://bugzilla.suse.com/1159841" source="BUGZILLA"/>
		<reference ref_id="1159908" ref_url="https://bugzilla.suse.com/1159908" source="BUGZILLA"/>
		<reference ref_id="1159910" ref_url="https://bugzilla.suse.com/1159910" source="BUGZILLA"/>
		<reference ref_id="1159911" ref_url="https://bugzilla.suse.com/1159911" source="BUGZILLA"/>
		<reference ref_id="1159912" ref_url="https://bugzilla.suse.com/1159912" source="BUGZILLA"/>
		<reference ref_id="1160195" ref_url="https://bugzilla.suse.com/1160195" source="BUGZILLA"/>
		<reference ref_id="1162227" ref_url="https://bugzilla.suse.com/1162227" source="BUGZILLA"/>
		<reference ref_id="1162298" ref_url="https://bugzilla.suse.com/1162298" source="BUGZILLA"/>
		<reference ref_id="1162928" ref_url="https://bugzilla.suse.com/1162928" source="BUGZILLA"/>
		<reference ref_id="1162929" ref_url="https://bugzilla.suse.com/1162929" source="BUGZILLA"/>
		<reference ref_id="1162931" ref_url="https://bugzilla.suse.com/1162931" source="BUGZILLA"/>
		<reference ref_id="1163971" ref_url="https://bugzilla.suse.com/1163971" source="BUGZILLA"/>
		<reference ref_id="1164069" ref_url="https://bugzilla.suse.com/1164069" source="BUGZILLA"/>
		<reference ref_id="1164078" ref_url="https://bugzilla.suse.com/1164078" source="BUGZILLA"/>
		<reference ref_id="1164846" ref_url="https://bugzilla.suse.com/1164846" source="BUGZILLA"/>
		<reference ref_id="1165111" ref_url="https://bugzilla.suse.com/1165111" source="BUGZILLA"/>
		<reference ref_id="1165311" ref_url="https://bugzilla.suse.com/1165311" source="BUGZILLA"/>
		<reference ref_id="1165873" ref_url="https://bugzilla.suse.com/1165873" source="BUGZILLA"/>
		<reference ref_id="1165881" ref_url="https://bugzilla.suse.com/1165881" source="BUGZILLA"/>
		<reference ref_id="1165984" ref_url="https://bugzilla.suse.com/1165984" source="BUGZILLA"/>
		<reference ref_id="1165985" ref_url="https://bugzilla.suse.com/1165985" source="BUGZILLA"/>
		<reference ref_id="1167629" ref_url="https://bugzilla.suse.com/1167629" source="BUGZILLA"/>
		<reference ref_id="1168075" ref_url="https://bugzilla.suse.com/1168075" source="BUGZILLA"/>
		<reference ref_id="1168295" ref_url="https://bugzilla.suse.com/1168295" source="BUGZILLA"/>
		<reference ref_id="1168424" ref_url="https://bugzilla.suse.com/1168424" source="BUGZILLA"/>
		<reference ref_id="1168829" ref_url="https://bugzilla.suse.com/1168829" source="BUGZILLA"/>
		<reference ref_id="1168854" ref_url="https://bugzilla.suse.com/1168854" source="BUGZILLA"/>
		<reference ref_id="1170056" ref_url="https://bugzilla.suse.com/1170056" source="BUGZILLA"/>
		<reference ref_id="1170345" ref_url="https://bugzilla.suse.com/1170345" source="BUGZILLA"/>
		<reference ref_id="1170778" ref_url="https://bugzilla.suse.com/1170778" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).
- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).
- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).
- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).
- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).
- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).
- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).
- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).
- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).
- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).
- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).
- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).
- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).
- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).
- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).
- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).
- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).
- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).
- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).
- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).
- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).
- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).
- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).
- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).
- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).
- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).
- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).
- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).
- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the 'MDS' Microarchitectural Data Sampling attacks were not complete.
  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)


The following non-security bugs were fixed:

- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1155311).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).
- cgroup: avoid copying strings longer than the buffers (bsc#1146544).
- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).
- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).
- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- ipv4: correct gso_size for UFO (bsc#1154844).
- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).
- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).
- powerpc/64s: Add support for software count cache flush (bsc#1131107).
- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).
- powerpc/asm: Add a patch_site macro &amp; helpers for patching instructions (bsc#1131107).
- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).
- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).
- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).
- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).
- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).
- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).
- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).
- sched/fair: WARN() and refuse to set buddy when !se-&gt;on_rq (bsc#1158132).
- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).
- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1037216">SUSE bug 1037216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075091">SUSE bug 1075091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075994">SUSE bug 1075994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091041">SUSE bug 1091041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099279">SUSE bug 1099279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131107">SUSE bug 1131107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133147">SUSE bug 1133147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136449">SUSE bug 1136449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137325">SUSE bug 1137325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146612">SUSE bug 1146612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153811">SUSE bug 1153811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154844">SUSE bug 1154844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155311">SUSE bug 1155311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156060">SUSE bug 1156060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157464">SUSE bug 1157464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158132">SUSE bug 1158132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159199">SUSE bug 1159199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162227">SUSE bug 1162227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162298">SUSE bug 1162298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164846">SUSE bug 1164846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165311">SUSE bug 1165311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165873">SUSE bug 1165873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165984">SUSE bug 1165984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165985">SUSE bug 1165985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81737" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1168404" ref_url="https://bugzilla.suse.com/1168404" source="BUGZILLA"/>
		<reference ref_id="1168407" ref_url="https://bugzilla.suse.com/1168407" source="BUGZILLA"/>
		<reference ref_id="1169066" ref_url="https://bugzilla.suse.com/1169066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-1934: mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server (bsc#1168404).
- CVE-2020-1927: mod_rewrite configurations vulnerable to open redirect (bsc#1168407).
- CVE-2020-1938: mod_proxy_ajp: Add 'secret' parameter to proxy workers to implement legacy AJP13 authentication (bsc#1169066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-13"/>
	<updated date="2020-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81738" version="1" class="patch">
	<metadata>
		<title>Security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="1169605" ref_url="https://bugzilla.suse.com/1169605" source="BUGZILLA"/>
		<reference ref_id="1169786" ref_url="https://bugzilla.suse.com/1169786" source="BUGZILLA"/>
		<reference ref_id="1169936" ref_url="https://bugzilla.suse.com/1169936" source="BUGZILLA"/>
		<reference ref_id="1170302" ref_url="https://bugzilla.suse.com/1170302" source="BUGZILLA"/>
		<reference ref_id="1170741" ref_url="https://bugzilla.suse.com/1170741" source="BUGZILLA"/>
		<reference ref_id="1170939" ref_url="https://bugzilla.suse.com/1170939" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This update for git to 2.26.2 fixes the following issues:

Security issue fixed:

- CVE-2020-11008: Specially crafted URLs may have tricked the credentials helper 
  to providing credential information that is not appropriate for the protocol 
  in use and host being contacted (bsc#1169936).

Non-security issue fixed:

- Fixed git-daemon not starting after conversion from sysvinit to systemd service (bsc#1169605).
- Enabled access for git-daemon in firewall configuration (bsc#1170302).
- Fixed problems with recent switch to protocol v2, which caused fetches transferring unreasonable amount of data (bsc#1170741).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169605">SUSE bug 1169605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169786">SUSE bug 1169786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170302">SUSE bug 1170302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170939">SUSE bug 1170939</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81739" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1167068" ref_url="https://bugzilla.suse.com/1167068" source="BUGZILLA"/>
		<reference ref_id="1170558" ref_url="https://bugzilla.suse.com/1170558" source="BUGZILLA"/>
		<reference ref_id="1171363" ref_url="https://bugzilla.suse.com/1171363" source="BUGZILLA"/>
		<reference ref_id="682920" ref_url="https://bugzilla.suse.com/682920" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

Security issue fixed:

- CVE-2020-12108: Fixed a content injection bug (bsc#1171363).
- CVE-2020-12137: Fixed a XSS vulnerability caused by MIME type confusion (bsc#1170558).

Non-security issue fixed:

- Fixed rights and ownership on /var/lib/mailman/archives (bsc#1167068).
- Don't default to invalid hosts for DEFAULT_EMAIL_HOST (bsc#682920).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-18"/>
	<updated date="2020-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167068">SUSE bug 1167068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682920">SUSE bug 682920</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81740" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552441" comment="kgraft-patch-4_4_121-92_125-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81741" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552442" comment="kgraft-patch-4_4_121-92_120-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81742" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552443" comment="kgraft-patch-4_4_121-92_117-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81743" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552444" comment="kgraft-patch-4_4_121-92_114-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81744" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-26"/>
	<updated date="2020-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552445" comment="kgraft-patch-4_4_121-92_109-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81745" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1171252" ref_url="https://bugzilla.suse.com/1171252" source="BUGZILLA"/>
		<reference ref_id="1171254" ref_url="https://bugzilla.suse.com/1171254" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-12653: Fixed a buffer overflow in mwifiex_cmd_append_vsie_tlv() which could have allowed local users to gain privileges or cause a denial of service (bsc#1171254).
- CVE-2020-12654: Fixed a heap-based buffer overflow in mwifiex_ret_wmm_get_status() which could have been triggered by a remote AP to trigger (bsc#1171252).
- CVE-2020-1749: Fixed an improper implementation in some IPsec protocols where the data were sent unencrypted allowing an attacker to read them (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-27"/>
	<updated date="2020-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552446" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81746" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1136085" ref_url="https://bugzilla.suse.com/1136085" source="BUGZILLA"/>
		<reference ref_id="1159723" ref_url="https://bugzilla.suse.com/1159723" source="BUGZILLA"/>
		<reference ref_id="1159729" ref_url="https://bugzilla.suse.com/1159729" source="BUGZILLA"/>
		<reference ref_id="1164825" ref_url="https://bugzilla.suse.com/1164825" source="BUGZILLA"/>
		<reference ref_id="1171928" ref_url="https://bugzilla.suse.com/1171928" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2020-9484 (bsc#1171928)
Apache Tomcat Remote Code Execution via session persistence

If an attacker was able to control the contents and name of a file on a
server configured to use the PersistenceManager, then the attacker could
have triggered a remote code execution via deserialization of the file under
their control.

CVE-2019-12418 (bsc#1159723)
Local privilege escalation by manipulating the RMI registry and performing a man-in-the-middle attack

When Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files was able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface.
The attacker could then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.

CVE-2019-0221 (bsc#1136085)
The SSI printenv command echoed user provided data without escaping, which
made it vulnerable to XSS.

CVE-2019-17563 (bsc#1159729)
When using FORM authentication there was a narrow window where an attacker could perform a session fixation attack.

CVE-2019-17569 (bsc#1164825)
Invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling
if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-05-28"/>
	<updated date="2020-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81747" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027282" ref_url="https://bugzilla.suse.com/1027282" source="BUGZILLA"/>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1042670" ref_url="https://bugzilla.suse.com/1042670" source="BUGZILLA"/>
		<reference ref_id="1073269" ref_url="https://bugzilla.suse.com/1073269" source="BUGZILLA"/>
		<reference ref_id="1073748" ref_url="https://bugzilla.suse.com/1073748" source="BUGZILLA"/>
		<reference ref_id="1078326" ref_url="https://bugzilla.suse.com/1078326" source="BUGZILLA"/>
		<reference ref_id="1078485" ref_url="https://bugzilla.suse.com/1078485" source="BUGZILLA"/>
		<reference ref_id="1081750" ref_url="https://bugzilla.suse.com/1081750" source="BUGZILLA"/>
		<reference ref_id="1084650" ref_url="https://bugzilla.suse.com/1084650" source="BUGZILLA"/>
		<reference ref_id="1086001" ref_url="https://bugzilla.suse.com/1086001" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="1153830" ref_url="https://bugzilla.suse.com/1153830" source="BUGZILLA"/>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1159035" ref_url="https://bugzilla.suse.com/1159035" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="1170411" ref_url="https://bugzilla.suse.com/1170411" source="BUGZILLA"/>
		<reference ref_id="1171561" ref_url="https://bugzilla.suse.com/1171561" source="BUGZILLA"/>
		<reference ref_id="945401" ref_url="https://bugzilla.suse.com/945401" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>


This update for python to version 2.7.17 fixes the following issues:

Syncing with lots of upstream bug fixes and security fixes.

Bug fixes:

- CVE-2019-9674: Improved the documentation to reflect the dangers of zip-bombs (bsc#1162825).
- CVE-2019-18348: Fixed a CRLF injection via the host part of the url passed to urlopen(). Now an InvalidURL exception is raised (bsc#1155094).
- CVE-2020-8492: Fixed a regular expression in urllib that was prone to denial of service via HTTP (bsc#1162367).
- Fixed mismatches between libpython and python-base versions (bsc#1162224).
- Fixed segfault in libpython2.7.so.1 (bsc#1073748).
- Unified packages among openSUSE:Factory and SLE versions (bsc#1159035).
- Added idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830).
- Excluded tsl_check files from python-base to prevent file conflict with python-strict-tls-checks package (bsc#945401).
- Changed the name of idle3 icons to idle3.png to avoid collision with Python 2 version (bsc#1165894).

Additionally a new 'shared-python-startup' package is provided containing startup files.

python-rpm-macros was updated to fix:

- Do not write .pyc files for tests (bsc#1171561)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027282">SUSE bug 1027282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042670">SUSE bug 1042670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073269">SUSE bug 1073269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073748">SUSE bug 1073748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078326">SUSE bug 1078326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078485">SUSE bug 1078485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081750">SUSE bug 1081750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084650">SUSE bug 1084650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086001">SUSE bug 1086001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153830">SUSE bug 1153830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159035">SUSE bug 1159035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170411">SUSE bug 1170411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171561">SUSE bug 1171561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945401">SUSE bug 945401</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81748" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1123156" ref_url="https://bugzilla.suse.com/1123156" source="BUGZILLA"/>
		<reference ref_id="1146873" ref_url="https://bugzilla.suse.com/1146873" source="BUGZILLA"/>
		<reference ref_id="1149811" ref_url="https://bugzilla.suse.com/1149811" source="BUGZILLA"/>
		<reference ref_id="1161066" ref_url="https://bugzilla.suse.com/1161066" source="BUGZILLA"/>
		<reference ref_id="1163018" ref_url="https://bugzilla.suse.com/1163018" source="BUGZILLA"/>
		<reference ref_id="1166240" ref_url="https://bugzilla.suse.com/1166240" source="BUGZILLA"/>
		<reference ref_id="1170940" ref_url="https://bugzilla.suse.com/1170940" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2020-1711: Fixed a potential OOB access in the iSCSI client code (bsc#1166240).
- CVE-2019-12068: Fixed a potential DoS in the LSI SCSI controller emulation (bsc#1146873).
- CVE-2020-1983: Fixed a use-after-free in the ip_reass function of slirp (bsc#1170940).
- CVE-2020-8608: Fixed a potential OOB access in slirp (bsc#1163018).
- CVE-2020-7039: Fixed a potential OOB access in slirp (bsc#1161066).
- CVE-2019-15890: Fixed a use-after-free during packet reassembly in slirp (bsc#1149811).
- Fixed multiple potential DoS issues in SLIRP, similar to CVE-2019-6778 (bsc#1123156).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-03"/>
	<updated date="2020-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81749" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165787" ref_url="https://bugzilla.suse.com/1165787" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2020-10188: Fixed a remote root execution (bsc#1165787).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81750" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-04"/>
	<updated date="2020-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81751" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172031" ref_url="https://bugzilla.suse.com/1172031" source="BUGZILLA"/>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225 and bsc#1172031).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172031">SUSE bug 1172031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81752" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531011" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81753" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1043983" ref_url="https://bugzilla.suse.com/1043983" source="BUGZILLA"/>
		<reference ref_id="1048072" ref_url="https://bugzilla.suse.com/1048072" source="BUGZILLA"/>
		<reference ref_id="1055265" ref_url="https://bugzilla.suse.com/1055265" source="BUGZILLA"/>
		<reference ref_id="1056286" ref_url="https://bugzilla.suse.com/1056286" source="BUGZILLA"/>
		<reference ref_id="1056782" ref_url="https://bugzilla.suse.com/1056782" source="BUGZILLA"/>
		<reference ref_id="1058754" ref_url="https://bugzilla.suse.com/1058754" source="BUGZILLA"/>
		<reference ref_id="1058755" ref_url="https://bugzilla.suse.com/1058755" source="BUGZILLA"/>
		<reference ref_id="1058757" ref_url="https://bugzilla.suse.com/1058757" source="BUGZILLA"/>
		<reference ref_id="1062452" ref_url="https://bugzilla.suse.com/1062452" source="BUGZILLA"/>
		<reference ref_id="1069607" ref_url="https://bugzilla.suse.com/1069607" source="BUGZILLA"/>
		<reference ref_id="1069632" ref_url="https://bugzilla.suse.com/1069632" source="BUGZILLA"/>
		<reference ref_id="1073002" ref_url="https://bugzilla.suse.com/1073002" source="BUGZILLA"/>
		<reference ref_id="1078782" ref_url="https://bugzilla.suse.com/1078782" source="BUGZILLA"/>
		<reference ref_id="1082007" ref_url="https://bugzilla.suse.com/1082007" source="BUGZILLA"/>
		<reference ref_id="1082008" ref_url="https://bugzilla.suse.com/1082008" source="BUGZILLA"/>
		<reference ref_id="1082009" ref_url="https://bugzilla.suse.com/1082009" source="BUGZILLA"/>
		<reference ref_id="1082010" ref_url="https://bugzilla.suse.com/1082010" source="BUGZILLA"/>
		<reference ref_id="1082011" ref_url="https://bugzilla.suse.com/1082011" source="BUGZILLA"/>
		<reference ref_id="1082014" ref_url="https://bugzilla.suse.com/1082014" source="BUGZILLA"/>
		<reference ref_id="1082058" ref_url="https://bugzilla.suse.com/1082058" source="BUGZILLA"/>
		<reference ref_id="1087433" ref_url="https://bugzilla.suse.com/1087433" source="BUGZILLA"/>
		<reference ref_id="1087434" ref_url="https://bugzilla.suse.com/1087434" source="BUGZILLA"/>
		<reference ref_id="1087436" ref_url="https://bugzilla.suse.com/1087436" source="BUGZILLA"/>
		<reference ref_id="1087437" ref_url="https://bugzilla.suse.com/1087437" source="BUGZILLA"/>
		<reference ref_id="1087440" ref_url="https://bugzilla.suse.com/1087440" source="BUGZILLA"/>
		<reference ref_id="1087441" ref_url="https://bugzilla.suse.com/1087441" source="BUGZILLA"/>
		<reference ref_id="1112530" ref_url="https://bugzilla.suse.com/1112530" source="BUGZILLA"/>
		<reference ref_id="1112532" ref_url="https://bugzilla.suse.com/1112532" source="BUGZILLA"/>
		<reference ref_id="1130611" ref_url="https://bugzilla.suse.com/1130611" source="BUGZILLA"/>
		<reference ref_id="1130617" ref_url="https://bugzilla.suse.com/1130617" source="BUGZILLA"/>
		<reference ref_id="1130620" ref_url="https://bugzilla.suse.com/1130620" source="BUGZILLA"/>
		<reference ref_id="1130622" ref_url="https://bugzilla.suse.com/1130622" source="BUGZILLA"/>
		<reference ref_id="1130623" ref_url="https://bugzilla.suse.com/1130623" source="BUGZILLA"/>
		<reference ref_id="1130627" ref_url="https://bugzilla.suse.com/1130627" source="BUGZILLA"/>
		<reference ref_id="1152990" ref_url="https://bugzilla.suse.com/1152990" source="BUGZILLA"/>
		<reference ref_id="1152992" ref_url="https://bugzilla.suse.com/1152992" source="BUGZILLA"/>
		<reference ref_id="1152994" ref_url="https://bugzilla.suse.com/1152994" source="BUGZILLA"/>
		<reference ref_id="1152995" ref_url="https://bugzilla.suse.com/1152995" source="BUGZILLA"/>
		<reference ref_id="1171517" ref_url="https://bugzilla.suse.com/1171517" source="BUGZILLA"/>
		<reference ref_id="1172275" ref_url="https://bugzilla.suse.com/1172275" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096/" source="CVE"/>
		<reference ref_id="CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339/" source="CVE"/>
		<reference ref_id="CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<reference ref_id="CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228/" source="CVE"/>
		<reference ref_id="CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
This update for ruby2.1 fixes the following issues:

Security issues fixed:

- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048072">SUSE bug 1048072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172275">SUSE bug 1172275</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81754" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk to version 7u261 fixes the following issues:

- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81755" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159856" ref_url="https://bugzilla.suse.com/1159856" source="BUGZILLA"/>
		<reference ref_id="1159858" ref_url="https://bugzilla.suse.com/1159858" source="BUGZILLA"/>
		<reference ref_id="1159860" ref_url="https://bugzilla.suse.com/1159860" source="BUGZILLA"/>
		<reference ref_id="1160250" ref_url="https://bugzilla.suse.com/1160250" source="BUGZILLA"/>
		<reference ref_id="1160251" ref_url="https://bugzilla.suse.com/1160251" source="BUGZILLA"/>
		<reference ref_id="1160937" ref_url="https://bugzilla.suse.com/1160937" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2019-15691: Fixed a use-after-return due to incorrect usage of stack memory in ZRLEDecoder (bsc#1159856).
- CVE-2019-15692: Fixed a heap-based buffer overflow in CopyRectDecode (bsc#1160250).
- CVE-2019-15693: Fixed a heap-based buffer overflow in TightDecoder::FilterGradient (bsc#1159858).
- CVE-2019-15694: Fixed a heap-based buffer overflow, caused by improper error handling in processing MemOutStream (bsc#1160251).
- CVE-2019-15695: Fixed a stack-based buffer overflow, which could be triggered from CMsgReader::readSetCursor (bsc#1159860).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160937">SUSE bug 1160937</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81756" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1156353" ref_url="https://bugzilla.suse.com/1156353" source="BUGZILLA"/>
		<reference ref_id="1172466" ref_url="https://bugzilla.suse.com/1172466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
  
This update contains security mitigations for:

- CVE-2020-0543: Fixed a side channel attack against special registers
  which could have resulted in leaking of read values to cores other
  than the one which called it.  This attack is known as Special Register
  Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
  mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
  attacks. (bsc#1156353)

Microcode Table:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  HSW          C0       6-3c-3/32 00000027-&gt;00000028 Core Gen4
  BDW-U/Y      E0/F0    6-3d-4/c0 0000002e-&gt;0000002f Core Gen5
  HSW-U        C0/D0    6-45-1/72 00000025-&gt;00000026 Core Gen4
  HSW-H        C0       6-46-1/32 0000001b-&gt;0000001c Core Gen4
  BDW-H/E3     E0/G0    6-47-1/22 00000021-&gt;00000022 Core Gen5
  SKL-U/Y      D0       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKL-U23e     K1       6-4e-3/c0 000000d6-&gt;000000dc Core Gen6 Mobile
  SKX-SP       B1       6-55-3/97 01000151-&gt;01000157 Xeon Scalable
  SKX-SP       H0/M0/U0 6-55-4/b7 02000065-&gt;02006906 Xeon Scalable
  SKX-D        M1       6-55-4/b7 02000065-&gt;02006906 Xeon D-21xx
  CLX-SP       B0       6-55-6/bf 0400002c-&gt;04002f01 Xeon Scalable Gen2
  CLX-SP       B1       6-55-7/bf 0500002c-&gt;04002f01 Xeon Scalable Gen2
  SKL-H/S      R0/N0    6-5e-3/36 000000d6-&gt;000000dc Core Gen6; Xeon E3 v5
  AML-Y22      H0       6-8e-9/10 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-U/Y      H0       6-8e-9/c0 000000ca-&gt;000000d6 Core Gen7 Mobile
  CFL-U43e     D0       6-8e-a/c0 000000ca-&gt;000000d6 Core Gen8 Mobile
  WHL-U        W0       6-8e-b/d0 000000ca-&gt;000000d6 Core Gen8 Mobile
  AML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  CML-Y42      V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen10 Mobile
  WHL-U        V0       6-8e-c/94 000000ca-&gt;000000d6 Core Gen8 Mobile
  KBL-G/H/S/E3 B0       6-9e-9/2a 000000ca-&gt;000000d6 Core Gen7; Xeon E3 v6
  CFL-H/S/E3   U0       6-9e-a/22 000000ca-&gt;000000d6 Core Gen8 Desktop, Mobile, Xeon E
  CFL-S        B0       6-9e-b/02 000000ca-&gt;000000d6 Core Gen8
  CFL-H/S      P0       6-9e-c/22 000000ca-&gt;000000d6 Core Gen9
  CFL-H        R0       6-9e-d/22 000000ca-&gt;000000d6 Core Gen9 Mobile

Also contains the Intel CPU Microcode update to 20200520:

  Processor             Identifier     Version       Products
  Model        Stepping F-MO-S/PI      Old-&gt;New
  ---- new platforms ----------------------------------------
  ---- updated platforms ------------------------------------
  SNB-E/EN/EP  C1/M0    6-2d-6/6d 0000061f-&gt;00000621 Xeon E3/E5, Core X
  SNB-E/EN/EP  C2/M1    6-2d-7/6d 00000718-&gt;0000071a Xeon E3/E5, Core X
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172466">SUSE bug 1172466</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81757" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="1164871" ref_url="https://bugzilla.suse.com/1164871" source="BUGZILLA"/>
		<reference ref_id="1171098" ref_url="https://bugzilla.suse.com/1171098" source="BUGZILLA"/>
		<reference ref_id="1171195" ref_url="https://bugzilla.suse.com/1171195" source="BUGZILLA"/>
		<reference ref_id="1171202" ref_url="https://bugzilla.suse.com/1171202" source="BUGZILLA"/>
		<reference ref_id="1171218" ref_url="https://bugzilla.suse.com/1171218" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171689" ref_url="https://bugzilla.suse.com/1171689" source="BUGZILLA"/>
		<reference ref_id="1171698" ref_url="https://bugzilla.suse.com/1171698" source="BUGZILLA"/>
		<reference ref_id="1172221" ref_url="https://bugzilla.suse.com/1172221" source="BUGZILLA"/>
		<reference ref_id="1172317" ref_url="https://bugzilla.suse.com/1172317" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
  This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).

The following non-security bugs were fixed:

- can, slip: Protect tty-&gt;disc_data in write_wakeup and close with RCU (bsc#1171698).
- KEYS: allow reaching the keys quotas exactly (bsc#1171689).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-10"/>
	<updated date="2020-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164871">SUSE bug 1164871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171689">SUSE bug 1171689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171698">SUSE bug 1171698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172221">SUSE bug 1172221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81758" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159478" ref_url="https://bugzilla.suse.com/1159478" source="BUGZILLA"/>
		<reference ref_id="1159479" ref_url="https://bugzilla.suse.com/1159479" source="BUGZILLA"/>
		<reference ref_id="1159482" ref_url="https://bugzilla.suse.com/1159482" source="BUGZILLA"/>
		<reference ref_id="1159486" ref_url="https://bugzilla.suse.com/1159486" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<description>
This update for virglrenderer fixes the following issues:

- CVE-2019-18388: Fixed a null pointer dereference which could have led
   to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
  denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
  guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
  guest escape or denial of service (bsc#1159486).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81759" version="1" class="patch">
	<metadata>
		<title>Security update for adns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172265" ref_url="https://bugzilla.suse.com/1172265" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103/" source="CVE"/>
		<reference ref_id="CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104/" source="CVE"/>
		<reference ref_id="CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105/" source="CVE"/>
		<reference ref_id="CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106/" source="CVE"/>
		<reference ref_id="CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107/" source="CVE"/>
		<reference ref_id="CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108/" source="CVE"/>
		<reference ref_id="CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109/" source="CVE"/>
		<description>
This update for adns fixes the following issues:
	  
- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service (bsc#1172265).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-12"/>
	<updated date="2020-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81760" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102840" ref_url="https://bugzilla.suse.com/1102840" source="BUGZILLA"/>
		<reference ref_id="1160039" ref_url="https://bugzilla.suse.com/1160039" source="BUGZILLA"/>
		<reference ref_id="1170601" ref_url="https://bugzilla.suse.com/1170601" source="BUGZILLA"/>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed utf8 handling in perldoc by useing 'term' instead of 'man' (bsc#1170601).
- Some packages make assumptions about the date and time they are built. 
  This update will solve the issues caused by calling the perl function timelocal
  expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102840">SUSE bug 1102840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160039">SUSE bug 1160039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170601">SUSE bug 1170601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81761" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

java-1_7_1-ibm was updated to Java 7.1 Service Refresh 4 Fix Pack 65 (bsc#1172277 and bsc#1169511)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81762" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81763" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81764" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious server to overwrite a local file when using the -J option (bsc#1173027).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81765" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552447" comment="kgraft-patch-4_4_121-92_129-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81766" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes one issue.

The following security issue was fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552448" comment="kgraft-patch-4_4_121-92_125-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81767" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552449" comment="kgraft-patch-4_4_121-92_120-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81768" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552450" comment="kgraft-patch-4_4_121-92_117-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81769" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172140" ref_url="https://bugzilla.suse.com/1172140" source="BUGZILLA"/>
		<reference ref_id="1172437" ref_url="https://bugzilla.suse.com/1172437" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172437).
- CVE-2019-15666: Fixed an out of bounds read __xfrm_policy_unlink, which could have led to denial of service (bsc#1172140).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-25"/>
	<updated date="2020-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552451" comment="kgraft-patch-4_4_121-92_114-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81770" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172405" ref_url="https://bugzilla.suse.com/1172405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-8022: Fixed a local root exploit due to improper permissions (bsc#1172405)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81771" version="1" class="patch">
	<metadata>
		<title>Security update for python3-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1054413" ref_url="https://bugzilla.suse.com/1054413" source="BUGZILLA"/>
		<reference ref_id="1073879" ref_url="https://bugzilla.suse.com/1073879" source="BUGZILLA"/>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="761500" ref_url="https://bugzilla.suse.com/761500" source="BUGZILLA"/>
		<reference ref_id="922448" ref_url="https://bugzilla.suse.com/922448" source="BUGZILLA"/>
		<reference ref_id="929736" ref_url="https://bugzilla.suse.com/929736" source="BUGZILLA"/>
		<reference ref_id="935252" ref_url="https://bugzilla.suse.com/935252" source="BUGZILLA"/>
		<reference ref_id="945455" ref_url="https://bugzilla.suse.com/945455" source="BUGZILLA"/>
		<reference ref_id="947357" ref_url="https://bugzilla.suse.com/947357" source="BUGZILLA"/>
		<reference ref_id="961596" ref_url="https://bugzilla.suse.com/961596" source="BUGZILLA"/>
		<reference ref_id="967128" ref_url="https://bugzilla.suse.com/967128" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python3-requests provides the following fix:

python-requests was updated to 2.20.1.

Update to version 2.20.1:

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).

Update to version 2.20.0:

* Bugfixes

  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements

  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.

* Bugfixes

  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.

Update to version 2.18.4:

* Improvements

  + Error messages for invalid headers now include the header name
    for easier debugging

Update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.

- Add ca-certificates (and ca-certificates-mozilla) to dependencies, otherwise https
  connections will fail.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054413">SUSE bug 1054413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073879">SUSE bug 1073879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761500">SUSE bug 761500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929736">SUSE bug 929736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935252">SUSE bug 935252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945455">SUSE bug 945455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947357">SUSE bug 947357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961596">SUSE bug 961596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967128">SUSE bug 967128</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81772" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was
  proceeding with a connection (bsc#1172906, bsc#1172935).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-29"/>
	<updated date="2020-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81773" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1167373" ref_url="https://bugzilla.suse.com/1167373" source="BUGZILLA"/>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
- CVE-2019-18860: Fixed handling of invalid domain names in cachemgr.cgi (bsc#1167373).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81774" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-30"/>
	<updated date="2020-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81775" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1170908" ref_url="https://bugzilla.suse.com/1170908" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="1173022" ref_url="https://bugzilla.suse.com/1173022" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1

- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032).
- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
- Fixed an issue where Firefox tab was crashing (bsc#1170908).

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-03"/>
	<updated date="2020-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170908">SUSE bug 1170908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173022">SUSE bug 1173022</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81776" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1170715" ref_url="https://bugzilla.suse.com/1170715" source="BUGZILLA"/>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).	 
- Fixed an issue where slapd becomes unresponsive after many failed login/bind attempts(bsc#1170715).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170715">SUSE bug 1170715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531091" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81777" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1167231" ref_url="https://bugzilla.suse.com/1167231" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167231">SUSE bug 1167231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81778" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- Amended documentation referring to rule types 'krb5-subdomain'
  and 'ms-subdomain'. This incorrect documentation could mislead
  operators into believing that policies they had configured were 
  more restrictive than they actually were. [CVE-2018-5741]
- Further limit the number of queries that can be triggered from a
  request.  Root and TLD servers are no longer exempt from 
  max-recursion-queries. Fetches for missing name server address
  records are limited to 4 for any domain. [CVE-2020-8616]
- Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. [CVE-2020-8617]
  [bsc#1109160, bsc#1171740,
   CVE-2018-5741, bind-CVE-2018-5741.patch,
   CVE-2020-8616, bind-CVE-2020-8616.patch,
   CVE-2020-8617, bind-CVE-2020-8617.patch]

- Don't rely on /etc/insserv.conf anymore for proper dependencies
  against nss-lookup.target in named.service and lwresd.service
  (bsc#1118367 bsc#1118368)
- Using a drop-in file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81779" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552452" comment="kgraft-patch-4_4_121-92_125-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81780" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552453" comment="kgraft-patch-4_4_121-92_120-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81781" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1138954" ref_url="https://bugzilla.suse.com/1138954" source="BUGZILLA"/>
		<reference ref_id="1144327" ref_url="https://bugzilla.suse.com/1144327" source="BUGZILLA"/>
		<reference ref_id="1144379" ref_url="https://bugzilla.suse.com/1144379" source="BUGZILLA"/>
		<reference ref_id="1150584" ref_url="https://bugzilla.suse.com/1150584" source="BUGZILLA"/>
		<reference ref_id="1152711" ref_url="https://bugzilla.suse.com/1152711" source="BUGZILLA"/>
		<reference ref_id="1153471" ref_url="https://bugzilla.suse.com/1153471" source="BUGZILLA"/>
		<reference ref_id="1155789" ref_url="https://bugzilla.suse.com/1155789" source="BUGZILLA"/>
		<reference ref_id="1155952" ref_url="https://bugzilla.suse.com/1155952" source="BUGZILLA"/>
		<reference ref_id="1157860" ref_url="https://bugzilla.suse.com/1157860" source="BUGZILLA"/>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<description>
This update for xrdp provides the following fix:

- CVE-2020-4044: xrdp-sesman can be crashed remotely over port 3350 (bsc#1173580).
- Fixed an issue where xrdp-sesman could not restart (bsc#1155952).	  
- Fixed an issue where xrdp could not start due to an error in the service file use absolute path in ExecStart (bsc#1155789).
- Fixed a PAM error after 2nd xrdp session after logout (bsc#1153471).
- Fixed a crash in xrdp-sesman, caused by terminating and reconnecting an xrdp session (bsc#1152711).
- Fixed a failure in RDP session recovery (bsc#1150584).
- Fixed a process leak (bsc#1144379).  
- Let systemd handle the daemons, fixing daemon start failures. (bsc#1138954, bsc#1144327)
- Don't try to create .vnc directory if it already exists. (bsc#1157860)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1138954">SUSE bug 1138954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144327">SUSE bug 1144327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144379">SUSE bug 1144379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150584">SUSE bug 1150584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152711">SUSE bug 1152711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153471">SUSE bug 1153471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155789">SUSE bug 1155789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155952">SUSE bug 1155952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157860">SUSE bug 1157860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531102" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81782" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-15049.patch: fixes a Cache Poisoning and Request Smuggling
  attack (CVE-2020-15049, bsc#1173455)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81783" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552454" comment="kgraft-patch-4_4_121-92_117-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81784" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552455" comment="kgraft-patch-4_4_121-92_114-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81785" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552456" comment="kgraft-patch-4_4_121-92_109-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81786" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552457" comment="kgraft-patch-4_4_121-92_104-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81787" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160467" ref_url="https://bugzilla.suse.com/1160467" source="BUGZILLA"/>
		<reference ref_id="1160468" ref_url="https://bugzilla.suse.com/1160468" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
- CVE-2019-14897: A stack-based buffer overflow was found in the  Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-22"/>
	<updated date="2020-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552458" comment="kgraft-patch-4_4_121-92_101-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81788" version="1" class="patch">
	<metadata>
		<title>Security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173369" ref_url="https://bugzilla.suse.com/1173369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This update for mailman fixes the following issues:

- CVE-2020-15011: Fixed a possible Arbitrary Content Injection via the private archive login page (bsc#1173369).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81789" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81790" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1084632" ref_url="https://bugzilla.suse.com/1084632" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311
  (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
  allocations may include unvalidated data
- Use gcc-9 compiler for overflow check builtins
- Backport gcc-9 build fixes
- Fix packed-not-aligned error on GCC 8 (bsc#1084632)
- Backport gcc-7 build fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084632">SUSE bug 1084632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81791" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81792" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.1.0 ESR
  * Fixed: Various stability, functionality, and security fixes (bsc#1174538)
  * CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
  * CVE-2020-6514: WebRTC data channel leaks internal address to peer
  * CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
  * CVE-2020-15653: Bypassing iframe sandbox when allowing popups
  * CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
  * CVE-2020-15656: Type confusion for special arguments in IonMonkey
  * CVE-2020-15658: Overriding file type when saving to disk
  * CVE-2020-15657: DLL hijacking due to incorrect loading path
  * CVE-2020-15654: Custom cursor can overlay user interface
  * CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81793" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531124" comment="libX11-6-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531125" comment="libX11-6-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531126" comment="libX11-data-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531127" comment="libX11-xcb1-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531128" comment="libX11-xcb1-32bit-1.6.2-12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81794" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1170383" ref_url="https://bugzilla.suse.com/1170383" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172049" ref_url="https://bugzilla.suse.com/1172049" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1174115" ref_url="https://bugzilla.suse.com/1174115" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed  (bnc#1172999).
- CVE-2020-14416: A race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).

The following non-security bugs were fixed:

- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-05"/>
	<updated date="2020-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170383">SUSE bug 1170383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172049">SUSE bug 1172049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174115">SUSE bug 1174115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81795" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81796" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403/" source="CVE"/>
		<reference ref_id="CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14403 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2020-14404 [bsc#1173701], out-of-bounds access via encodings.
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81797" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81798" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1083630" ref_url="https://bugzilla.suse.com/1083630" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2017-12627: Processing of external DTD paths could have resulted in a
  null pointer dereference under certain conditions (bsc#1083630)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531170" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531171" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81799" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81800" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1168140" ref_url="https://bugzilla.suse.com/1168140" source="BUGZILLA"/>
		<reference ref_id="1168142" ref_url="https://bugzilla.suse.com/1168142" source="BUGZILLA"/>
		<reference ref_id="1169392" ref_url="https://bugzilla.suse.com/1169392" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1163019 - CVE-2020-8608: Potential OOB access due to unsafe snprintf() usages
- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: Multiple xenoprof issues
- bsc#1168142 - CVE-2020-11739: Missing memory barriers in read-write unlock paths
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81801" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-12673: improper implementation of NTLM does not check message buffer size (bsc#1174922).
- CVE-2020-12674: improper implementation of RPA mechanism (bsc#1174923).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81802" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531190" comment="grub2-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81803" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

-  CVE-2020-10745: Fixed an issue which parsing and packing of NBT and DNS packets 
   containing dots could potentially have consumed excessive CPU (bsc#1173160).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531196" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531197" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531198" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531199" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531200" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531201" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531202" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531203" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531204" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531205" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531206" comment="libndr0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531207" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531208" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531209" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531210" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531211" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531212" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531213" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531214" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531215" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531216" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531217" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531218" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531219" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531220" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531221" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531222" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531223" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531224" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531225" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531226" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531227" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531228" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531229" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531230" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531231" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531232" comment="samba-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531233" comment="samba-client-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531234" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531236" comment="samba-libs-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531237" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531238" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531239" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81804" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81805" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1144524" ref_url="https://bugzilla.suse.com/1144524" source="BUGZILLA"/>
		<reference ref_id="1166847" ref_url="https://bugzilla.suse.com/1166847" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2019-13456: Fixed a side-channel password leak in EAP-pwd
  (bsc#1144524).
- CVE-2019-17185: Fixed a debial of service due to multithreaded
  BN_CTX access (bsc#1166847).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-31"/>
	<updated date="2020-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531242" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531243" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531244" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531245" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531246" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531247" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531248" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531249" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531250" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531251" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531252" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81806" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2958
    CVE-2019-2962 CVE-2019-2964 CVE-2019-2975
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2988
    CVE-2019-2989 CVE-2019-2992 CVE-2019-2996
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
    CVE-2019-17631
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-07"/>
	<updated date="2020-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81807" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81808" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175072" ref_url="https://bugzilla.suse.com/1175072" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11985: IP address spoofing when proxying using mod_remoteip and mod_rewrite (bsc#1175072).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81809" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81810" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81811" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81812" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 70 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14621
  CVE-2020-14593 CVE-2020-14583 CVE-2019-17639
  * Class Libraries:
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81813" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173663" ref_url="https://bugzilla.suse.com/1173663" source="BUGZILLA"/>
		<reference ref_id="1173664" ref_url="https://bugzilla.suse.com/1173664" source="BUGZILLA"/>
		<reference ref_id="1173665" ref_url="https://bugzilla.suse.com/1173665" source="BUGZILLA"/>
		<reference ref_id="1173666" ref_url="https://bugzilla.suse.com/1173666" source="BUGZILLA"/>
		<reference ref_id="1173867" ref_url="https://bugzilla.suse.com/1173867" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14816: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173666).
- CVE-2019-14814: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173664).
- CVE-2019-14815: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173665).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81814" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173100" ref_url="https://bugzilla.suse.com/1173100" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173661" ref_url="https://bugzilla.suse.com/1173661" source="BUGZILLA"/>
		<reference ref_id="1173869" ref_url="https://bugzilla.suse.com/1173869" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1173963" ref_url="https://bugzilla.suse.com/1173963" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81815" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552461" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81816" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552462" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81817" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173659" ref_url="https://bugzilla.suse.com/1173659" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552463" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81818" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.2.0 ESR
  * Fixed: Various stability, functionality, and security fixes
- Mozilla Firefox ESR 78.2
  MFSA 2020-38 (bsc#1175686)
  * CVE-2020-15663 (bmo#1643199)
    Downgrade attack on the Mozilla Maintenance Service could
    have resulted in escalation of privilege
  * CVE-2020-15664 (bmo#1658214)
    Attacker-induced prompt for extension installation
  * CVE-2020-15670 (bmo#1651001, bmo#1651449, bmo#1653626,
    bmo#1656957)
    Memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).

- Fix broken translation-loading. (bsc#1173991) 
  * allow addon sideloading
  * mark signatures for langpacks non-mandatory
  * do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81819" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1152107" ref_url="https://bugzilla.suse.com/1152107" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.

The following security bugs were fixed:


- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bug was fixed:

- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81820" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update java-1_8_0-openjdk to version jdk8u242 (icedtea 3.15.0) (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-30"/>
	<updated date="2020-01-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81821" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1164860" ref_url="https://bugzilla.suse.com/1164860" source="BUGZILLA"/>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1935: Fixed an HTTP request smuggling vulnerability (bsc#1164860).
- CVE-2020-13935: Fixed a WebSocket DoS (bsc#1174117).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81822" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81823" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1088004" ref_url="https://bugzilla.suse.com/1088004" source="BUGZILLA"/>
		<reference ref_id="1088009" ref_url="https://bugzilla.suse.com/1088009" source="BUGZILLA"/>
		<reference ref_id="1130840" ref_url="https://bugzilla.suse.com/1130840" source="BUGZILLA"/>
		<reference ref_id="1141853" ref_url="https://bugzilla.suse.com/1141853" source="BUGZILLA"/>
		<reference ref_id="1149955" ref_url="https://bugzilla.suse.com/1149955" source="BUGZILLA"/>
		<reference ref_id="1153238" ref_url="https://bugzilla.suse.com/1153238" source="BUGZILLA"/>
		<reference ref_id="1162423" ref_url="https://bugzilla.suse.com/1162423" source="BUGZILLA"/>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2019-20907: Fixed denial of service by avoiding possible infinite loop in specifically crafted tarball (bsc#1174091).
- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
- CVE-2019-16935: Fixed a reflected XSS in python/Lib/DocXMLRPCServer.py (bsc#1153238).
- CVE-2019-9947: Fixed an issue in urllib2 which allowed CRLF injection if the attacker controls a url parameter (bsc#1130840).
- If the locale is 'C', coerce it to C.UTF-8 (bsc#1162423).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162423">SUSE bug 1162423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81824" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some configurations when an attacker established
a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
(CVE-2020-1472, bsc#1176579).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531308" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531309" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531310" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531311" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531312" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531313" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531314" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531315" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531316" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531317" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531318" comment="libndr0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531319" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531320" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531321" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531322" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531323" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531324" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531325" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531326" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531327" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531328" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531329" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531330" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531331" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531332" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531333" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531334" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531335" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531336" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531337" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531338" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531339" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531340" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531341" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531342" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531343" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531344" comment="samba-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531345" comment="samba-client-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531346" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531348" comment="samba-libs-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531349" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531350" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531351" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81825" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

-Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-26"/>
	<updated date="2020-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81826" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531355" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531356" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531357" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531358" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531359" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531360" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531361" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531362" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531363" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531364" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531365" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531366" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531367" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531368" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531369" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81827" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)	  
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic  modification of live EPT PTE (bsc#1173380,XSA-328)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-01"/>
	<updated date="2020-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81828" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176496" ref_url="https://bugzilla.suse.com/1176496" source="BUGZILLA"/>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490/" source="CVE"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
- CVE-2013-7490: Fixed memory corruption when using many arguments 
  to methods for CallbacksUsing (bsc#1176496).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81829" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- java-1_7_0-openjdk was updated to 2.6.23 (July 2020 CPU, bsc#1174157)
    - JDK-8028431, CVE-2020-14579: NullPointerException in
    - DerValue.equals(DerValue)
    - JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
    - sun.security.util.DerInputStream.getUnalignedBitString()
    - JDK-8230613: Better ASCII conversions
    - JDK-8231800: Better listing of arrays
    - JDK-8232014: Expand DTD support
    - JDK-8233255: Better Swing Buttons
    - JDK-8234032: Improve basic calendar services
    - JDK-8234042: Better factory production of certificates
    - JDK-8234418: Better parsing with CertificateFactory
    - JDK-8234836: Improve serialization handling
    - JDK-8236191: Enhance OID processing
    - JDK-8237592, CVE-2020-14577: Enhance certificate verification
    - JDK-8238002, CVE-2020-14581: Better matrix operations
    - JDK-8238804: Enhance key handling process
    - JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    - JDK-8238843: Enhanced font handing
    - JDK-8238920, CVE-2020-14583: Better Buffer support
    - JDK-8238925: Enhance WAV file playback
    - JDK-8240119, CVE-2020-14593: Less Affine Transformations
    - JDK-8240482: Improved WAV file playback
    - JDK-8241379: Update JCEKS support
    - JDK-8241522: Manifest improved jar headers redux
    - JDK-8242136, CVE-2020-14621: Better XML namespace handling
    - JDK-8040113: File not initialized in src/share/native/sun/awt/giflib/dgif_lib.c
    - JDK-8054446: Repeated offer and remove on ConcurrentLinkedQueue lead to an OutOfMemoryError
    - JDK-8077982: GIFLIB upgrade
    - JDK-8081315: 8077982 giflib upgrade breaks system giflib builds with earlier versions
    - JDK-8147087: Race when reusing PerRegionTable bitmaps may result in dropped remembered set entries
    - JDK-8151582: (ch) test java/nio/channels/AsyncCloseAndInterrupt.java failing due to 'Connection succeeded'
    - JDK-8155691: Update GIFlib library to the latest up-to-date
    - JDK-8181841: A TSA server returns timestamp with precision higher than milliseconds
    - JDK-8203190: SessionId.hashCode generates too many collisions
    - JDK-8217676: Upgrade libpng to 1.6.37
    - JDK-8220495: Update GIFlib library to the 5.1.8
    - JDK-8226892: ActionListeners on JRadioButtons don't get notified when selection is changed with arrow keys
    - JDK-8229899: Make java.io.File.isInvalid() less racy
    - JDK-8230597: Update GIFlib library to the 5.2.1
    - JDK-8230769: BufImg_SetupICM add ReleasePrimitiveArrayCritical call in early return
    - JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    - JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion() returns wrong result
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-05"/>
	<updated date="2020-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81830" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81831" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81832" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81833" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1149332" ref_url="https://bugzilla.suse.com/1149332" source="BUGZILLA"/>
		<reference ref_id="1165784" ref_url="https://bugzilla.suse.com/1165784" source="BUGZILLA"/>
		<reference ref_id="1171878" ref_url="https://bugzilla.suse.com/1171878" source="BUGZILLA"/>
		<reference ref_id="1172085" ref_url="https://bugzilla.suse.com/1172085" source="BUGZILLA"/>
		<reference ref_id="1176013" ref_url="https://bugzilla.suse.com/1176013" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:
	  
- CVE-2020-10029: Fixed a stack corruption from range reduction of pseudo-zero (bsc#1165784)
- Use posix_spawn on popen (bsc#1149332, bsc#1176013)
- Correct locking and cancellation cleanup in syslog functions (bsc#1172085)
- Fixed concurrent changes on nscd aware files (bsc#1171878)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149332">SUSE bug 1149332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171878">SUSE bug 1171878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172085">SUSE bug 1172085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176013">SUSE bug 1176013</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81834" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81835" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<description>
This update for samba fixes the following issues:

- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531408" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531409" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531410" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531411" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531412" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531413" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531414" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531415" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531416" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531417" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531418" comment="libndr0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531419" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531420" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531421" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531422" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531423" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531424" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531425" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531426" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531427" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531428" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531429" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531430" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531431" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531432" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531433" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531434" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531435" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531436" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531437" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531438" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531439" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531440" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531441" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531442" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531443" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531444" comment="samba-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531445" comment="samba-client-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531446" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531448" comment="samba-libs-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531449" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531450" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531451" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81836" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<description>
This update for sane-backends fixes the following issues:

- sane-backends version upgrade to 1.0.31:
  * sane-backends version upgrade to 1.0.30
    fixes memory corruption bugs CVE-2020-12861, CVE-2020-12862,
    CVE-2020-12863, CVE-2020-12864, CVE-2020-12865,
    CVE-2020-12866, CVE-2020-12867 (bsc#1172524)
  * sane-backends version upgrade to 1.0.31
    to further improve hardware enablement for scanner devices
    (jsc#SLE-15561 and jsc#SLE-15560 with jsc#ECO-2418)
  * The new escl backend cannot be provided for SLE12 because
    it requires more additional software (avahi-client, libcurl,
    and libpoppler-glib-devel) where in particular for libcurl
    the one that is in SLE12 (via libcurl-devel-7.37.0) is likely
    too old because with that building the escl backend fails with
    'escl/escl.c:1267:34: error: 'CURLOPT_UNIX_SOCKET_PATH'
    undeclared curl_easy_setopt(handle, CURLOPT_UNIX_SOCKET_PATH'
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81837" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1163927" ref_url="https://bugzilla.suse.com/1163927" source="BUGZILLA"/>
		<reference ref_id="1175476" ref_url="https://bugzilla.suse.com/1175476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14562: Fixed an overflow in DxeImageVerificationHandler (bsc#1175476).  
- CVE-2019-14559: Fixed a memory leak in ArpOnFrameRcvdDpc() (bsc#1163927).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531453" comment="ovmf-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531454" comment="ovmf-tools-2015+git1462940744.321151f-19.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531455" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81838" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-15708: Added a  note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531456" comment="libvirt-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531457" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531458" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531459" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531460" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531461" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531463" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531464" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531465" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531466" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531467" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531468" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531469" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531470" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531471" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531472" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531474" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531475" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531476" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81839" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
  http.socket.timeout configuration setting during an SSL handshake,
  which allows remote attackers to cause a denial of service (HTTPS
  call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
  verify that the server hostname matches a domain name in the
  subject's Common Name (CN) or subjectAltName field of the X.509
  certificate, which allows MITM attackers to spoof SSL servers
  via a 'CN=' string in a field in the distinguished name (DN)
  of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81840" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1118597" ref_url="https://bugzilla.suse.com/1118597" source="BUGZILLA"/>
		<reference ref_id="1130246" ref_url="https://bugzilla.suse.com/1130246" source="BUGZILLA"/>
		<reference ref_id="1161167" ref_url="https://bugzilla.suse.com/1161167" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<description>
This update for libqt5-qtbase fixes the following issue:
	  
Security issue fixed:	  

- CVE-2020-0569: Fixed a potential local code execution by loading plugins from CWD (bsc#1161167).
- CVE-2018-19870: Fixed an improper check in QImage allocation which could allow Denial of Service
  when opening crafted gif files (bsc#1118597).
- CVE-2018-19872: Fixed an issue which could allow a division by zero leading to crash (bsc#1130246).

Other issue addressed: 

- Fixed an issue with rendering animated gifs (QTBUG-55141).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-04"/>
	<updated date="2020-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531478" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531479" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531480" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531481" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531482" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531483" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531484" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531485" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531486" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531487" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531488" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531489" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531490" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531491" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531492" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81841" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield

- Ignore whitespaces after the header or footer in PEM X.509 cert
  (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81842" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).
- CVE-2020-1749: A flaw was found in the implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link, rather sending the data unencrypted. This would have allowed anyone in between the two endpoints to read the traffic unencrypted. (bsc#1165629)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81843" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552465" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81844" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552466" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81845" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552467" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81846" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176012" ref_url="https://bugzilla.suse.com/1176012" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. (bsc#1176724)
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1176722)
- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552468" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81847" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<description>
This update for gcc10 fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

        CC=gcc-10
        CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531512" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81848" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 prerelease 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

# New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-11"/>
	<updated date="2020-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531524" comment="ucode-intel-20201027-13.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81849" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1106383" ref_url="https://bugzilla.suse.com/1106383" source="BUGZILLA"/>
		<reference ref_id="1133495" ref_url="https://bugzilla.suse.com/1133495" source="BUGZILLA"/>
		<reference ref_id="1139459" ref_url="https://bugzilla.suse.com/1139459" source="BUGZILLA"/>
		<reference ref_id="1151377" ref_url="https://bugzilla.suse.com/1151377" source="BUGZILLA"/>
		<reference ref_id="1151506" ref_url="https://bugzilla.suse.com/1151506" source="BUGZILLA"/>
		<reference ref_id="1154043" ref_url="https://bugzilla.suse.com/1154043" source="BUGZILLA"/>
		<reference ref_id="1155574" ref_url="https://bugzilla.suse.com/1155574" source="BUGZILLA"/>
		<reference ref_id="1156482" ref_url="https://bugzilla.suse.com/1156482" source="BUGZILLA"/>
		<reference ref_id="1159814" ref_url="https://bugzilla.suse.com/1159814" source="BUGZILLA"/>
		<reference ref_id="1162108" ref_url="https://bugzilla.suse.com/1162108" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2020-1712 (bsc#bsc#1162108)
  Fix a heap use-after-free vulnerability, when asynchronous
  Polkit queries were performed while handling Dbus messages. A local
  unprivileged attacker could have abused this flaw to crash systemd services or
  potentially execute code and elevate their privileges, by sending specially
  crafted Dbus messages.

- Unconfirmed fix for prevent hanging of systemctl during restart. (bsc#1139459)
- Fix warnings thrown during package installation. (bsc#1154043)
- Fix for system-udevd prevent crash within OES2018. (bsc#1151506)
- Fragments of masked units ought not be considered for 'NeedDaemonReload'. (bsc#1156482)
- Wait for workers to finish when exiting. (bsc#1106383)
- Improve log message when inotify limit is reached. (bsc#1155574)
- Mention in the man pages that alias names are only effective after command 'systemctl enable'. (bsc#1151377)
- Introduce function for reading virtual files in 'sysfs' and 'procfs'. (bsc#1133495, bsc#1159814)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1106383">SUSE bug 1106383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133495">SUSE bug 1133495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139459">SUSE bug 1139459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151377">SUSE bug 1151377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151506">SUSE bug 1151506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154043">SUSE bug 1154043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155574">SUSE bug 1155574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156482">SUSE bug 1156482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159814">SUSE bug 1159814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531525" comment="libudev-devel-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81850" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 7 u281 build 1
    + JDK-8145096: Undefined behaviour in HotSpot
    + JDK-8215265: C2: range check elimination may allow illegal
      out of bound access
  * Backports
    + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81851" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531536" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81852" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81853" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1152497" ref_url="https://bugzilla.suse.com/1152497" source="BUGZILLA"/>
		<reference ref_id="1154448" ref_url="https://bugzilla.suse.com/1154448" source="BUGZILLA"/>
		<reference ref_id="1154456" ref_url="https://bugzilla.suse.com/1154456" source="BUGZILLA"/>
		<reference ref_id="1154458" ref_url="https://bugzilla.suse.com/1154458" source="BUGZILLA"/>
		<reference ref_id="1154461" ref_url="https://bugzilla.suse.com/1154461" source="BUGZILLA"/>
		<reference ref_id="1155945" ref_url="https://bugzilla.suse.com/1155945" source="BUGZILLA"/>
		<reference ref_id="1157888" ref_url="https://bugzilla.suse.com/1157888" source="BUGZILLA"/>
		<reference ref_id="1158003" ref_url="https://bugzilla.suse.com/1158003" source="BUGZILLA"/>
		<reference ref_id="1158004" ref_url="https://bugzilla.suse.com/1158004" source="BUGZILLA"/>
		<reference ref_id="1158005" ref_url="https://bugzilla.suse.com/1158005" source="BUGZILLA"/>
		<reference ref_id="1158006" ref_url="https://bugzilla.suse.com/1158006" source="BUGZILLA"/>
		<reference ref_id="1158007" ref_url="https://bugzilla.suse.com/1158007" source="BUGZILLA"/>
		<reference ref_id="1161181" ref_url="https://bugzilla.suse.com/1161181" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420/" source="CVE"/>
		<reference ref_id="CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421/" source="CVE"/>
		<reference ref_id="CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424/" source="CVE"/>
		<reference ref_id="CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425/" source="CVE"/>
		<reference ref_id="CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577/" source="CVE"/>
		<reference ref_id="CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578/" source="CVE"/>
		<reference ref_id="CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579/" source="CVE"/>
		<reference ref_id="CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580/" source="CVE"/>
		<reference ref_id="CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581/" source="CVE"/>
		<reference ref_id="CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583/" source="CVE"/>
		<reference ref_id="CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host (bsc#1161181).
- CVE-2019-19579: Device quarantine for alternate pci assignment methods (bsc#1157888).
- CVE-2019-19581: find_next_bit() issues (bsc#1158003).
- CVE-2019-19583: VMentry failure with debug exceptions and blocked states (bsc#1158004).
- CVE-2019-19578: Linear pagetable use / entry miscounts (bsc#1158005).
- CVE-2019-19580: Further issues with restartable PV type change operations (bsc#1158006).
- CVE-2019-19577: dynamic height for the IOMMU pagetables (bsc#1158007).
- CVE-2019-18420: VCPUOP_initialise DoS (bsc#1154448).
- CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation (bsc#1154456).
- CVE-2019-18421: Issues with restartable PV type change operations (bsc#1154458).
- CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment (bsc#1154461).
- CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue) (bsc#1155945).
- CVE-2019-11135: TSX Asynchronous Abort (TAA) issue (bsc#1152497).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-06"/>
	<updated date="2020-02-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81854" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql96, postgresql10 and postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171924" ref_url="https://bugzilla.suse.com/1171924" source="BUGZILLA"/>
		<description>


This update changes the internal packaging for postgresql, and so contains
all currently maintained postgresql versions across our SUSE Linux Enterprise 12
products.


* postgresql12 is shipped new in version 12.3 (bsc#1171924).

  The server and client packages only on SUSE Linux Enterprise Server 12 SP5,
  the libraries on SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  + https://www.postgresql.org/about/news/2038/
  + https://www.postgresql.org/docs/12/release-12-3.html


* postgresql10 is updated to 10.13 (bsc#1171924).

  On SUSE Linux Enterprise Server 12 SP2 LTSS up to 12 SP5.

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/10/release-10-13.html


* postgresql96 is updated to 9.6.18 (bsc#1171924):

  +  https://www.postgresql.org/about/news/2038/
  +  https://www.postgresql.org/docs/9.6/release-9-6-18.html

  On SUSE Linux Enterprise Server 12-SP2 and 12-SP3 LTSS only.

* postgresql 9.4 is updated to 9.4.26:

  +  https://www.postgresql.org/about/news/2011/
  +  https://www.postgresql.org/docs/9.4/release-9-4-26.html
  +  https://www.postgresql.org/about/news/1994/
  +  https://www.postgresql.org/docs/9.4/release-9-4-25.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171924">SUSE bug 1171924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531546" comment="libecpg6-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531547" comment="libpq5-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531548" comment="libpq5-32bit-12.4-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531549" comment="postgresql-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531550" comment="postgresql-contrib-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531551" comment="postgresql-docs-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531552" comment="postgresql-plperl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531553" comment="postgresql-plpython-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531554" comment="postgresql-pltcl-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531555" comment="postgresql-server-12.0.1-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531556" comment="postgresql10-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531557" comment="postgresql10-contrib-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531558" comment="postgresql10-docs-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531559" comment="postgresql10-plperl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531560" comment="postgresql10-plpython-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531561" comment="postgresql10-pltcl-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531562" comment="postgresql10-server-10.14-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531563" comment="postgresql94-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531564" comment="postgresql94-contrib-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531565" comment="postgresql94-docs-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531566" comment="postgresql94-plperl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531567" comment="postgresql94-plpython-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531568" comment="postgresql94-pltcl-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531569" comment="postgresql94-server-9.4.26-24.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531570" comment="postgresql96-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531571" comment="postgresql96-contrib-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531572" comment="postgresql96-docs-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531573" comment="postgresql96-plperl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531574" comment="postgresql96-plpython-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531575" comment="postgresql96-pltcl-9.6.19-6.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531576" comment="postgresql96-server-9.6.19-6.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81855" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
- Update raptor to version 2.0.15
  * Made several fixes to Turtle / N-Triples family of parsers and serializers
  * Added utility functions for re-entrant sorting of objects and sequences.
  * Made other fixes and improvements including fixing reported issues:
    0000574, 0000575, 0000576, 0000577, 0000579, 0000581 and 0000584.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81856" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81857" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1158763" ref_url="https://bugzilla.suse.com/1158763" source="BUGZILLA"/>
		<reference ref_id="1169947" ref_url="https://bugzilla.suse.com/1169947" source="BUGZILLA"/>
		<reference ref_id="1178038" ref_url="https://bugzilla.suse.com/1178038" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
This update for libzypp, zypper fixes the following issues:

libzypp fixes the following security issue:

- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).

zypper was updated to fix the following issues:

- Fixed an issue, where zypper crashed when the system language is set to Spanish and the user
  tried to patch their system with 'zypper patch --category security' (bsc#1178038)
- Fixed a typo in man page (bsc#1169947)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-18"/>
	<updated date="2020-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169947">SUSE bug 1169947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178038">SUSE bug 1178038</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531580" comment="libzypp-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531581" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531582" comment="zypper-1.13.57-18.46.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81858" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81859" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552469" comment="kgraft-patch-4_4_121-92_141-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81860" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552470" comment="kgraft-patch-4_4_121-92_138-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81861" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552471" comment="kgraft-patch-4_4_121-92_135-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81862" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552472" comment="kgraft-patch-4_4_121-92_129-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81863" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes one issue.

The following security issue was fixed:

- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552473" comment="kgraft-patch-4_4_121-92_125-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81864" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

Upgrade to version 10.15:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html

Update to 10.14:

  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html

		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81865" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

Upgrade to version 9.6.20:

  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/9.6/release-9-6-20.html

Changes from 9.6.19:

  * CVE-2020-14350, bsc#1175194: Make contrib modules installation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81866" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1083244" ref_url="https://bugzilla.suse.com/1083244" source="BUGZILLA"/>
		<reference ref_id="1131277" ref_url="https://bugzilla.suse.com/1131277" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176011" ref_url="https://bugzilla.suse.com/1176011" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176253" ref_url="https://bugzilla.suse.com/1176253" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176896" ref_url="https://bugzilla.suse.com/1176896" source="BUGZILLA"/>
		<reference ref_id="1176922" ref_url="https://bugzilla.suse.com/1176922" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177165" ref_url="https://bugzilla.suse.com/1177165" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177226" ref_url="https://bugzilla.suse.com/1177226" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011).
- CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).

The following non-security bugs were fixed:

- btrfs: fix race with relocation recovery and fs_root setup (bsc#1131277).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277).
- btrfs: btrfs_init_new_device should use fs_info-&gt;dev_root (bsc#1131277, bsc#1176922).
- btrfs: btrfs_test_opt and friends should take a btrfs_fs_info (bsc#1131277, bsc#1176922).
- btrfs: call functions that always use the same root with fs_info instead (bsc#1131277, bsc#1176922).
- btrfs: call functions that overwrite their root parameter with fs_info (bsc#1131277, bsc#1176922).
- btrfs: flush_space always takes fs_info-&gt;fs_root (bsc#1131277, bsc#1176922).
- btrfs: pull node/sector/stripe sizes out of root and into fs_info (bsc#1131277, bsc#1176922).
- btrfs: Remove fs_info argument of btrfs_write_and_wait_transaction (bsc#1131277, bsc#1176922).
- btrfs: remove root parameter from transaction commit/end routines (bsc#1131277, bsc#1176922).
- btrfs: remove root usage from can_overcommit (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, access fs_info-&gt;delayed_root directly (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, add fs_info convenience variables (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, btrfs_calc_{trans,trunc}_metadata_size (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, update_block_group{,flags} (bsc#1131277, bsc#1176922).
- btrfs: root-&gt;fs_info cleanup, use fs_info-&gt;dev_root everywhere (bsc#1131277, bsc#1176922).
- btrfs: split btrfs_wait_marked_extents into normal and tree log functions (bsc#1131277, bsc#1176922).
- btrfs: struct btrfsic_state-&gt;root should be an fs_info (bsc#1131277, bsc#1176922).
- btrfs: take an fs_info directly when the root is not used otherwise (bsc#1131277, bsc#1176922).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131277">SUSE bug 1131277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176922">SUSE bug 1176922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81867" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="1178971" ref_url="https://bugzilla.suse.com/1178971" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201118 official release. (bsc#1178971)
 - Removed TGL/06-8c-01/80 due to functional issues with some OEM platforms.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) INTEL-SA-00389 (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178971">SUSE bug 1178971</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81868" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-0556: Fixed improper access control which may lead to escalation of privilege and denial of service by an unauthenticated user (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81869" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81870" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81871" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81872" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81873" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531624" comment="libpython3_4m1_0-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531625" comment="python3-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531626" comment="python3-base-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531627" comment="python3-curses-3.4.10-25.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531628" comment="python3-devel-3.4.10-25.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81874" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<description>
This update for gdm fixes the following issues:

- CVE-2020-16125: Fixed a privilege escalation (bsc#1178150).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81875" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81876" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>

This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81877" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="1179461" ref_url="https://bugzilla.suse.com/1179461" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<description>
This update for mutt fixes the following issues:

- Find and display the content of messages properly. (bsc#1179461)
- CVE-2020-28896: incomplete connection termination could send credentials over unencrypted connections. (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes. (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179461">SUSE bug 1179461</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81878" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552474" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81879" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552475" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81880" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552476" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81881" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552477" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81882" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_146 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a memory corruption due to a use after free which could have led to to local privilege escalation (bsc#1176931).
- CVE-2020-11668: Fixed an issue where the Xirlink camera USB driver mishandled invalid descriptors (bsc#1173942).
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of  ip6_dst_lookup (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552478" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81883" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - stack corruption from XSA-346 change (XSA-355) 
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81884" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81885" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531653" comment="libpython2_7-1_0-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531654" comment="libpython2_7-1_0-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531655" comment="python-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531656" comment="python-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531657" comment="python-base-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531658" comment="python-base-32bit-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531659" comment="python-curses-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531660" comment="python-demo-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531661" comment="python-devel-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531662" comment="python-doc-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531663" comment="python-doc-pdf-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531664" comment="python-gdbm-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531665" comment="python-idle-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531666" comment="python-tk-2.7.17-28.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531667" comment="python-xml-2.7.17-28.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81886" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1161799" ref_url="https://bugzilla.suse.com/1161799" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.5.0 ESR
  * CVE-2020-6796 (bmo#1610426)
    Missing bounds check on shared memory read in the parent
    process
  * CVE-2020-6797 (bmo#1596668)
    Extensions granted downloads.open permission could open
    arbitrary applications on Mac OSX
  * CVE-2020-6798 (bmo#1602944)
    Incorrect parsing of template tag could result in JavaScript
    injection
  * CVE-2020-6799 (bmo#1606596)
    Arbitrary code execution when opening pdf links from other
    applications, when Firefox is configured as default pdf
    reader
  * CVE-2020-6800 (bmo#1595786, bmo#1596706, bmo#1598543,
    bmo#1604851, bmo#1605777, bmo#1608580, bmo#1608785)
    Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
  * Fixed: Fixed various issues opening files with spaces in
    their path (bmo#1601905, bmo#1602726)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-17"/>
	<updated date="2020-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161799">SUSE bug 1161799</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81887" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
This update for spice-gtk fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531669" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531670" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531671" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531672" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531673" comment="libspice-controller0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531674" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531675" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81888" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1101295" ref_url="https://bugzilla.suse.com/1101295" source="BUGZILLA"/>
		<reference ref_id="1104448" ref_url="https://bugzilla.suse.com/1104448" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
This update for spice fixes the following issues:

- CVE-2018-10873: Fixed a potential heap corruption when demarshalling (bsc#1104448)
- CVE-2018-10893: Fixed a buffer overflow on image lz checks (bsc#1101295)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81889" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81890" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477). 
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81891" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1119353" ref_url="https://bugzilla.suse.com/1119353" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="1171981" ref_url="https://bugzilla.suse.com/1171981" source="BUGZILLA"/>
		<reference ref_id="1174250" ref_url="https://bugzilla.suse.com/1174250" source="BUGZILLA"/>
		<reference ref_id="1174255" ref_url="https://bugzilla.suse.com/1174255" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to 0.103.0 to implement jsc#ECO-3010 and bsc#1118459.

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.
  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
    much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.
* Fix clamav-milter.service (requires clamd.service to run)
* bsc#1119353, clamav-fips.patch: Fix freshclam crash in FIPS mode.
* Partial sync with SLE15.

Update to version 0.102.4

Accumulated security fixes:

* CVE-2020-3350: Fix a vulnerability wherein a malicious user could
  replace a scan target's directory with a symlink to another path
  to trick clamscan, clamdscan, or clamonacc into removing or moving
  a different file (eg. a critical system file). The issue would
  affect users that use the --move or --remove options for clamscan,
  clamdscan, and clamonacc. (bsc#1174255)
* CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
  module in ClamAV 0.102.3 that could cause a Denial-of-Service
  (DoS) condition. Improper bounds checking results in an
  out-of-bounds read which could cause a crash. The previous fix for
  this CVE in 0.102.3 was incomplete. This fix correctly resolves
  the issue.
* CVE-2020-3481: Fix a vulnerability in the EGG archive module in
  ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
  condition. Improper error handling may result in a crash due to a
  NULL pointer dereference. This vulnerability is mitigated for
  those using the official ClamAV signature databases because the
  file type signatures in daily.cvd will not enable the EGG archive
  parser in versions affected by the vulnerability. (bsc#1174250)
* CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
  ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
  condition. Improper size checking of a buffer used to initialize AES
  decryption routines results in an out-of-bounds read which may cause
  a crash. (bsc#1171981)
* CVE-2020-3123: A denial-of-service (DoS) condition may occur when
  using the optional credit card data-loss-prevention (DLP) feature.
  Improper bounds checking of an unsigned variable resulted in an
  out-of-bounds read, which causes a crash.
* CVE-2019-15961: A Denial-of-Service (DoS) vulnerability may
  occur when scanning a specially crafted email file as a result
  of excessively long scan times. The issue is resolved by
  implementing several maximums in parsing MIME messages and by
  optimizing use of memory allocation. (bsc#1157763).
* CVE-2019-12900: An out of bounds write in the NSIS bzip2
  (bsc#1149458)
* CVE-2019-12625: Introduce a configurable time limit to mitigate
  zip bomb vulnerability completely. Default is 2 minutes,
  configurable useing the clamscan --max-scantime and for clamd
  using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

* ZIP bomb causes extreme CPU spikes (bsc#1144504)

Update to version 0.101.2 (bsc#1118459):

* Support for RAR v5 archive extraction.
* Incompatible changes to the arguments of cl_scandesc,
  cl_scandesc_callback, and cl_scanmap_callback.
* Scanning options have been converted from a single flag
  bit-field into a structure of multiple categorized flag
  bit-fields.
* The CL_SCAN_HEURISTIC_ENCRYPTED scan option was replaced by
  2 new scan options: CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE, and
  CL_SCAN_HEURISTIC_ENCRYPTED_DOC
* Incompatible clamd.conf and command line interface changes.
* Heuristic Alerts' (aka 'Algorithmic Detection') options have
  been changed to make the names more consistent. The original
  options are deprecated in 0.101, and will be removed in a
  future feature release.
* For details, see https://blog.clamav.net/2018/12/clamav-01010-has-been-released.html		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119353">SUSE bug 1119353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81892" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159635" ref_url="https://bugzilla.suse.com/1159635" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2019-19906: Fixed an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet (bsc#1159635).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-28"/>
	<updated date="2020-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81893" version="1" class="patch">
	<metadata>
		<title>Security update for gcc9 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1114592" ref_url="https://bugzilla.suse.com/1114592" source="BUGZILLA"/>
		<reference ref_id="1135254" ref_url="https://bugzilla.suse.com/1135254" source="BUGZILLA"/>
		<reference ref_id="1141897" ref_url="https://bugzilla.suse.com/1141897" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1142654" ref_url="https://bugzilla.suse.com/1142654" source="BUGZILLA"/>
		<reference ref_id="1148517" ref_url="https://bugzilla.suse.com/1148517" source="BUGZILLA"/>
		<reference ref_id="1149145" ref_url="https://bugzilla.suse.com/1149145" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<description>
This update for gcc9 fixes the following issues:

The GNU Compiler Collection is shipped in version 9.

A detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html

The compilers have been added to the SUSE Linux Enterprise Toolchain Module.

To use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9
CXX=g++-9 set.


For SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and
other compiler libraries have been switched from their gcc8 variants to
their gcc9 variants.

Security issues fixed:

- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1114592">SUSE bug 1114592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135254">SUSE bug 1135254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141897">SUSE bug 1141897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142654">SUSE bug 1142654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148517">SUSE bug 1148517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81894" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1162202" ref_url="https://bugzilla.suse.com/1162202" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<description>
This update for sudo fixes the following issue:

Security issue fixed:

- CVE-2019-18634: Fixed a buffer overflow in the passphrase prompt that could occur when pwfeedback was enabled in /etc/sudoers (bsc#1162202).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-19"/>
	<updated date="2020-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531723" comment="sudo-1.8.10p3-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81895" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

Java was updated to 7.1 Service Refresh 4 Fix Pack 60 [bsc#1162972, bsc#1160968].

Security issues fixed:

- CVE-2020-2583: Fixed a serialization vulnerability in BeanContextSupport (bsc#1162972).
- CVE-2020-2593: Fixed an incorrect check in isBuiltinStreamHandler, causing URL normalization issues (bsc#1162972).
- CVE-2020-2604: Fixed a serialization issue in jdk.serialFilter (bsc#1162972).
- CVE-2020-2659: Fixed the incomplete enforcement of the maxDatagramSockets limit in DatagramChannelImpl (bsc#1162972).

Non-security issues fixed:

* Class Libraries:
  IJ22333 HANG IN JAVA_JAVA_NET_SOCKETINPUTSTREAM_SOCKETREAD0 EVEN
          WHEN TIMEOUT IS SET
  IJ22350 JAVA 7 AND JAVA 8 NOT WORKING WELL WITH TRADITIONAL/SIMPLIFIED
          CHINESE EDITION OF WINDOWS CLIENT SYSTEM
  IJ22337 THE NAME OF THE REPUBLIC OF BELARUS IN THE RUSSIAN LOCALE
          INCONSISTENT WITH CLDR
  IJ22349 UPDATE TIMEZONE INFORMATION TO TZDATA2019C
* JIT Compiler:
  IJ11368 JAVA JIT PPC: CRASH IN JIT COMPILED CODE ON PPC MACHINES
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-07"/>
	<updated date="2020-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81896" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522649" comment="libexif12-0.6.21-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522650" comment="libexif12-32bit-0.6.21-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81897" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1117951" ref_url="https://bugzilla.suse.com/1117951" source="BUGZILLA"/>
		<reference ref_id="1158809" ref_url="https://bugzilla.suse.com/1158809" source="BUGZILLA"/>
		<reference ref_id="1160163" ref_url="https://bugzilla.suse.com/1160163" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

Security issue fixed:

- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).

Non-security issue fixed:

- Fixed a crash in BN_copy (bsc#1160163).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-25"/>
	<updated date="2020-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160163">SUSE bug 1160163</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81898" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1162610" ref_url="https://bugzilla.suse.com/1162610" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This update for ppp fixes the following security issue:

- CVE-2020-8597: Fixed a buffer overflow in the eap_request and eap_response functions (bsc#1162610).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-26"/>
	<updated date="2020-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81899" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1068664" ref_url="https://bugzilla.suse.com/1068664" source="BUGZILLA"/>
		<reference ref_id="1159208" ref_url="https://bugzilla.suse.com/1159208" source="BUGZILLA"/>
		<reference ref_id="1159623" ref_url="https://bugzilla.suse.com/1159623" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.4.10 (jsc#SLE-9427, bsc#1159208) from 3.4.6:

Security issues fixed:

- Update expat copy from 2.1.1 to 2.2.0 to fix the following issues:
  CVE-2012-0876, CVE-2016-0718, CVE-2016-4472, CVE-2017-9233, CVE-2016-9063
- CVE-2017-1000158: Fix an integer overflow in thePyString_DecodeEscape function in stringobject.c, resulting in heap-based bufferoverflow (bsc#1068664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-20"/>
	<updated date="2020-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159208">SUSE bug 1159208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159623">SUSE bug 1159623</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81900" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154162" ref_url="https://bugzilla.suse.com/1154162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<description>
This update for mariadb fixes the following issues:

Security issue fixed:

- CVE-2019-2974: Fixed Server Optimizer (bsc#1154162).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81901" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154212" ref_url="https://bugzilla.suse.com/1154212" source="BUGZILLA"/>
		<reference ref_id="1158442" ref_url="https://bugzilla.suse.com/1158442" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to 7.1 Service Refresh 4 Fix Pack 55 [bsc#1158442, bsc#1154212]
  * Security fixes:
    CVE-2019-2933 CVE-2019-2945 CVE-2019-2962 CVE-2019-2964
    CVE-2019-2978 CVE-2019-2983 CVE-2019-2989 CVE-2019-2992
    CVE-2019-2999 CVE-2019-2973 CVE-2019-2981
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81902" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1162972" ref_url="https://bugzilla.suse.com/1162972" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Java 8.0 was updated to Service Refresh 6 Fix Pack 5 (bsc#1162972, bsc#1160968)

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2019-4732: Untrusted DLL search path vulnerability 
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81903" version="1" class="patch">
	<metadata>
		<title>Security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159646" ref_url="https://bugzilla.suse.com/1159646" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
This update for log4j fixes the following issues:

- CVE-2019-17571: Fixed a remote code execution by deserialization of untrusted data in SocketServer (bsc#1159646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-09"/>
	<updated date="2020-01-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81904" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1123886" ref_url="https://bugzilla.suse.com/1123886" source="BUGZILLA"/>
		<reference ref_id="1160594" ref_url="https://bugzilla.suse.com/1160594" source="BUGZILLA"/>
		<reference ref_id="1160764" ref_url="https://bugzilla.suse.com/1160764" source="BUGZILLA"/>
		<reference ref_id="1161779" ref_url="https://bugzilla.suse.com/1161779" source="BUGZILLA"/>
		<reference ref_id="1163922" ref_url="https://bugzilla.suse.com/1163922" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<description>
This update for permissions fixes the following issues:

Security issues fixed:

- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).

Non-security issues fixed:

- Fixed a regression where chkstat broke when /proc was not available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-02-28"/>
	<updated date="2020-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1123886">SUSE bug 1123886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161779">SUSE bug 1161779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81905" version="1" class="patch">
	<metadata>
		<title>Security update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1111622" ref_url="https://bugzilla.suse.com/1111622" source="BUGZILLA"/>
		<reference ref_id="1122668" ref_url="https://bugzilla.suse.com/1122668" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues:

python-cfn-lint was included as a new package in 0.21.4.


python-aws-sam-translator was updated to 1.11.0:

  * Add ReservedConcurrentExecutions to globals
  * Fix ElasticsearchHttpPostPolicy resource reference
  * Support using AWS::Region in Ref and Sub
  * Documentation and examples updates
  * Add VersionDescription property to Serverless::Function
  * Update ServerlessRepoReadWriteAccessPolicy
  * Add additional template validation

Upgrade to 1.10.0:

  * Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
  * Add DynamoDBReconfigurePolicy
  * Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
  * Add EKSDescribePolicy
  * Add SESBulkTemplatedCrudPolicy
  * Add FilterLogEventsPolicy
  * Add SSMParameterReadPolicy
  * Add SESEmailTemplateCrudPolicy
  * Add s3:PutObjectAcl to S3CrudPolicy
  * Add allow_credentials CORS option
  * Add support for AccessLogSetting and CanarySetting Serverless::Api properties
  * Add support for X-Ray in Serverless::Api
  * Add support for MinimumCompressionSize in Serverless::Api
  * Add Auth to Serverless::Api globals
  * Remove trailing slashes from APIGW permissions
  * Add SNS FilterPolicy and an example application
  * Add Enabled property to Serverless::Function event sources
  * Add support for PermissionsBoundary in Serverless::Function
  * Fix boto3 client initialization
  * Add PublicAccessBlockConfiguration property to S3 bucket resource
  * Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
  * Add limited support for resolving intrinsics in Serverless::LayerVersion
  * SAM now uses Flake8
  * Add example application for S3 Events written in Go
  * Updated several example applications

- Initial build
  + Version 1.9.0
- Add patch to drop compatible releases operator from setup.py,
  required for SLES12 as the setuptools version is too old
  + ast_drop-compatible-releases-operator.patch


python-jsonschema was updated to 2.6.0:

* Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0:

* Improved performance on CPython by adding caching around ref
  resolution (#203)

Update to version 2.4.0:

* Added a CLI (#134)
* Added absolute path and absolute schema path to errors (#120)
* Added ``relevance``
* Meta-schemas are now loaded via ``pkgutil``
* Added ``by_relevance`` and ``best_match`` (#91)
* Fixed ``format`` to allow adding formats for non-strings (#125)
* Fixed the ``uri`` format to reject URI references (#131)

- Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1:

* the prof plugin now uses cProfile instead of hotshot for profiling
* skipped tests now include the user's reason in junit XML's message field
* the prettyassert plugin mishandled multi-line function definitions
* Using a plugin's CLI flag when the plugin is already enabled via config
  no longer errors
* nose2.plugins.prettyassert, enabled with --pretty-assert
* Cleanup code for EOLed python versions
* Dropped support for distutils.
* Result reporter respects failure status set by other plugins
* JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0:

List of changes is too long to show here, see
https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst
changes between 0.6.5 and 0.8.0

Update to 0.7.0:

* Added parameterized_class feature, for parameterizing entire test
  classes (many thanks to @TobyLL for their suggestions and help testing!)
* Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
  https://github.com/wolever/parameterized/issues/67)
* Make sure that `setUp` and `tearDown` methods work correctly (#40)
* Raise a ValueError when input is empty (thanks @danielbradburn;
  https://github.com/wolever/parameterized/pull/48)
* Fix the order when number of cases exceeds 10 (thanks @ntflc;
  https://github.com/wolever/parameterized/pull/49)

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622)

* Fixed bug with unintended Authorization header stripping for
  redirects using default ports (http/80, https/443).


* remove restriction for urllib3 &lt; 1.24

Update to version 2.20.0:

* Bugfixes
  + Content-Type header parsing is now case-insensitive
    (e.g. charset=utf8 v Charset=utf8).
  + Fixed exception leak where certain redirect urls would raise
    uncaught urllib3 exceptions.
  + Requests removes Authorization header from requests redirected
    from https to http on the same hostname. (CVE-2018-18074)
  + should_bypass_proxies now handles URIs without hostnames
    (e.g. files).
* Dependencies
  + Requests now supports urllib3 v1.24.
* Deprecations
  + Requests has officially stopped support for Python 2.6.

Update to version 2.19.1:

* Fixed issue where status_codes.py’s init function failed trying
  to append to a __doc__ value of None.

Update to version 2.19.0:

* Improvements
  + Warn about possible slowdown with cryptography version &lt; 1.3.4
  + Check host in proxy URL, before forwarding request to adapter.
  + Maintain fragments properly across redirects. (RFC7231 7.1.2)
  + Removed use of cgi module to expedite library load time.
  + Added support for SHA-256 and SHA-512 digest auth algorithms.
  + Minor performance improvement to Request.content.
  + Migrate to using collections.abc for 3.7 compatibility.
* Bugfixes
  + Parsing empty Link headers with parse_header_links() no longer
    return one bogus entry.
  + Fixed issue where loading the default certificate bundle from
    a zip archive would raise an IOError.
  + Fixed issue with unexpected ImportError on windows system
    which do not support winreg module.
  + DNS resolution in proxy bypass no longer includes the username
    and password in the request. This also fixes the issue of DNS
    queries failing on macOS.
  + Properly normalize adapter prefixes for url comparison.
  + Passing None as a file pointer to the files param no longer
    raises an exception.
  + Calling copy on a RequestsCookieJar will now preserve the
    cookie policy correctly.
* We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4:

* Improvements
  + Error messages for invalid headers now include the header name
    for easier debugging
* Dependencies
  + We now support idna v2.6.

update to version 2.18.3:

* Improvements
  + Running $ python -m requests.help now includes the installed
    version of idna.
* Bugfixes
  + Fixed issue where Requests would raise ConnectionError instead
    of SSLError when encountering SSL problems when using urllib3
    v1.22.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-02"/>
	<updated date="2020-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122668">SUSE bug 1122668</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522744" comment="python-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522745" comment="python-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522746" comment="python-pyparsing-2.2.0-7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522747" comment="python3-asn1crypto-0.24.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522748" comment="python3-packaging-17.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522749" comment="python3-pyparsing-2.2.0-7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81906" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1124211" ref_url="https://bugzilla.suse.com/1124211" source="BUGZILLA"/>
		<reference ref_id="1141493" ref_url="https://bugzilla.suse.com/1141493" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
This update for libpng16 fixes the following issues:

Security issues fixed:

- CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
  png_image_free() was called under png_safe_execute (bsc#1124211).
- CVE-2017-12652: Fixed an Input Validation Error related to the length of chunks (bsc#1141493).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-03"/>
	<updated date="2020-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81907" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql96 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql96 fixes the following issues:

PostgreSQL was updated to version 9.6.17.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-04"/>
	<updated date="2020-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81908" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This update for java-1_7_0-openjdk fixes the following issues:

Update java-1_7_0-openjdk to version jdk7u251 (January 2020 CPU, bsc#1160968):

- CVE-2020-2583: Unlink Set of LinkedHashSets
- CVE-2020-2590: Improve Kerberos interop capabilities
- CVE-2020-2593: Normalize normalization for all
- CVE-2020-2601: Better Ticket Granting Services
- CVE-2020-2604: Better serial filter handling
- CVE-2020-2659: Enhance datagram socket support
- CVE-2020-2654: Improve Object Identifier Processing	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-10"/>
	<updated date="2020-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81909" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1156323" ref_url="https://bugzilla.suse.com/1156323" source="BUGZILLA"/>
		<reference ref_id="1156324" ref_url="https://bugzilla.suse.com/1156324" source="BUGZILLA"/>
		<reference ref_id="1156326" ref_url="https://bugzilla.suse.com/1156326" source="BUGZILLA"/>
		<reference ref_id="1156328" ref_url="https://bugzilla.suse.com/1156328" source="BUGZILLA"/>
		<reference ref_id="1156329" ref_url="https://bugzilla.suse.com/1156329" source="BUGZILLA"/>
		<reference ref_id="1162687" ref_url="https://bugzilla.suse.com/1162687" source="BUGZILLA"/>
		<reference ref_id="1162689" ref_url="https://bugzilla.suse.com/1162689" source="BUGZILLA"/>
		<reference ref_id="1162691" ref_url="https://bugzilla.suse.com/1162691" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
This update for squid fixes the following issues:

- CVE-2019-12528: Fixed an information disclosure flaw in the FTP gateway (bsc#1162689). 
- CVE-2019-12526: Fixed potential remote code execution during URN processing (bsc#1156326).
- CVE-2019-12523,CVE-2019-18676: Fixed multiple improper validations in URI processing (bsc#1156329).
- CVE-2019-18677: Fixed Cross-Site Request Forgery in HTTP Request processing (bsc#1156328).
- CVE-2019-18678: Fixed incorrect message parsing which could have led to HTTP request splitting issue (bsc#1156323).
- CVE-2019-18679: Fixed information disclosure when processing HTTP Digest Authentication (bsc#1156324).
- CVE-2020-8449: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8450: Fixed a buffer overflow when squid is acting as reverse-proxy (bsc#1162687).
- CVE-2020-8517: Fixed a buffer overflow in ext_lm_group_acl when processing NTLM Authentication credentials (bsc#1162691).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-12"/>
	<updated date="2020-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81910" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1160305" ref_url="https://bugzilla.suse.com/1160305" source="BUGZILLA"/>
		<reference ref_id="1160498" ref_url="https://bugzilla.suse.com/1160498" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 68.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-03 (bsc#1160498)
  * CVE-2019-17026 (bmo#1607443)
    IonMonkey type confusion with StoreElementHole and
    FallibleStoreElement 

- Firefox Extended Support Release 68.4.0 ESR
  * Fixed: Various security fixes
  MFSA 2020-02 (bsc#1160305)
  * CVE-2019-17015 (bmo#1599005)
    Memory corruption in parent process during new content
    process initialization on Windows
  * CVE-2019-17016 (bmo#1599181)
    Bypass of @namespace CSS sanitization during pasting
  * CVE-2019-17017 (bmo#1603055)
    Type Confusion in XPCVariant.cpp
  * CVE-2019-17021 (bmo#1599008)
    Heap address disclosure in parent process during content
    process initialization on Windows
  * CVE-2019-17022 (bmo#1602843)
    CSS sanitization does not escape HTML tags
  * CVE-2019-17024 (bmo#1507180, bmo#1595470, bmo#1598605,
    bmo#1601826)
    Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-10"/>
	<updated date="2020-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81911" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1163985" ref_url="https://bugzilla.suse.com/1163985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This update for postgresql10 fixes the following issues:

PostgreSQL was updated to version 10.12.

Security issue fixed:

- CVE-2020-1720: Fixed a missing authorization check in the ALTER ... DEPENDS ON extension (bsc#1163985).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-18"/>
	<updated date="2020-03-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531767" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531768" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531769" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81912" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1132665" ref_url="https://bugzilla.suse.com/1132665" source="BUGZILLA"/>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to 68.6.0 ESR (MFSA 2020-09 bsc#1132665 bsc#1166238)
          
- CVE-2020-6805: Fixed a use-after-free when removing data about origins
- CVE-2020-6806: Fixed improper protections against state confusion
- CVE-2020-6807: Fixed a use-after-free in cubeb during stream destruction 
- CVE-2020-6811: Fixed an issue where copy as cURL' feature did not fully 
  escape website-controlled data potentially leading to command injection 
- CVE-2019-20503: Fixed out of bounds reads in sctp_load_addresses_from_init 
- CVE-2020-6812: Fixed an issue where the names of AirPods with personally 
  identifiable information were exposed to websites with camera or microphone 
  permission     
- CVE-2020-6814: Fixed multiple memory safety bugs
- Fixed an issue with minimizing a window (bsc#1132665).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1132665">SUSE bug 1132665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81913" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1164692" ref_url="https://bugzilla.suse.com/1164692" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-1938: Fixed a file contents disclosure vulnerability (bsc#1164692).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-19"/>
	<updated date="2020-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81914" version="1" class="patch">
	<metadata>
		<title>Security update for python-cffi, python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1055478" ref_url="https://bugzilla.suse.com/1055478" source="BUGZILLA"/>
		<reference ref_id="1070737" ref_url="https://bugzilla.suse.com/1070737" source="BUGZILLA"/>
		<reference ref_id="1101820" ref_url="https://bugzilla.suse.com/1101820" source="BUGZILLA"/>
		<reference ref_id="1111657" ref_url="https://bugzilla.suse.com/1111657" source="BUGZILLA"/>
		<reference ref_id="1138748" ref_url="https://bugzilla.suse.com/1138748" source="BUGZILLA"/>
		<reference ref_id="1149792" ref_url="https://bugzilla.suse.com/1149792" source="BUGZILLA"/>
		<reference ref_id="981848" ref_url="https://bugzilla.suse.com/981848" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903/" source="CVE"/>
		<description>
This update for python-cffi, python-cryptography fixes the following issues:

Security issue fixed:

- CVE-2018-10903: Fixed GCM tag forgery via truncated tag in finalize_with_tag API (bsc#1101820).

Non-security issues fixed:

python-cffi was updated to 1.11.2 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598):

- fixed a build failure on i586 (bsc#1111657)
- Salt was unable to highstate in snapshot 20171129 (bsc#1070737)

- Update pytest in spec to add c directory tests in addition to 
  testing directory.

- update to version 1.11.2:
  * Fix Windows issue with managing the thread-state on CPython 3.0 to
    3.5

- Update pytest in spec to add c directory tests in addition to 
  testing directory.
- Omit test_init_once_multithread tests as they rely on multiple
  threads finishing in a given time. Returns sporadic pass/fail
  within build.
- Update to 1.11.1:
  * Fix tests, remove deprecated C API usage
  * Fix (hack) for 3.6.0/3.6.1/3.6.2 giving incompatible binary
    extensions (cpython issue #29943)
  * Fix for 3.7.0a1+

- Update to 1.11.0:
  * Support the modern standard types char16_t and char32_t. These
    work like wchar_t: they represent one unicode character, or when
    used as charN_t * or charN_t[] they represent a unicode string.
    The difference with wchar_t is that they have a known, fixed
    size. They should work at all places that used to work with
    wchar_t (please report an issue if I missed something). Note
    that with set_source(), you need to make sure that these types
    are actually defined by the C source you provide (if used in
    cdef()).
  * Support the C99 types float _Complex and double _Complex. Note
    that libffi doesn't support them, which means that in the ABI
    mode you still cannot call C functions that take complex
    numbers directly as arguments or return type.
  * Fixed a rare race condition when creating multiple FFI instances
    from multiple threads. (Note that you aren't meant to create
    many FFI instances: in inline mode, you should write
    ffi = cffi.FFI() at module level just after import cffi; and in
    out-of-line mode you don't instantiate FFI explicitly at all.)
  * Windows: using callbacks can be messy because the CFFI internal
    error messages show up to stderr-but stderr goes nowhere in many
    applications. This makes it particularly hard to get started
    with the embedding mode. (Once you get started, you can at least
    use @ffi.def_extern(onerror=...) and send the error logs where
    it makes sense for your application, or record them in log
    files, and so on.) So what is new in CFFI is that now, on
    Windows CFFI will try to open a non-modal MessageBox (in addition
    to sending raw messages to stderr). The MessageBox is only
    visible if the process stays alive: typically, console
    applications that crash close immediately, but that is also the
    situation where stderr should be visible anyway.
  * Progress on support for callbacks in NetBSD.
  * Functions returning booleans would in some case still return 0
    or 1 instead of False or True. Fixed.
  * ffi.gc() now takes an optional third parameter, which gives an
    estimate of the size (in bytes) of the object. So far, this is
    only used by PyPy, to make the next GC occur more quickly
    (issue #320). In the future, this might have an effect on
    CPython too (provided the CPython issue 31105 is addressed).
  * Add a note to the documentation: the ABI mode gives function
    objects that are slower to call than the API mode does. For
    some reason it is often thought to be faster. It is not!
- Update to 1.10.1:
  * Fixed the line numbers reported in case of cdef() errors. Also,
    I just noticed, but pycparser always supported the preprocessor
    directive # 42 'foo.h' to mean 'from the next line, we're in
    file foo.h starting from line 42';, which it puts in the error
    messages. 

- update to 1.10.0:
 * Issue #295: use calloc() directly instead of PyObject_Malloc()+memset()
   to handle ffi.new() with a default allocator. Speeds up ffi.new(large-array)
   where most of the time you never touch most of the array.
  * Some OS/X build fixes ('only with Xcode but without CLT';).
  * Improve a couple of error messages: when getting mismatched versions of
    cffi and its backend; and when calling functions which cannot be called with
    libffi because an argument is a struct that is 'too complicated'; (and not
    a struct pointer, which always works).
  * Add support for some unusual compilers (non-msvc, non-gcc, non-icc, non-clang)
  * Implemented the remaining cases for ffi.from_buffer. Now all
    buffer/memoryview objects can be passed. The one remaining check is against
    passing unicode strings in Python 2. (They support the buffer interface, but
    that gives the raw bytes behind the UTF16/UCS4 storage, which is most of the
    times not what you expect. In Python 3 this has been fixed and the unicode
    strings don't support the memoryview interface any more.)
  * The C type _Bool or bool now converts to a Python boolean when reading,
    instead of the content of the byte as an integer. The potential
    incompatibility here is what occurs if the byte contains a value different
    from 0 and 1. Previously, it would just return it; with this change, CFFI
    raises an exception in this case. But this case means 'undefined behavior';
    in C; if you really have to interface with a library relying on this,
    don't use bool in the CFFI side. Also, it is still valid to use a byte
    string as initializer for a bool[], but now it must only contain \x00 or
    \x01. As an aside, ffi.string() no longer works on bool[] (but it never made
    much sense, as this function stops at the first zero).
  * ffi.buffer is now the name of cffi's buffer type, and ffi.buffer() works
    like before but is the constructor of that type.
  * ffi.addressof(lib, 'name') now works also in in-line mode, not only in
    out-of-line mode. This is useful for taking the address of global variables.
  * Issue #255: cdata objects of a primitive type (integers, floats, char) are
    now compared and ordered by value. For example, &lt;cdata 'int' 42&gt; compares
    equal to 42 and &lt;cdata 'char' b'A'&gt; compares equal to b'A'. Unlike C,
    &lt;cdata 'int' -1&gt; does not compare equal to ffi.cast('unsigned int', -1): it
    compares smaller, because -1 &lt; 4294967295.
  * PyPy: ffi.new() and ffi.new_allocator()() did not record 'memory pressure';,
    causing the GC to run too infrequently if you call ffi.new() very often
    and/or with large arrays. Fixed in PyPy 5.7.
  * Support in ffi.cdef() for numeric expressions with + or -. Assumes that
    there is no overflow; it should be fixed first before we add more general
    support for arbitrary arithmetic on constants.

- do not generate HTML documentation for packages that are indirect
  dependencies of Sphinx
  (see docs at https://cffi.readthedocs.org/ )

- update to 1.9.1
  - Structs with variable-sized arrays as their last field: now we track the
    length of the array after ffi.new() is called, just like we always tracked
    the length of ffi.new('int[]', 42). This lets us detect out-of-range
    accesses to array items. This also lets us display a better repr(), and
    have the total size returned by ffi.sizeof() and ffi.buffer(). Previously
    both functions would return a result based on the size of the declared
    structure type, with an assumed empty array. (Thanks andrew for starting
    this refactoring.)
  - Add support in cdef()/set_source() for unspecified-length arrays in
    typedefs: typedef int foo_t[...];. It was already supported for global
    variables or structure fields.
  - I turned in v1.8 a warning from cffi/model.py into an error: 'enum xxx' has
    no values explicitly defined: refusing to guess which integer type it is
    meant to be (unsigned/signed, int/long). Now I'm turning it back to a
    warning again; it seems that guessing that the enum has size int is a
    99%-safe bet. (But not 100%, so it stays as a warning.)
  - Fix leaks in the code handling FILE * arguments. In CPython 3 there is a
    remaining issue that is hard to fix: if you pass a Python file object to a
    FILE * argument, then os.dup() is used and the new file descriptor is only
    closed when the GC reclaims the Python file object-and not at the earlier
    time when you call close(), which only closes the original file descriptor.
    If this is an issue, you should avoid this automatic convertion of Python
    file objects: instead, explicitly manipulate file descriptors and call
    fdopen() from C (...via cffi).
  - When passing a void * argument to a function with a different pointer type,
    or vice-versa, the cast occurs automatically, like in C. The same occurs
    for initialization with ffi.new() and a few other places. However, I
    thought that char * had the same property-but I was mistaken. In C you get
    the usual warning if you try to give a char * to a char ** argument, for
    example. Sorry about the confusion. This has been fixed in CFFI by giving
    for now a warning, too. It will turn into an error in a future version.
  - Issue #283: fixed ffi.new() on structures/unions with nested anonymous
    structures/unions, when there is at least one union in the mix. When
    initialized with a list or a dict, it should now behave more closely like
    the { } syntax does in GCC.
  - CPython 3.x: experimental: the generated C extension modules now use the
    'limited API';, which means that, as a compiled .so/.dll, it should work
    directly on any version of CPython &gt;= 3.2. The name produced by distutils
    is still version-specific. To get the version-independent name, you can
    rename it manually to NAME.abi3.so, or use the very recent setuptools 26.
  - Added ffi.compile(debug=...), similar to python setup.py build --debug but
    defaulting to True if we are running a debugging version of Python itself.
  - Removed the restriction that ffi.from_buffer() cannot be used on byte
    strings. Now you can get a char * out of a byte string, which is valid as
    long as the string object is kept alive. (But don't use it to modify the
    string object! If you need this, use bytearray or other official
    techniques.)
  - PyPy 5.4 can now pass a byte string directly to a char * argument (in older
    versions, a copy would be made). This used to be a CPython-only
    optimization.
  - ffi.gc(p, None) removes the destructor on an object previously created by
    another call to ffi.gc()
  - bool(ffi.cast('primitive type', x)) now returns False if the value is zero
    (including -0.0), and True otherwise. Previously this would only return
    False for cdata objects of a pointer type when the pointer is NULL.
  - bytearrays: ffi.from_buffer(bytearray-object) is now supported. (The reason
    it was not supported was that it was hard to do in PyPy, but it works since
    PyPy 5.3.) To call a C function with a char * argument from a buffer
    object-now including bytearrays-you write lib.foo(ffi.from_buffer(x)).
    Additionally, this is now supported: p[0:length] = bytearray-object. The
    problem with this was that a iterating over bytearrays gives numbers
    instead of characters. (Now it is implemented with just a memcpy, of
    course, not actually iterating over the characters.)
  - C++: compiling the generated C code with C++ was supposed to work, but
    failed if you make use the bool type (because that is rendered as the C
    _Bool type, which doesn't exist in C++).
  - help(lib) and help(lib.myfunc) now give useful information, as well as
    dir(p) where p is a struct or pointer-to-struct.

- update for multipython build

- disable 'negative left shift' warning in test suite to prevent
  failures with gcc6, until upstream fixes the undefined code
  in question (bsc#981848)

- Update to version 1.6.0:
  * ffi.list_types()
  * ffi.unpack()
  * extern 'Python+C';
  * in API mode, lib.foo.__doc__ contains the C signature now.
  * Yet another attempt at robustness of ffi.def_extern() against
    CPython's interpreter shutdown logic.
- Update in SLE-12 (bsc#1138748, jsc#ECO-1256, jsc#PM-1598)

- Make this version of the package compatible with OpenSSL 1.1.1d, thus fixing bsc#1149792.

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API

- Add proper conditional for the python2, the ifpython works only
  for the requires/etc

- add missing dependency on python ssl

- update to version 2.1.4:
  * Added X509_up_ref for an upcoming pyOpenSSL release.

- update to version 2.1.3:
  * Updated Windows, macOS, and manylinux1 wheels to be compiled with
    OpenSSL 1.1.0g.

- update to version 2.1.2:
  * Corrected a bug with the manylinux1 wheels where OpenSSL's stack
    was marked executable.

- fix BuildRequires conditions for python3

- update to 2.1.1

- Fix cffi version requirement.

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)


- update to 2.0.3

- update to 2.0.2

- update to 2.0

- update to 1.9

- add python-packaging to requirements explicitly instead of relying
  on setuptools to pull it in

- Switch to singlespec approach

- update to 1.8.1
- Adust Requires and BuildRequires		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-25"/>
	<updated date="2020-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055478">SUSE bug 1055478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070737">SUSE bug 1070737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111657">SUSE bug 1111657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138748">SUSE bug 1138748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149792">SUSE bug 1149792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981848">SUSE bug 981848</bugzilla>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81915" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1118987" ref_url="https://bugzilla.suse.com/1118987" source="BUGZILLA"/>
		<reference ref_id="1162197" ref_url="https://bugzilla.suse.com/1162197" source="BUGZILLA"/>
		<reference ref_id="1162200" ref_url="https://bugzilla.suse.com/1162200" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2018-11805: Fixed an issue with delimiter handling in rule files 
  related to is_regexp_valid() (bsc#1118987).
- CVE-2020-1930: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands (bsc#1162197).
- CVE-2020-1931: Fixed an issue with rule configuration (.cf) files which 
  can be configured to run system commands with warnings (bsc#1162200).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-03-30"/>
	<updated date="2020-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81916" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1162224" ref_url="https://bugzilla.suse.com/1162224" source="BUGZILLA"/>
		<reference ref_id="1162367" ref_url="https://bugzilla.suse.com/1162367" source="BUGZILLA"/>
		<reference ref_id="1162825" ref_url="https://bugzilla.suse.com/1162825" source="BUGZILLA"/>
		<reference ref_id="1165894" ref_url="https://bugzilla.suse.com/1165894" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This update for python3 fixes the following issue:

- CVE-2019-18348: Fixed a CRLF injection via the host part 
  of the url passed to urlopen(). Now an InvalidURL exception 
  is raised (bsc#1155094).
- CVE-2019-9674: Improved the documentation to reflect the 
  dangers of zip-bombs (bsc#1162825).
- CVE-2020-8492: Fixed a regular expression in urllib that 
  was prone to denial of service via HTTP (bsc#1162367).
- Fixed an issue with version missmatch (bsc#1162224).
- Rename idle icons to idle3 in order to not conflict with python2
  variant of the package. (bsc#1165894)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-02"/>
	<updated date="2020-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162224">SUSE bug 1162224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165894">SUSE bug 1165894</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531794" comment="python3-devel-3.4.10-25.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81917" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552479" comment="kgraft-patch-4_4_121-92_125-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81918" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552480" comment="kgraft-patch-4_4_121-92_120-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81919" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_117 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552481" comment="kgraft-patch-4_4_121-92_117-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81920" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552482" comment="kgraft-patch-4_4_121-92_114-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81921" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552483" comment="kgraft-patch-4_4_121-92_109-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81922" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1159913" ref_url="https://bugzilla.suse.com/1159913" source="BUGZILLA"/>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_104 fixes several issues.

The following security issues were fixed:

- CVE-2020-1749: Fixed an issue in the networking protocols in encrypted IPsec tunnel (bsc#1165631)
- CVE-2019-5108: Fixed an issue where by triggering AP to send IAPP location updates for stations before the required authentication process has completed could have led to denial-of-service (bsc#1159913).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-03"/>
	<updated date="2020-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552484" comment="kgraft-patch-4_4_121-92_104-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81923" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1141322" ref_url="https://bugzilla.suse.com/1141322" source="BUGZILLA"/>
		<reference ref_id="1158527" ref_url="https://bugzilla.suse.com/1158527" source="BUGZILLA"/>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to NSS 3.47.1:

Security issues fixed:

- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
- CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
- CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

mozilla-nspr was updated to version 4.23:

- Whitespace in C files was cleaned up and no longer uses tab characters for indenting.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-01-13"/>
	<updated date="2020-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81924" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1154609" ref_url="https://bugzilla.suse.com/1154609" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This update for libxslt fixes the following issue:

- CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-26"/>
	<updated date="2020-08-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81925" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1168630" ref_url="https://bugzilla.suse.com/1168630" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 68.6.1esr
  MFSA 2020-11 (bsc#1168630)
  * CVE-2020-6819 (bmo#1620818)
    Use-after-free while running the nsDocShell destructor
  * CVE-2020-6820 (bmo#1626728)
    Use-after-free when handling a ReadableStream
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-06"/>
	<updated date="2020-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531803" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81926" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1168874" ref_url="https://bugzilla.suse.com/1168874" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<description>
This update for MozillaFirefox to version 68.7.0 ESR fixes the following issues:

- CVE-2020-6821: Uninitialized memory could be read when using the WebGL copyTexSubImage method (bsc#1168874).
- CVE-2020-6822: Fixed out of bounds write in GMPDecodeData when processing large images (bsc#1168874).
- CVE-2020-6825: Fixed Memory safety bugs (bsc#1168874).
- CVE-2020-6827: Custom Tabs could have the URI spoofed (bsc#1168874).
- CVE-2020-6828: Preference overwrite via crafted Intent (bsc#1168874).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-09"/>
	<updated date="2020-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81927" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1167890" ref_url="https://bugzilla.suse.com/1167890" source="BUGZILLA"/>
		<reference ref_id="1168930" ref_url="https://bugzilla.suse.com/1168930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This update for git fixes the following issues:

Security issue fixed:

- CVE-2020-5260: With a crafted URL that contains a newline in it, the credential
  helper machinery can be fooled to give credential information for a wrong host (bsc#1168930). 

Non-security issue fixed: 

git was updated to 2.26.0 for SHA256 support (bsc#1167890, jsc#SLE-11608):

- the xinetd snippet was removed
- the System V init script for the git-daemon was replaced by a systemd
  service file of the same name.

git 2.26.0:

* 'git rebase' now uses a different backend that is based on the
  'merge' machinery by default. The 'rebase.backend' configuration
   variable reverts to old behaviour when set to  'apply'
* Improved handling of sparse checkouts
* Improvements to many commands and internal features

git 2.25.1:

* 'git commit' now honors advise.statusHints
* various updates, bug fixes and documentation updates

git 2.25.0:

* The branch description ('git branch --edit-description') has been
  used to fill the body of the cover letters by the format-patch
  command; this has been enhanced so that the subject can also be
  filled.
* A few commands learned to take the pathspec from the standard input
  or a named file, instead of taking it as the command line
  arguments, with the '--pathspec-from-file' option.
* Test updates to prepare for SHA-2 transition continues.
* Redo 'git name-rev' to avoid recursive calls.
* When all files from some subdirectory were renamed to the root
  directory, the directory rename heuristics would fail to detect that
  as a rename/merge of the subdirectory to the root directory, which has
  been corrected.
* HTTP transport had possible allocator/deallocator mismatch, which
  has been corrected.

git 2.24.1:

* CVE-2019-1348: The --export-marks option of fast-import is
  exposed also via the in-stream command feature export-marks=...
  and it allows overwriting arbitrary paths (bsc#1158785)
* CVE-2019-1349: on Windows, when submodules are cloned
  recursively, under certain circumstances Git could be fooled
  into using the same Git directory twice (bsc#1158787)
* CVE-2019-1350: Incorrect quoting of command-line arguments
  allowed remote code execution during a recursive clone in
  conjunction with SSH URLs (bsc#1158788)
* CVE-2019-1351: on Windows mistakes drive letters outside of
  the US-English alphabet as relative paths (bsc#1158789)
* CVE-2019-1352: on Windows was unaware of NTFS Alternate Data
  Streams (bsc#1158790)
* CVE-2019-1353: when run in the Windows Subsystem for Linux
  while accessing a working directory on a regular Windows
  drive, none of the NTFS protections were active (bsc#1158791)
* CVE-2019-1354: on Windows refuses to write tracked files with
  filenames that contain backslashes (bsc#1158792)
* CVE-2019-1387: Recursive clones vulnerability that is caused
  by too-lax validation of submodule names, allowing very
  targeted attacks via remote code execution in recursive
  clones (bsc#1158793)
* CVE-2019-19604: a recursive clone followed by a submodule
  update could execute code contained within the repository
  without the user explicitly having asked for that (bsc#1158795)

- Fix building with asciidoctor and without DocBook4 stylesheets.

git 2.24.0

* The command line parser learned '--end-of-options' notation.
* A mechanism to affect the default setting for a (related) group of
  configuration variables is introduced.
* 'git fetch' learned '--set-upstream' option to help those who first
  clone from their private fork they intend to push to, add the true
  upstream via 'git remote add' and then 'git fetch' from it.
* fixes and improvements to UI, workflow and features, bash completion fixes
* part of it merged upstream
* the Makefile attempted to download some documentation, banned

git 2.23.0:

* The '--base' option of 'format-patch' computed the patch-ids for
  prerequisite patches in an unstable way, which has been updated
  to compute in a way that is compatible with 'git patch-id
  --stable'.
* The 'git log' command by default behaves as if the --mailmap
  option was given.
* fixes and improvements to UI, workflow and features

git 2.22.1:

* A relative pathname given to 'git init --template=&lt;path&gt; &lt;repo&gt;'
  ought to be relative to the directory 'git init' gets invoked in,
  but it instead was made relative to the repository, which has been
  corrected.
* 'git worktree add' used to fail when another worktree connected to
  the same repository was corrupt, which has been corrected.
* 'git am -i --resolved' segfaulted after trying to see a commit as
  if it were a tree, which has been corrected.
* 'git merge --squash' is designed to update the working tree and the
  index without creating the commit, and this cannot be countermanded
  by adding the '--commit' option; the command now refuses to work
  when both options are given.
* Update to Unicode 12.1 width table.
* 'git request-pull' learned to warn when the ref we ask them to pull
  from in the local repository and in the published repository are
  different.
* 'git fetch' into a lazy clone forgot to fetch base objects that are
  necessary to complete delta in a thin packfile, which has been
  corrected.
* The URL decoding code has been updated to avoid going past the end
  of the string while parsing %-&lt;hex&gt;-&lt;hex&gt; sequence.
* 'git clean' silently skipped a path when it cannot lstat() it; now
  it gives a warning.
* 'git rm' to resolve a conflicted path leaked an internal message
  'needs merge' before actually removing the path, which was
  confusing. This has been corrected.
* Many more bugfixes and code cleanups.

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

git 2.22.0:

* The filter specification '--filter=sparse:path=&lt;path&gt;' used to
  create a lazy/partial clone has been removed. Using a blob that is
  part of the project as sparse specification is still supported with
  the '--filter=sparse:oid=&lt;blob&gt;' option
* 'git checkout --no-overlay' can be used to trigger a new mode of
  checking out paths out of the tree-ish, that allows paths that
  match the pathspec that are in the current index and working tree
  and are not in the tree-ish.
* Four new configuration variables {author,committer}.{name,email}
  have been introduced to override user.{name,email} in more specific
  cases.
* 'git branch' learned a new subcommand '--show-current'.
* The command line completion (in contrib/) has been taught to
  complete more subcommand parameters.
* The completion helper code now pays attention to repository-local
  configuration (when available), which allows --list-cmds to honour
  a repository specific setting of completion.commands, for example.
* The list of conflicted paths shown in the editor while concluding a
  conflicted merge was shown above the scissors line when the
  clean-up mode is set to 'scissors', even though it was commented
  out just like the list of updated paths and other information to
  help the user explain the merge better.
* 'git rebase' that was reimplemented in C did not set ORIG_HEAD
  correctly, which has been corrected.
* 'git worktree add' used to do a 'find an available name with stat
  and then mkdir', which is race-prone. This has been fixed by using
  mkdir and reacting to EEXIST in a loop. 

- update git-web AppArmor profile for bash and tar usrMerge (bsc#1132350)

git 2.21.0:

* Historically, the '-m' (mainline) option can only be used for 'git
  cherry-pick' and 'git revert' when working with a merge commit.
  This version of Git no longer warns or errors out when working with
  a single-parent commit, as long as the argument to the '-m' option
  is 1 (i.e. it has only one parent, and the request is to pick or
  revert relative to that first parent). Scripts that relied on the
  behaviour may get broken with this change.
* Small fixes and features for fast-export and fast-import.
* The 'http.version' configuration variable can be used with recent
  enough versions of cURL library to force the version of HTTP used
  to talk when fetching and pushing.
* 'git push $there $src:$dst' rejects when $dst is not a fully
  qualified refname and it is not clear what the end user meant.
* Update 'git multimail' from the upstream.
* A new date format '--date=human' that morphs its output depending
  on how far the time is from the current time has been introduced.
  '--date=auto:human' can be used to use this new format (or any
  existing format) when the output is going to the pager or to the
  terminal, and otherwise the default format.

- Fix worktree creation race (bsc#1114225).

git 2.20.1:

* portability fixes
* 'git help -a' did not work well when an overly long alias was
  defined
* no longer squelched an error message when the run_command API
  failed to run a missing command

git 2.20.0:

* 'git help -a' now gives verbose output (same as 'git help -av').
  Those who want the old output may say 'git help --no-verbose -a'..
* 'git send-email' learned to grab address-looking string on any
  trailer whose name ends with '-by'.
* 'git format-patch' learned new '--interdiff' and '--range-diff'
  options to explain the difference between this version and the
  previous attempt in the cover letter (or after the three-dashes as
  a comment).
* Developer builds now use -Wunused-function compilation option.
* Fix a bug in which the same path could be registered under multiple
  worktree entries if the path was missing (for instance, was removed
  manually).  Also, as a convenience, expand the number of cases in
  which --force is applicable.
* The overly large Documentation/config.txt file have been split into
  million little pieces.  This potentially allows each individual piece
  to be included into the manual page of the command it affects more easily.
* Malformed or crafted data in packstream can make our code attempt
  to read or write past the allocated buffer and abort, instead of
  reporting an error, which has been fixed.
* Fix for a long-standing bug that leaves the index file corrupt when
  it shrinks during a partial commit.
* 'git merge' and 'git pull' that merges into an unborn branch used
  to completely ignore '--verify-signatures', which has been
  corrected.
* ...and much more features and fixes

- fix CVE-2018-19486 (bsc#1117257)

git 2.19.2:

* various bug fixes for multiple subcommands and operations

git 2.19.1:

* CVE-2018-17456: Specially crafted .gitmodules files may have
  allowed arbitrary code execution when the repository is cloned
  with --recurse-submodules (bsc#1110949)

git 2.19.0:

* 'git diff' compares the index and the working tree.  For paths
   added with intent-to-add bit, the command shows the full contents
   of them as added, but the paths themselves were not marked as new
   files.  They are now shown as new by default.
* 'git apply' learned the '--intent-to-add' option so that an
   otherwise working-tree-only application of a patch will add new
   paths to the index marked with the 'intent-to-add' bit.
* 'git grep' learned the '--column' option that gives not just the
   line number but the column number of the hit.
* The '-l' option in 'git branch -l' is an unfortunate short-hand for
   '--create-reflog', but many users, both old and new, somehow expect
   it to be something else, perhaps '--list'.  This step warns when '-l'
   is used as a short-hand for '--create-reflog' and warns about the
   future repurposing of the it when it is used.
* The userdiff pattern for .php has been updated.
* The content-transfer-encoding of the message 'git send-email' sends
   out by default was 8bit, which can cause trouble when there is an
   overlong line to bust RFC 5322/2822 limit.  A new option 'auto' to
   automatically switch to quoted-printable when there is such a line
   in the payload has been introduced and is made the default.
* 'git checkout' and 'git worktree add' learned to honor
   checkout.defaultRemote when auto-vivifying a local branch out of a
   remote tracking branch in a repository with multiple remotes that
   have tracking branches that share the same names.
   (merge 8d7b558bae ab/checkout-default-remote later to maint).
* 'git grep' learned the '--only-matching' option.
* 'git rebase --rebase-merges' mode now handles octopus merges as
   well.
* Add a server-side knob to skip commits in exponential/fibbonacci
  stride in an attempt to cover wider swath of history with a smaller
  number of iterations, potentially accepting a larger packfile
  transfer, instead of going back one commit a time during common
  ancestor discovery during the 'git fetch' transaction.
  (merge 42cc7485a2 jt/fetch-negotiator-skipping later to maint).
* A new configuration variable core.usereplacerefs has been added,
  primarily to help server installations that want to ignore the
  replace mechanism altogether.
* Teach 'git tag -s' etc. a few configuration variables (gpg.format
  that can be set to 'openpgp' or 'x509', and gpg.&lt;format&gt;.program
  that is used to specify what program to use to deal with the format)
  to allow x.509 certs with CMS via 'gpgsm' to be used instead of
  openpgp via 'gnupg'.
* Many more strings are prepared for l10n.
* 'git p4 submit' learns to ask its own pre-submit hook if it should
  continue with submitting.
* The test performed at the receiving end of 'git push' to prevent
  bad objects from entering repository can be customized via
  receive.fsck.* configuration variables; we now have gained a
  counterpart to do the same on the 'git fetch' side, with
  fetch.fsck.* configuration variables.
* 'git pull --rebase=interactive' learned 'i' as a short-hand for
  'interactive'.
* 'git instaweb' has been adjusted to run better with newer Apache on
  RedHat based distros.
* 'git range-diff' is a reimplementation of 'git tbdiff' that lets us
  compare individual patches in two iterations of a topic.
* The sideband code learned to optionally paint selected keywords at
  the beginning of incoming lines on the receiving end.
* 'git branch --list' learned to take the default sort order from the
  'branch.sort' configuration variable, just like 'git tag --list'
  pays attention to 'tag.sort'.
* 'git worktree' command learned '--quiet' option to make it less
  verbose.

git 2.18.0:

* improvements to rename detection logic
* When built with more recent cURL, GIT_SSL_VERSION can now
  specify 'tlsv1.3' as its value.
* 'git mergetools' learned talking to guiffy.
* various other workflow improvements and fixes
* performance improvements and other developer visible fixes

Update to git 2.16.4: security fix release

git 2.17.1:

* Submodule 'names' come from the untrusted .gitmodules file, but
  we blindly append them to $GIT_DIR/modules to create our on-disk
  repo paths. This means you can do bad things by putting '../'
  into the name. We now enforce some rules for submodule names
  which will cause Git to ignore these malicious names
  (CVE-2018-11235, bsc#1095219)
* It was possible to trick the code that sanity-checks paths on
  NTFS into reading random piece of memory
  (CVE-2018-11233, bsc#1095218)
* Support on the server side to reject pushes to repositories
  that attempt to create such problematic .gitmodules file etc.
  as tracked contents, to help hosting sites protect their
  customers by preventing malicious contents from spreading.

git 2.17.0:

* 'diff' family of commands learned '--find-object=&lt;object-id&gt;' option
  to limit the findings to changes that involve the named object.
* 'git format-patch' learned to give 72-cols to diffstat, which is
  consistent with other line length limits the subcommand uses for
  its output meant for e-mails.
* The log from 'git daemon' can be redirected with a new option; one
  relevant use case is to send the log to standard error (instead of
  syslog) when running it from inetd.
* 'git rebase' learned to take '--allow-empty-message' option.
* 'git am' has learned the '--quit' option, in addition to the
  existing '--abort' option; having the pair mirrors a few other
  commands like 'rebase' and 'cherry-pick'.
* 'git worktree add' learned to run the post-checkout hook, just like
  'git clone' runs it upon the initial checkout.
* 'git tag' learned an explicit '--edit' option that allows the
  message given via '-m' and '-F' to be further edited.
* 'git fetch --prune-tags' may be used as a handy short-hand for
  getting rid of stale tags that are locally held.
* The new '--show-current-patch' option gives an end-user facing way
  to get the diff being applied when 'git rebase' (and 'git am')
  stops with a conflict.
* 'git add -p' used to offer '/' (look for a matching hunk) as a
  choice, even there was only one hunk, which has been corrected.
  Also the single-key help is now given only for keys that are
  enabled (e.g. help for '/' won't be shown when there is only one
  hunk).
* Since Git 1.7.9, 'git merge' defaulted to --no-ff (i.e. even when
  the side branch being merged is a descendant of the current commit,
  create a merge commit instead of fast-forwarding) when merging a
  tag object.  This was appropriate default for integrators who pull
  signed tags from their downstream contributors, but caused an
  unnecessary merges when used by downstream contributors who
  habitually 'catch up' their topic branches with tagged releases
  from the upstream.  Update 'git merge' to default to --no-ff only
  when merging a tag object that does *not* sit at its usual place in
  refs/tags/ hierarchy, and allow fast-forwarding otherwise, to
  mitigate the problem.
* 'git status' can spend a lot of cycles to compute the relation
  between the current branch and its upstream, which can now be
  disabled with '--no-ahead-behind' option.
* 'git diff' and friends learned funcname patterns for Go language
  source files.
* 'git send-email' learned '--reply-to=&lt;address&gt;' option.
* Funcname pattern used for C# now recognizes 'async' keyword.
* In a way similar to how 'git tag' learned to honor the pager
  setting only in the list mode, 'git config' learned to ignore the
  pager setting when it is used for setting values (i.e. when the
  purpose of the operation is not to 'show').
- Use %license instead of %doc [bsc#1082318]

git 2.16.3:

* 'git status' after moving a path in the working tree (hence
  making it appear 'removed') and then adding with the -N option
  (hence making that appear 'added') detected it as a rename, but
  did not report the  old and new pathnames correctly.
* 'git commit --fixup' did not allow '-m&lt;message&gt;' option to be
  used at the same time; allow it to annotate resulting commit
  with more text.
* When resetting the working tree files recursively, the working
  tree of submodules are now also reset to match.
* Fix for a commented-out code to adjust it to a rather old API
  change around object ID.
* When there are too many changed paths, 'git diff' showed a
  warning message but in the middle of a line.
* The http tracing code, often used to debug connection issues,
  learned to redact potentially sensitive information from its
  output so that it can be more safely sharable.
* Crash fix for a corner case where an error codepath tried to
  unlock what it did not acquire lock on.
* The split-index mode had a few corner case bugs fixed.
* Assorted fixes to 'git daemon'.
* Completion of 'git merge -s&lt;strategy&gt;' (in contrib/) did not
  work well in non-C locale.
* Workaround for segfault with more recent versions of SVN.
* Recently introduced leaks in fsck have been plugged.
* Travis CI integration now builds the executable in 'script'
  phase to follow the established practice, rather than during
  'before_script' phase.  This allows the CI categorize the
  failures better ('failed' is project's fault, 'errored' is
  build environment's).

- Drop superfluous xinetd snippet, no longer used (bsc#1084460)

- Build with asciidoctor for the recent distros (bsc#1075764)

- Move %{?systemd_requires} to daemon subpackage
- Create subpackage for libsecret credential helper.

git 2.16.2:

* An old regression in 'git describe --all $annotated_tag^0' has
  been fixed.
* 'git svn dcommit' did not take into account the fact that a
  svn+ssh:// URL with a username@ (typically used for pushing)
  refers to the same SVN repository without the username@ and
  failed when svn.pushmergeinfo option is set.
* 'git merge -Xours/-Xtheirs' learned to use our/their version
  when resolving a conflicting updates to a symbolic link.
* 'git clone $there $here' is allowed even when here directory
  exists as long as it is an empty directory, but the command
   incorrectly removed it upon a failure of the operation.
* 'git stash -- &lt;pathspec&gt;' incorrectly blew away untracked files
  in the directory that matched the pathspec, which has been
  corrected.
* 'git add -p' was taught to ignore local changes to submodules
  as they do not interfere with the partial addition of regular
  changes anyway.

git 2.16.1:

* 'git clone' segfaulted when cloning a project that happens to
  track two paths that differ only in case on a case insensitive
  filesystem

git 2.16.0 (CVE-2017-15298, bsc#1063412):

* See https://raw.github.com/git/git/master/Documentation/RelNotes/2.16.0.txt

git 2.15.1:

* fix 'auto' column output 
* fixes to moved lines diffing
* documentation updates
* fix use of repositories immediately under the root directory
* improve usage of libsecret
* fixes to various error conditions in git commands

- Rewrite from sysv init to systemd unit file for git-daemon
  (bsc#1069803)

- Replace references to /var/adm/fillup-templates with new 
  %_fillupdir macro (bsc#1069468)

- split off p4 to a subpackage (bsc#1067502)

- Build with the external libsha1detectcoll (bsc#1042644)

git 2.15.0:

* Use of an empty string as a pathspec element that is used for
 'everything matches' is still warned and Git asks users to use a
  more explicit '.' for that instead. Removal scheduled for 2.16
* Git now avoids blindly falling back to '.git' when the setup
  sequence said we are _not_ in Git repository (another corner
  case removed)
* 'branch --set-upstream' was retired, deprecated since 1.8
* many other improvements and updates

git 2.14.3:

* git send-email understands more cc: formats
* fixes so gitk --bisect
* git commit-tree fixed to handle -F file alike
* Prevent segfault in 'git cat-file --textconv'
* Fix function header parsing for HTML
* Various small fixes to user commands and and internal functions

git 2.14.2:

* fixes to color output
* http.{sslkey,sslCert} now interpret '~[username]/' prefix
* fixes to walking of reflogs via 'log -g' and friends
* various fixes to output correctness
* 'git push --recurse-submodules $there HEAD:$target' is now
  propagated down to the submodules
* 'git clone --recurse-submodules --quiet' c$how propagates quiet
  option down to submodules.
* 'git svn --localtime' correctness fixes
* 'git grep -L' and 'git grep --quiet -L' now report same exit code
* fixes to 'git apply' when converting line endings
* Various Perl scripts did not use safe_pipe_capture() instead 
  of backticks, leaving them susceptible to end-user input.
  CVE-2017-14867 bsc#1061041
* 'git cvsserver' no longer is invoked by 'git daemon' by
  default 

git 2.14.1 (bsc#1052481):
* Security fix for CVE-2017-1000117: A malicious third-party can
  give a crafted 'ssh://...' URL to an unsuspecting victim, and
  an attempt to visit the URL can result in any program that
  exists on the victim's machine being executed. Such a URL could
  be placed in the .gitmodules file of a malicious project, and
  an unsuspecting victim could be tricked into running
  'git clone --recurse-submodules' to trigger the vulnerability.
* A 'ssh://...' URL can result in a 'ssh' command line with a
  hostname that begins with a dash '-', which would cause the
  'ssh' command to instead (mis)treat it as an option. This is
  now prevented by forbidding such a hostname (which should not
  impact any real-world usage).
* Similarly, when GIT_PROXY_COMMAND is configured, the command
  is run with host and port that are parsed out from 'ssh://...'
  URL; a poorly written GIT_PROXY_COMMAND could be tricked into
  treating a string that begins with a dash '-' as an option.
  This is now prevented by forbidding such a hostname and port
  number (again, which should not impact any real-world usage).
* In the same spirit, a repository name that begins with a dash
  '-' is also forbidden now.

git 2.14.0:

* Use of an empty string as a pathspec element that is used for
  'everything matches' is deprecated, use '.'
* Avoid blindly falling back to '.git' when the setup sequence
  indicates operation not on a Git repository
* 'indent heuristics' are now the default.
* Builds with pcre2
* Many bug fixes, improvements and updates

git 2.13.4:

* Update the character width tables.
* Fix an alias that contained an uppercase letter
* Progress meter fixes
* git gc concurrency fixes

git 2.13.3:

* various internal bug fixes
* Fix a  regression to 'git rebase -i'
* Correct unaligned 32-bit access in pack-bitmap code
* Tighten error checks for invalid 'git apply' input
* The split index code did not honor core.sharedrepository setting
  correctly
* Fix 'git branch --list' handling of color.branch.local

git 2.13.2:

* 'collision detecting' SHA-1 update for platform fixes
* 'git checkout --recurse-submodules' did not quite work with a
  submodule that itself has submodules.
* The 'run-command' API implementation has been made more robust
  against dead-locking in a threaded environment.
* 'git clean -d' now only cleans ignored files with '-x'
* 'git status --ignored'  did not list ignored and untracked files
  without '-uall'
* 'git pull --rebase --autostash' didn't auto-stash when the local
  history fast-forwards to the upstream.
* 'git describe --contains' gives as much weight to lightweight
  tags as annotated tags
* Fix 'git stash push &lt;pathspec&gt;' from a subdirectory

git 2.13.1:

* Setting 'log.decorate=false' in the configuration file did not
  take effect in v2.13, which has been corrected.
* corrections to documentation and command help output
* garbage collection fixes
* memory leaks fixed
* receive-pack now makes sure that the push certificate records
  the same set of push options used for pushing
* shell completion corrections for git stash
* fix 'git clone --config var=val' with empty strings
* internal efficiency improvements
* Update sha1 collision detection code for big-endian platforms
  and platforms not supporting unaligned fetches

- Fix packaging of documentation

git 2.13.0:

* empty string as a pathspec element for 'everything matches'
  is still warned, for future removal.
* deprecated argument order 'git merge &lt;msg&gt; HEAD &lt;commit&gt;...'
  was removed
* default location '~/.git-credential-cache/socket' for the
  socket used to communicate with the credential-cache daemon 
  moved to '~/.cache/git/credential/socket'.
* now avoid blindly falling back to '.git' when the setup
  sequence indicated otherwise
* many workflow features, improvements and bug fixes
* add a hardened implementation of SHA1 in response to practical
  collision attacks (CVE-2005-4900, bsc#1042640)
* CVE-2017-8386: On a server running git-shell as login shell to
  restrict user to git commands, remote users may have been able
  to have git service programs spawn an interactive pager
  and thus escape the shell restrictions. (bsc#1038395)

Changes in pcre2:

- Include the libraries, development and tools packages.
  
  git uses only libpcre2-8 so far, but this allows further
  application usage of pcre2.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-04-14"/>
	<updated date="2020-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167890">SUSE bug 1167890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531808" comment="git-core-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531809" comment="git-doc-2.26.0-27.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81928" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-09"/>
	<updated date="2021-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531815" comment="fwupdate-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531816" comment="fwupdate-efi-0.5-7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531817" comment="libfwup0-0.5-7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81929" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182155" ref_url="https://bugzilla.suse.com/1182155" source="BUGZILLA"/>
		<reference ref_id="1182431" ref_url="https://bugzilla.suse.com/1182431" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379/" source="CVE"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being updated under certain circumstances due to improper backport of XSA-321 (XSA-366, bsc#1182431)	  
- Fixed  an issue where xenstored was crashing with segfault (bsc#1182155).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182155">SUSE bug 1182155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531818" comment="xen-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531819" comment="xen-doc-html-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531820" comment="xen-libs-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531821" comment="xen-libs-32bit-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531822" comment="xen-tools-4.7.6_14-43.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531823" comment="xen-tools-domU-4.7.6_14-43.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81930" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81931" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81932" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot22 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<description>
This update for dovecot22 fixes the following issues:

- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81933" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781
  CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class Libraries:
    - Z/OS specific C function send_file is changing the file pointer position
  * Security:
    - Add the new oracle signer certificate
    - Certificate parsing error
    - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider
    - Remove check for websphere signed jars
    - sessionid.hashcode generates too many collisions
    - The Java 8 IBM certpath provider does not honor the user
      specified system property for CLR connect timeout
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-04"/>
	<updated date="2021-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81934" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81935" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql12, postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This update for postgresql, postgresql12, postgresql13 fixes the following issues:

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

Changes in postgresql:

- Bump postgresql major version to 13.

Changes in postgresql12:

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)
- Fix a DST problem in the test suite.

Changes in postgresql13:

- Add postgresql-icu68.patch: fix build with ICU 68

- %ghost the symlinks to pg_config and ecpg. (bsc#1178961)
- BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package. (bsc#1179765)

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

- Fix a DST problem in the test suite.

  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81936" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81937" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-27"/>
	<updated date="2021-01-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531855" comment="sudo-1.8.10p3-10.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81938" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81939" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.5.11 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
- datapath: Clear the L4 portion of the key for 'later' fragments
- datapath: Properly set L4 keys on 'later' IP fragments
- ofproto-dpif: Fix using uninitialised memory in user_action_cookie.
- stream-ssl: Fix crash on NULL private key and valid certificate.
- datapath: fix flow actions reallocation
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-03"/>
	<updated date="2021-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531859" comment="openvswitch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531862" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81940" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81941" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This update for python3 fixes the following issues:

- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531871" comment="python3-devel-3.4.10-25.63.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81942" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_146 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81943" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81944" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81945" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81946" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81947" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81948" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1070943" ref_url="https://bugzilla.suse.com/1070943" source="BUGZILLA"/>
		<reference ref_id="1121826" ref_url="https://bugzilla.suse.com/1121826" source="BUGZILLA"/>
		<reference ref_id="1121872" ref_url="https://bugzilla.suse.com/1121872" source="BUGZILLA"/>
		<reference ref_id="1157298" ref_url="https://bugzilla.suse.com/1157298" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1173942" ref_url="https://bugzilla.suse.com/1173942" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1179663" ref_url="https://bugzilla.suse.com/1179663" source="BUGZILLA"/>
		<reference ref_id="1179666" ref_url="https://bugzilla.suse.com/1179666" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179961" ref_url="https://bugzilla.suse.com/1179961" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180028" ref_url="https://bugzilla.suse.com/1180028" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="969755" ref_url="https://bugzilla.suse.com/969755" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could eventually have allowed attackers to cause a denial of service (memory consumption) (bnc#1157298 ).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).

The following non-security bugs were fixed:

- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb-&gt;lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix pi_state-&gt;owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb-&gt;lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969755">SUSE bug 969755</bugzilla>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81949" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-12"/>
	<updated date="2021-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531895" comment="openvswitch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531898" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81950" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
- CVE-2019-16275: AP mode PMF disconnection protection bypass (bsc#1150934)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-15"/>
	<updated date="2021-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81951" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81952" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81953" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81954" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_1-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_7_1-ibm fixes the following issues:

- Update to Java 7.1 Service Refresh 4 Fix Pack 80
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81955" version="1" class="patch">
	<metadata>
		<title>Security update for krb5-appl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1131109" ref_url="https://bugzilla.suse.com/1131109" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017/" source="CVE"/>
		<reference ref_id="CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018/" source="CVE"/>
		<description>
This update for krb5-appl fixes the following issues:

- CVE-2019-25017: Check the filenames sent by the server match those requested by the client (bsc#1131109).
- CVE-2019-25018: Disallow empty incoming filename or ones that refer to the current directory (bsc#1131109).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81956" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81957" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81958" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Added: the no_xxe option to XML::Twig::new, which causes the
    parse to fail if external entities are used (to prevent
    malicious XML to access the filesystem).
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81959" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81960" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81961" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

grub2 was bumped to version 2.02, same as SUSE Linux Enterprise 12 SP3.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81962" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81963" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).

The following non-security bug was fixed:

- xen/netback: fix spurious event detection for common event case (bsc#1182175).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81964" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: P2P provision discovery processing vulnerability (bsc#1182805) 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81965" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81966" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81967" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81968" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81969" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1165631" ref_url="https://bugzilla.suse.com/1165631" source="BUGZILLA"/>
		<reference ref_id="1176931" ref_url="https://bugzilla.suse.com/1176931" source="BUGZILLA"/>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_149 fixes several issues.

The following security issues were fixed:

- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2020-25645: Fixed an issue where the traffic between two Geneve endpoints may have been unencrypted when IPsec was configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a potential memory corruption due to a use after free which could have led local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749: Fixed an issue in some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6 where the kernel was not correctly routing tunneled data over the encrypted link rather sending the data unencrypted (bsc#1165631).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552490" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81970" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_146 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552491" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81971" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_141 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552492" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81972" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 35 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_135 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552493" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81973" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_129 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009552494" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81974" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179616" ref_url="https://bugzilla.suse.com/1179616" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 4.4.121-92_138 fixes several issues.

The following security issues were fixed:

- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81975" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This update for sudo fixes the following issues:

- Fixed a potential crash on exit as a result of the fix of CVE-2021-3156 [bsc#1181090]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531993" comment="sudo-1.8.10p3-10.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81976" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<description>
This update for wavpack fixes the following issues:
	
- CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81977" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1088639" ref_url="https://bugzilla.suse.com/1088639" source="BUGZILLA"/>
		<reference ref_id="1112438" ref_url="https://bugzilla.suse.com/1112438" source="BUGZILLA"/>
		<reference ref_id="1125689" ref_url="https://bugzilla.suse.com/1125689" source="BUGZILLA"/>
		<reference ref_id="1134616" ref_url="https://bugzilla.suse.com/1134616" source="BUGZILLA"/>
		<reference ref_id="1146182" ref_url="https://bugzilla.suse.com/1146182" source="BUGZILLA"/>
		<reference ref_id="1146184" ref_url="https://bugzilla.suse.com/1146184" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="962914" ref_url="https://bugzilla.suse.com/962914" source="BUGZILLA"/>
		<reference ref_id="964140" ref_url="https://bugzilla.suse.com/964140" source="BUGZILLA"/>
		<reference ref_id="966514" ref_url="https://bugzilla.suse.com/966514" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
This update for nghttp2 fixes the following issues:

Security issues fixed:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146182).
- CVE-2018-1000168: Fixed ALTSVC frame client side denial of service (bsc#1088639).
- CVE-2016-1544: Fixed out of memory due to unlimited incoming HTTP header fields (bsc#966514).

Bug fixes and enhancements:

- Packages must not mark license files as %doc (bsc#1082318)
- Typo in description of libnghttp2_asio1 (bsc#962914)
- Fixed mistake in spec file (bsc#1125689)
- Fixed build issue with boost 1.70.0 (bsc#1134616)
- Fixed build issue with GCC 6 (bsc#964140)
- Feature: Add W&amp;S module (FATE#326776, bsc#1112438)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112438">SUSE bug 1112438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125689">SUSE bug 1125689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134616">SUSE bug 1134616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962914">SUSE bug 962914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964140">SUSE bug 964140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81978" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This update for openssl fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81979" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-31"/>
	<updated date="2021-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128018" version="1" comment="sles-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131144" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131145" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140437" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140438" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140443" version="1" comment="alsa is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140444" version="1" comment="alsa-docs is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140445" version="1" comment="libasound2 is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140446" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140447" version="1" comment="ant is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140448" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140449" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140450" version="1" comment="apache-commons-daemon is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140451" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140452" version="1" comment="apache-commons-httpclient is &lt;3.1-4.498" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140453" version="1" comment="apache2 is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140454" version="1" comment="apache2-doc is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140455" version="1" comment="apache2-example-pages is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140456" version="1" comment="apache2-prefork is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140457" version="1" comment="apache2-utils is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140458" version="1" comment="apache2-worker is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140459" version="1" comment="apache2-mod_jk is &lt;1.2.40-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131934" version="1" comment="apache2-mod_nss is &lt;1.0.14-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140460" version="1" comment="apache2-mod_perl is &lt;2.0.8-11.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131796" version="1" comment="flex is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131938" version="1" comment="flex-32bit is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131939" version="1" comment="libbonobo-doc is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131114" version="1" comment="libkde4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131115" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131116" version="1" comment="libkdecore4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131117" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131118" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131119" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131120" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131121" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131122" version="1" comment="netpbm is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140461" version="1" comment="augeas is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140462" version="1" comment="augeas-lenses is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140463" version="1" comment="libaugeas0 is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140464" version="1" comment="autofs is &lt;5.0.9-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140465" version="1" comment="automake is &lt;1.13.4-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140469" version="1" comment="avahi-utils is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140477" version="1" comment="bash is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140478" version="1" comment="bash-doc is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140479" version="1" comment="libreadline6 is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140480" version="1" comment="libreadline6-32bit is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140481" version="1" comment="readline-doc is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131135" version="1" comment="bind is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131947" version="1" comment="bind-chrootenv is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131948" version="1" comment="bind-doc is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131136" version="1" comment="bind-libs is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131137" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131138" version="1" comment="bind-utils is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140484" version="1" comment="bzip2-doc is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140487" version="1" comment="chrony is &lt;2.3-3.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140489" version="1" comment="clamav is &lt;0.99.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140492" version="1" comment="libcolord2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140493" version="1" comment="libcolord2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140494" version="1" comment="libcolorhug2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102938" version="1" comment="cpio is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102939" version="1" comment="cpio-lang is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140503" version="1" comment="gcc48-locale is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140510" version="1" comment="cups is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140511" version="1" comment="cups-client is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140512" version="1" comment="cups-libs is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140513" version="1" comment="cups-libs-32bit is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119506" version="1" comment="cups-filters is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119507" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119508" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119509" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140514" version="1" comment="cups-pk-helper is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140515" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131101" version="1" comment="curl is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131102" version="1" comment="libcurl4 is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131103" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135211" version="1" comment="curl is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135212" version="1" comment="libcurl4 is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135213" version="1" comment="libcurl4-32bit is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140517" version="1" comment="cvs-doc is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140525" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140526" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140530" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140531" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140534" version="1" comment="davfs2 is &lt;1.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140535" version="1" comment="dbus-1 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140536" version="1" comment="dbus-1-x11 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140537" version="1" comment="libdbus-1-3 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140538" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130042" version="1" comment="dhcp-relay is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130043" version="1" comment="dhcp-server is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140541" version="1" comment="dnsmasq is &lt;2.71-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140542" version="1" comment="dovecot22 is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140543" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140544" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140545" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140546" version="1" comment="dracut is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140547" version="1" comment="dracut-fips is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140548" version="1" comment="dstat is &lt;0.7.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113256" version="1" comment="e2fsprogs is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113260" version="1" comment="libcom_err2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113261" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113264" version="1" comment="libext2fs2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106097" version="1" comment="libasm1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140549" version="1" comment="emacs is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140550" version="1" comment="emacs-el is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140551" version="1" comment="emacs-info is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140552" version="1" comment="emacs-nox is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140553" version="1" comment="emacs-x11 is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140554" version="1" comment="etags is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128464" version="1" comment="expat is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128465" version="1" comment="libexpat1 is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128466" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140570" version="1" comment="fetchmailconf is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140576" version="1" comment="freeradius-server is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140577" version="1" comment="freeradius-server-doc is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140578" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140579" version="1" comment="freeradius-server-ldap is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140580" version="1" comment="freeradius-server-libs is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140581" version="1" comment="freeradius-server-mysql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140582" version="1" comment="freeradius-server-perl is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140583" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140584" version="1" comment="freeradius-server-python is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140585" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140586" version="1" comment="freeradius-server-utils is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140589" version="1" comment="ft2demos is &lt;2.6.3-7.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131048" version="1" comment="gd is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140591" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140592" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140593" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140594" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140595" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140596" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125321" version="1" comment="ghostscript is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125322" version="1" comment="ghostscript-x11 is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126715" version="1" comment="giflib-progs is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124820" version="1" comment="git-core is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140618" version="1" comment="glibc is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140619" version="1" comment="glibc-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140620" version="1" comment="glibc-devel is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140621" version="1" comment="glibc-devel-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140622" version="1" comment="glibc-html is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140623" version="1" comment="glibc-i18ndata is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140624" version="1" comment="glibc-info is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140625" version="1" comment="glibc-locale is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140626" version="1" comment="glibc-locale-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140627" version="1" comment="glibc-profile is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140628" version="1" comment="glibc-profile-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140629" version="1" comment="nscd is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140638" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140639" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140640" version="1" comment="gnome-shell is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140641" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140642" version="1" comment="gnome-shell-lang is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114253" version="1" comment="gnutls is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114257" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114258" version="1" comment="libgnutls28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114259" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119616" version="1" comment="gpg2 is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119617" version="1" comment="gpg2-lang is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140646" version="1" comment="groff-full is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140647" version="1" comment="gxditview is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140648" version="1" comment="grub2 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140649" version="1" comment="grub2-arm64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140650" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140651" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140652" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140653" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140654" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140655" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140656" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140663" version="1" comment="guestfs-data is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140664" version="1" comment="guestfs-tools is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140665" version="1" comment="guestfsd is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140666" version="1" comment="libguestfs0 is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140667" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140668" version="1" comment="python-libguestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140669" version="1" comment="virt-p2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140670" version="1" comment="virt-v2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140671" version="1" comment="gv is &lt;3.7.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140673" version="1" comment="gvim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140674" version="1" comment="vim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140675" version="1" comment="vim-data is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140679" version="1" comment="hplip is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140680" version="1" comment="hplip-hpijs is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140681" version="1" comment="hplip-sane is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140684" version="1" comment="ibus-pinyin is &lt;1.5.0-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140685" version="1" comment="ipsec-tools is &lt;0.8.0-15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140687" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140688" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130960" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131900" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131901" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130961" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131658" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131659" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131661" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131662" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128388" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128390" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128391" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130962" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131902" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131903" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130963" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140694" version="1" comment="kdump is &lt;0.8.15-28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140696" version="1" comment="kernel-default-base is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140697" version="1" comment="kernel-default-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140698" version="1" comment="kernel-default-man is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140699" version="1" comment="kernel-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140700" version="1" comment="kernel-macros is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140701" version="1" comment="kernel-source is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140702" version="1" comment="kernel-syms is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140706" version="1" comment="krb5-doc is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140707" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140708" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140709" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140710" version="1" comment="krb5-server is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140712" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130985" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130987" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140721" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140722" version="1" comment="libQt5Core5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140723" version="1" comment="libQt5DBus5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140724" version="1" comment="libQt5Gui5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140725" version="1" comment="libQt5Network5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140726" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140727" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140728" version="1" comment="libQt5Sql5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140729" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140730" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140731" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140732" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140733" version="1" comment="libQt5Test5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140734" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140735" version="1" comment="libQt5Xml5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140736" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140737" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140738" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140739" version="1" comment="libX11-6 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140740" version="1" comment="libX11-6-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140741" version="1" comment="libX11-data is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140742" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140743" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140750" version="1" comment="libXfixes3 is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140751" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140753" version="1" comment="libXi6 is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140754" version="1" comment="libXi6-32bit is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140761" version="1" comment="libXrender1 is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140762" version="1" comment="libXrender1-32bit is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140765" version="1" comment="libXtst6 is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140766" version="1" comment="libXtst6-32bit is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140767" version="1" comment="libXv1 is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140768" version="1" comment="libXv1-32bit is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140769" version="1" comment="libXvMC1 is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140770" version="1" comment="libXvnc1 is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140771" version="1" comment="tigervnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140772" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140776" version="1" comment="libapr-util1 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140777" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140778" version="1" comment="libapr1 is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130724" version="1" comment="libarchive13 is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125716" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125717" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125723" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125724" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125734" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125735" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125736" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125737" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140779" version="1" comment="libblkid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140780" version="1" comment="libblkid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140781" version="1" comment="libfdisk1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140782" version="1" comment="libmount1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140783" version="1" comment="libmount1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140784" version="1" comment="libsmartcols1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140785" version="1" comment="libuuid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140786" version="1" comment="libuuid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140787" version="1" comment="python-libmount is &lt;2.28-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140788" version="1" comment="util-linux is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140789" version="1" comment="util-linux-lang is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140790" version="1" comment="util-linux-systemd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140791" version="1" comment="uuidd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140792" version="1" comment="libcgroup-tools is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140793" version="1" comment="libcgroup1 is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131768" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140794" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140795" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140796" version="1" comment="libdcerpc0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140797" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140798" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140799" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140800" version="1" comment="libndr-nbt0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140801" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140802" version="1" comment="libndr-standard0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140803" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140804" version="1" comment="libndr0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140805" version="1" comment="libndr0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140806" version="1" comment="libnetapi0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140807" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140808" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140809" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140810" version="1" comment="libsamba-errors0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140811" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140812" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140813" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140814" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140815" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140816" version="1" comment="libsamba-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140817" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140818" version="1" comment="libsamdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140819" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140820" version="1" comment="libsmbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140821" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140822" version="1" comment="libsmbconf0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140823" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140824" version="1" comment="libsmbldap0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140825" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140826" version="1" comment="libtevent-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140827" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140828" version="1" comment="libwbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140829" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140830" version="1" comment="samba is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140831" version="1" comment="samba-client is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140832" version="1" comment="samba-client-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140833" version="1" comment="samba-doc is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140834" version="1" comment="samba-libs is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140835" version="1" comment="samba-libs-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140836" version="1" comment="samba-winbind is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140837" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131139" version="1" comment="libecpg6 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131140" version="1" comment="libpq5 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131141" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131142" version="1" comment="postgresql94 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131949" version="1" comment="postgresql94-contrib is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131950" version="1" comment="postgresql94-docs is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131951" version="1" comment="postgresql94-server is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129282" version="1" comment="libfreebl3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129283" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129312" version="1" comment="libfreebl3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129313" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129284" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129285" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129314" version="1" comment="libsoftokn3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129315" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129288" version="1" comment="mozilla-nss is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129289" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129290" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129291" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129292" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129293" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129294" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140587" version="1" comment="libfreetype6 is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140588" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140590" version="1" comment="libgc1 is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131105" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131106" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131935" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131936" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140636" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140637" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124729" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124730" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106170" version="1" comment="libhivex0 is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106171" version="1" comment="perl-Win-Hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123011" version="1" comment="libhogweed2 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123012" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123014" version="1" comment="libnettle4 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123015" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107570" version="1" comment="libicu-doc is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131905" version="1" comment="libidn-tools is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140848" version="1" comment="libipa_hbac0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140849" version="1" comment="libsss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140850" version="1" comment="libsss_sudo is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140851" version="1" comment="python-sssd-config is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140852" version="1" comment="sssd is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140853" version="1" comment="sssd-32bit is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140854" version="1" comment="sssd-ad is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140855" version="1" comment="sssd-ipa is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140856" version="1" comment="sssd-krb5 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140857" version="1" comment="sssd-krb5-common is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140858" version="1" comment="sssd-ldap is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140859" version="1" comment="sssd-proxy is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140860" version="1" comment="sssd-tools is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140861" version="1" comment="libjansson4 is &lt;2.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106110" version="1" comment="libjasper1 is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106111" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140689" version="1" comment="libjbig2 is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140870" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140871" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140872" version="1" comment="openldap2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140873" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140874" version="1" comment="openldap2-client is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140715" version="1" comment="libldb1 is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140716" version="1" comment="libldb1-32bit is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140875" version="1" comment="libltdl7 is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140876" version="1" comment="libltdl7-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140877" version="1" comment="libtool is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140878" version="1" comment="libtool-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140879" version="1" comment="liblua5_2 is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140880" version="1" comment="liblua5_2-32bit is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140881" version="1" comment="lua is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140882" version="1" comment="liblzo2-2 is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105815" version="1" comment="libmpfr4-32bit is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131128" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131129" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131132" version="1" comment="mariadb is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131133" version="1" comment="mariadb-client is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131134" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131946" version="1" comment="mariadb-tools is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140888" version="1" comment="libneon27-32bit is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140431" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140432" version="1" comment="libnm-glib4 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140433" version="1" comment="libnm-util2 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140434" version="1" comment="libnm0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140435" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140436" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140890" version="1" comment="libopenssl-devel is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140891" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140892" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140893" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140894" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140895" version="1" comment="openssl is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140896" version="1" comment="openssl-doc is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140900" version="1" comment="libpcsclite1 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140901" version="1" comment="pcsc-lite is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119221" version="1" comment="libpng12-0 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119222" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119233" version="1" comment="libpng15-15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119224" version="1" comment="libpng16-16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119225" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128640" version="1" comment="libpoppler44 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140915" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140916" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140917" version="1" comment="libpulse0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140918" version="1" comment="libpulse0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140919" version="1" comment="pulseaudio is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140920" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140921" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140922" version="1" comment="pulseaudio-lang is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140923" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140924" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140925" version="1" comment="pulseaudio-utils is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130996" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130997" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130999" version="1" comment="python-base is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131910" version="1" comment="python-base-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131003" version="1" comment="python-xml is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140926" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140927" version="1" comment="python3-base is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125290" version="1" comment="qt4-x11-tools is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140929" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140930" version="1" comment="ruby2.1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140931" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119271" version="1" comment="libsndfile1 is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119272" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140943" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140944" version="1" comment="libspice-client-glib-helper is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140945" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140946" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140947" version="1" comment="libspice-controller0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140948" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140949" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140950" version="1" comment="libspice-server1 is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130774" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130775" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130776" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140954" version="1" comment="libsystemd0 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140955" version="1" comment="libsystemd0-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140956" version="1" comment="libudev1 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140957" version="1" comment="libudev1-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140958" version="1" comment="systemd is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140959" version="1" comment="systemd-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140960" version="1" comment="systemd-bash-completion is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140961" version="1" comment="systemd-sysvinit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140962" version="1" comment="udev is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128901" version="1" comment="libtasn1 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128902" version="1" comment="libtasn1-6 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128903" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131759" version="1" comment="libtcnative-1-0 is &lt;1.1.32-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131042" version="1" comment="libtiff5 is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131043" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131044" version="1" comment="tiff is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140972" version="1" comment="libupsclient1 is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140973" version="1" comment="nut is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140974" version="1" comment="nut-drivers-net is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140977" version="1" comment="libvirt is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140978" version="1" comment="libvirt-client is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140979" version="1" comment="libvirt-daemon is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140980" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140981" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140982" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140983" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140984" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140985" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140986" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140987" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140988" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140989" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140990" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140991" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140992" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140993" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140994" version="1" comment="libvirt-doc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140995" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140996" version="1" comment="libvirt-nss is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119309" version="1" comment="libvncclient0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119310" version="1" comment="libvncserver0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140997" version="1" comment="libvorbis-doc is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140998" version="1" comment="libvorbis0 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141000" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141002" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141005" version="1" comment="python-vte is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141006" version="1" comment="vte2-lang is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141032" version="1" comment="libxml2-2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141033" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141034" version="1" comment="libxml2-doc is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141035" version="1" comment="libxml2-tools is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141038" version="1" comment="logrotate is &lt;3.8.7-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141039" version="1" comment="logwatch is &lt;7.4.3-15.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141040" version="1" comment="mailman is &lt;2.1.17-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129286" version="1" comment="mozilla-nspr is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129287" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128799" version="1" comment="ntp is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128800" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131123" version="1" comment="openslp is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131124" version="1" comment="openslp-32bit is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131940" version="1" comment="openslp-server is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141045" version="1" comment="openssh is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141046" version="1" comment="openssh-fips is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141047" version="1" comment="openssh-helpers is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141048" version="1" comment="openvpn is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141049" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141050" version="1" comment="openvswitch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141051" version="1" comment="openvswitch-dpdk is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141052" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141053" version="1" comment="openvswitch-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141054" version="1" comment="opie is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141055" version="1" comment="opie-32bit is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141056" version="1" comment="pam is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141057" version="1" comment="pam-32bit is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141058" version="1" comment="pam-doc is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141059" version="1" comment="pam-modules is &lt;12.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141065" version="1" comment="pcsc-ccid is &lt;1.4.14-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141070" version="1" comment="powerpc-utils is &lt;1.3.2-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141071" version="1" comment="ppc64-diag is &lt;2.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141072" version="1" comment="ppp is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141073" version="1" comment="procmail is &lt;3.22-267.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130998" version="1" comment="python is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131909" version="1" comment="python-32bit is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131000" version="1" comment="python-curses is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131911" version="1" comment="python-demo is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131914" version="1" comment="python-gdbm is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131915" version="1" comment="python-idle is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131002" version="1" comment="python-tk is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141074" version="1" comment="python3 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141075" version="1" comment="python3-curses is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141082" version="1" comment="python-imaging is &lt;1.1.7-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141083" version="1" comment="python-libxml2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141086" version="1" comment="python-requests is &lt;2.8.1-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141087" version="1" comment="qemu is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141088" version="1" comment="qemu-arm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141089" version="1" comment="qemu-block-curl is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141090" version="1" comment="qemu-block-rbd is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141091" version="1" comment="qemu-block-ssh is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141092" version="1" comment="qemu-guest-agent is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141093" version="1" comment="qemu-ipxe is &lt;1.0.0-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141094" version="1" comment="qemu-kvm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141095" version="1" comment="qemu-lang is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141096" version="1" comment="qemu-ppc is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141097" version="1" comment="qemu-s390 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141098" version="1" comment="qemu-seabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141099" version="1" comment="qemu-sgabios is &lt;8-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141100" version="1" comment="qemu-tools is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141101" version="1" comment="qemu-vgabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141102" version="1" comment="qemu-x86 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128392" version="1" comment="quagga is &lt;0.99.22.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141104" version="1" comment="res-signingkeys is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141105" version="1" comment="smt is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141106" version="1" comment="smt-support is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141107" version="1" comment="rpcbind is &lt;0.2.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141112" version="1" comment="rsyslog is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141113" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141114" version="1" comment="rsyslog-doc is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141115" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141116" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141117" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141118" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141119" version="1" comment="rsyslog-module-relp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141120" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141121" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141124" version="1" comment="sblim-sfcb is &lt;1.4.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141125" version="1" comment="shim is &lt;0.9-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141127" version="1" comment="squid is &lt;3.5.21-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141128" version="1" comment="squidGuard is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141129" version="1" comment="squidGuard-doc is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119278" version="1" comment="strongswan is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119279" version="1" comment="strongswan-doc is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119300" version="1" comment="strongswan-hmac is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119280" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119281" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110494" version="1" comment="stunnel is &lt;5.00-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141130" version="1" comment="sudo is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141131" version="1" comment="supportutils is &lt;3.0-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141135" version="1" comment="systemtap is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141136" version="1" comment="systemtap-runtime is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141137" version="1" comment="systemtap-server is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141138" version="1" comment="sysvinit-tools is &lt;2.88+-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136443" version="1" comment="tar is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136445" version="1" comment="tar-lang is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141140" version="1" comment="tcpdump is &lt;4.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141142" version="1" comment="tomcat is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141143" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141144" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141145" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141146" version="1" comment="tomcat-javadoc is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141147" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141148" version="1" comment="tomcat-lib is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141149" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141150" version="1" comment="tomcat-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141156" version="1" comment="vsftpd is &lt;3.0.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141157" version="1" comment="w3m is &lt;0.5.3-157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131037" version="1" comment="wget is &lt;1.14-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131146" version="1" comment="wireshark is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141158" version="1" comment="xalan-j2 is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141159" version="1" comment="xen is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141160" version="1" comment="xen-doc-html is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141161" version="1" comment="xen-libs is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141162" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141163" version="1" comment="xen-tools is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141164" version="1" comment="xen-tools-domU is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141165" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141166" version="1" comment="xfsprogs is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141169" version="1" comment="xorg-x11 is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141170" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141172" version="1" comment="xorg-x11-libs is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141173" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141174" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141175" version="1" comment="yast2 is &lt;3.1.206-37.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141176" version="1" comment="yast2-core is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141177" version="1" comment="yast2-users is &lt;3.1.57-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512004" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525122" version="1" comment="python-tablib is &lt;0.9.11-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154488" version="1" comment="suse-openstack-cloud-release is ==7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009526518" version="1" comment="nodejs-common is &lt;1.0-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594271" version="1" comment="nodejs6 is &lt;6.11.1-11.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594272" version="1" comment="python-pycrypto is &lt;2.6.1-10.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594273" version="1" comment="python-XStatic-jquery-ui is &lt;1.11.0.1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594274" version="1" comment="dnsmasq-utils is &lt;2.78-18.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594275" version="1" comment="openstack-glance is &lt;13.0.1~a0~dev6-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594276" version="1" comment="openstack-glance-api is &lt;13.0.1~a0~dev6-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594277" version="1" comment="openstack-glance-doc is &lt;13.0.1~a0~dev6-4.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594278" version="1" comment="openstack-glance-glare is &lt;13.0.1~a0~dev6-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594279" version="1" comment="openstack-glance-registry is &lt;13.0.1~a0~dev6-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594280" version="1" comment="python-glance is &lt;13.0.1~a0~dev6-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594281" version="1" comment="openstack-aodh is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594282" version="1" comment="openstack-aodh-api is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594283" version="1" comment="openstack-aodh-doc is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594284" version="1" comment="openstack-aodh-evaluator is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594285" version="1" comment="openstack-aodh-expirer is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594286" version="1" comment="openstack-aodh-listener is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594287" version="1" comment="openstack-aodh-notifier is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594288" version="1" comment="python-aodh is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594289" version="1" comment="ruby2.1-rubygem-actionmailer-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594290" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594291" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594292" version="1" comment="ruby2.1-rubygem-activejob-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594293" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is &lt;4.2.9-6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594294" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.9-6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594295" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594296" version="1" comment="ruby2.1-rubygem-rails-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594297" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594298" version="1" comment="ruby2.1-rubygem-railties-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594299" version="1" comment="ansible is &lt;2.2.3.0-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594300" version="1" comment="monasca-installer is &lt;20170912_10.45-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594301" version="1" comment="storm is &lt;1.0.5-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594302" version="1" comment="storm-nimbus is &lt;1.0.5-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594303" version="1" comment="storm-supervisor is &lt;1.0.5-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594304" version="1" comment="openstack-nova is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594305" version="1" comment="openstack-nova-api is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594306" version="1" comment="openstack-nova-cells is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594307" version="1" comment="openstack-nova-cert is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594308" version="1" comment="openstack-nova-compute is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594309" version="1" comment="openstack-nova-conductor is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594310" version="1" comment="openstack-nova-console is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594311" version="1" comment="openstack-nova-consoleauth is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594312" version="1" comment="openstack-nova-doc is &lt;14.0.10~dev13-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594313" version="1" comment="openstack-nova-novncproxy is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594314" version="1" comment="openstack-nova-placement-api is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594315" version="1" comment="openstack-nova-scheduler is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594316" version="1" comment="openstack-nova-serialproxy is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594317" version="1" comment="openstack-nova-vncproxy is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594318" version="1" comment="python-nova is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525149" version="1" comment="python-PyJWT is &lt;1.4.2-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594319" version="1" comment="python-oslo.middleware is &lt;3.19.0-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594320" version="1" comment="openstack-magnum is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594321" version="1" comment="openstack-magnum-api is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594322" version="1" comment="openstack-magnum-conductor is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594323" version="1" comment="openstack-magnum-doc is &lt;3.1.2~a0~dev20-9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594324" version="1" comment="python-magnum is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594325" version="1" comment="openstack-ceilometer is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594326" version="1" comment="openstack-ceilometer-agent-central is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594327" version="1" comment="openstack-ceilometer-agent-compute is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594328" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594329" version="1" comment="openstack-ceilometer-agent-notification is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594330" version="1" comment="openstack-ceilometer-api is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594331" version="1" comment="openstack-ceilometer-collector is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594332" version="1" comment="openstack-ceilometer-doc is &lt;7.0.4~a0~dev7-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594333" version="1" comment="openstack-ceilometer-polling is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594334" version="1" comment="openstack-cinder is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594335" version="1" comment="openstack-cinder-api is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594336" version="1" comment="openstack-cinder-backup is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594337" version="1" comment="openstack-cinder-doc is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594338" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594339" version="1" comment="openstack-cinder-volume is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594340" version="1" comment="openstack-dashboard is &lt;10.0.4~a0~dev2-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594341" version="1" comment="openstack-glance is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594342" version="1" comment="openstack-glance-api is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594343" version="1" comment="openstack-glance-doc is &lt;13.0.1~a0~dev6-3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594344" version="1" comment="openstack-glance-glare is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594345" version="1" comment="openstack-glance-registry is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594346" version="1" comment="openstack-heat is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594347" version="1" comment="openstack-heat-api is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594348" version="1" comment="openstack-heat-api-cfn is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594349" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594350" version="1" comment="openstack-heat-doc is &lt;7.0.4~a0~dev4-4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594351" version="1" comment="openstack-heat-engine is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594352" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594353" version="1" comment="openstack-heat-test is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594354" version="1" comment="openstack-keystone is &lt;10.0.2~a0~dev2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594355" version="1" comment="openstack-keystone-doc is &lt;10.0.2~a0~dev2-6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594356" version="1" comment="openstack-magnum is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594357" version="1" comment="openstack-magnum-api is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594358" version="1" comment="openstack-magnum-conductor is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594359" version="1" comment="openstack-magnum-doc is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594360" version="1" comment="openstack-manila is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594361" version="1" comment="openstack-manila-api is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594362" version="1" comment="openstack-manila-data is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594363" version="1" comment="openstack-manila-doc is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594364" version="1" comment="openstack-manila-scheduler is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594365" version="1" comment="openstack-manila-share is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594366" version="1" comment="openstack-nova is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594367" version="1" comment="openstack-nova-api is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594368" version="1" comment="openstack-nova-cells is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594369" version="1" comment="openstack-nova-cert is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594370" version="1" comment="openstack-nova-compute is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594371" version="1" comment="openstack-nova-conductor is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594372" version="1" comment="openstack-nova-console is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594373" version="1" comment="openstack-nova-consoleauth is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594374" version="1" comment="openstack-nova-doc is &lt;14.0.6~a0~dev16-3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594375" version="1" comment="openstack-nova-novncproxy is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594376" version="1" comment="openstack-nova-placement-api is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594377" version="1" comment="openstack-nova-scheduler is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594378" version="1" comment="openstack-nova-serialproxy is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594379" version="1" comment="openstack-nova-vncproxy is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594380" version="1" comment="python-ceilometer is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594381" version="1" comment="python-cinder is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594382" version="1" comment="python-glance is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594383" version="1" comment="python-heat is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594384" version="1" comment="python-horizon is &lt;10.0.4~a0~dev2-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594385" version="1" comment="python-keystone is &lt;10.0.2~a0~dev2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594386" version="1" comment="python-magnum is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594387" version="1" comment="python-manila is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594388" version="1" comment="python-nova is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594389" version="1" comment="glibc is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550384" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594390" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550386" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530084" version="1" comment="glibc-html is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519650" version="1" comment="glibc-i18ndata is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530085" version="1" comment="glibc-info is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594391" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550388" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594392" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550390" version="1" comment="glibc-profile-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594393" version="1" comment="nscd is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594394" version="1" comment="git-core is &lt;2.12.3-27.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530089" version="1" comment="git-doc is &lt;2.12.3-27.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519660" version="1" comment="kernel-firmware is &lt;20170530-21.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519661" version="1" comment="ucode-amd is &lt;20170530-21.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594395" version="1" comment="libvirt is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594396" version="1" comment="libvirt-client is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594397" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594398" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594399" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594400" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530096" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594401" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594402" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594403" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594404" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594405" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594406" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594407" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594408" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594409" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594410" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530107" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594411" version="1" comment="libvirt-doc is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594412" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594413" version="1" comment="libvirt-nss is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519666" version="1" comment="ucode-intel is &lt;20180425-13.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594414" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594415" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594416" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594417" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594418" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594419" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594420" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594421" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594422" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519720" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530115" version="1" comment="xen is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530116" version="1" comment="xen-doc-html is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530117" version="1" comment="xen-libs is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530118" version="1" comment="xen-libs-32bit is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530119" version="1" comment="xen-tools is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530120" version="1" comment="xen-tools-domU is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594423" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530122" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594424" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530124" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594425" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530126" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594426" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594427" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530129" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594428" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594429" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594430" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594431" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594432" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594433" version="1" comment="kernel-default is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594434" version="1" comment="kernel-default-base is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594435" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550421" version="1" comment="kernel-default-man is &lt;4.4.121-92.85.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530135" version="1" comment="kernel-devel is &lt;4.4.121-92.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530136" version="1" comment="kernel-macros is &lt;4.4.121-92.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530137" version="1" comment="kernel-source is &lt;4.4.121-92.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594436" version="1" comment="kernel-syms is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530139" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594437" version="1" comment="galera-3-wsrep-provider is &lt;25.3.23-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594438" version="1" comment="libmariadb3 is &lt;3.0.3-1.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594439" version="1" comment="mariadb is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594440" version="1" comment="mariadb-client is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594441" version="1" comment="mariadb-errormessages is &lt;10.2.15-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594442" version="1" comment="mariadb-galera is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594443" version="1" comment="mariadb-tools is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594444" version="1" comment="ruby2.1-rubygem-mysql2 is &lt;0.4.10-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594445" version="1" comment="xtrabackup is &lt;2.4.10-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594446" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594447" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550426" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594448" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550428" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594449" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530142" version="1" comment="openssl-doc is &lt;1.0.2j-60.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594450" version="1" comment="nodejs6 is &lt;6.14.3-11.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519785" version="1" comment="ucode-intel is &lt;20180703-13.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594451" version="1" comment="perl is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545542" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594452" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519795" version="1" comment="perl-doc is &lt;5.18.2-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594453" version="1" comment="shadow is &lt;4.2.1-27.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530143" version="1" comment="xen is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530144" version="1" comment="xen-doc-html is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530145" version="1" comment="xen-libs is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530146" version="1" comment="xen-libs-32bit is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530147" version="1" comment="xen-tools is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530148" version="1" comment="xen-tools-domU is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594454" version="1" comment="ruby2.1-rubygem-sprockets-2_12 is &lt;2.12.5-1.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594455" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550458" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594456" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550460" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594457" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550462" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594458" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550464" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594459" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550466" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594460" version="1" comment="libndr0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550468" version="1" comment="libndr0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594461" version="1" comment="libnetapi0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550470" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594462" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550472" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594463" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550474" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594464" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550476" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594465" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550478" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594466" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550480" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594467" version="1" comment="libsamdb0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550482" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594468" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550484" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594469" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550486" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594470" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550488" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594471" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550490" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594472" version="1" comment="libwbclient0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550492" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594473" version="1" comment="samba is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594474" version="1" comment="samba-client is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550495" version="1" comment="samba-client-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530188" version="1" comment="samba-doc is &lt;4.4.2-38.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594475" version="1" comment="samba-libs is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550497" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594476" version="1" comment="samba-winbind is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550499" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594477" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594478" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594479" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594480" version="1" comment="clamav is &lt;0.100.1-33.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519961" version="1" comment="ucode-intel is &lt;20180807-13.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594481" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594482" version="1" comment="kernel-default is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594483" version="1" comment="kernel-default-base is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594484" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550504" version="1" comment="kernel-default-man is &lt;4.4.121-92.92.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530198" version="1" comment="kernel-devel is &lt;4.4.121-92.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530199" version="1" comment="kernel-macros is &lt;4.4.121-92.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530200" version="1" comment="kernel-source is &lt;4.4.121-92.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594485" version="1" comment="kernel-syms is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530202" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530203" version="1" comment="lttng-modules is &lt;2.7.1-9.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530204" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.121_92.92-9.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530205" version="1" comment="xen is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530206" version="1" comment="xen-doc-html is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530207" version="1" comment="xen-libs is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530208" version="1" comment="xen-libs-32bit is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530209" version="1" comment="xen-tools is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530210" version="1" comment="xen-tools-domU is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594486" version="1" comment="openssh is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594487" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594488" version="1" comment="openssh-fips is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594489" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594490" version="1" comment="grafana is &lt;4.5.1-1.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594491" version="1" comment="kafka is &lt;0.10.2.2-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594492" version="1" comment="logstash is &lt;2.4.1-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594493" version="1" comment="monasca-installer is &lt;20180608_12.47-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594494" version="1" comment="couchdb is &lt;1.7.2-2.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594495" version="1" comment="openstack-dashboard is &lt;10.0.6~dev4-4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594496" version="1" comment="openstack-heat is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594497" version="1" comment="openstack-heat-api is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594498" version="1" comment="openstack-heat-api-cfn is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594499" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594500" version="1" comment="openstack-heat-doc is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594501" version="1" comment="openstack-heat-engine is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594502" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594503" version="1" comment="openstack-heat-test is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594504" version="1" comment="openstack-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594505" version="1" comment="openstack-keystone is &lt;10.0.3~dev9-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594506" version="1" comment="openstack-keystone-doc is &lt;10.0.3~dev9-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594507" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594508" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594509" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594510" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594511" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594512" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594513" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594514" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594515" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594516" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594517" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594518" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594519" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594520" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594521" version="1" comment="python-heat is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594522" version="1" comment="python-horizon is &lt;10.0.6~dev4-4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594523" version="1" comment="python-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594524" version="1" comment="python-keystone is &lt;10.0.3~dev9-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594525" version="1" comment="python-nova is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594526" version="1" comment="python-os-vif is &lt;1.2.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594527" version="1" comment="crowbar is &lt;4.0+git.1528801103.f5708341-7.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594528" version="1" comment="crowbar-core is &lt;4.0+git.1534246408.3ab19c567-9.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594529" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1534246408.3ab19c567-9.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594530" version="1" comment="crowbar-devel is &lt;4.0+git.1528801103.f5708341-7.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594531" version="1" comment="crowbar-ha is &lt;4.0+git.1533750802.5768e73-4.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594532" version="1" comment="crowbar-openstack is &lt;4.0+git.1534254269.ce598a9fe-9.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594533" version="1" comment="crowbar-ui is &lt;1.1.0+git.1533844061.4ac8e723-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594534" version="1" comment="libvirt is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594535" version="1" comment="libvirt-client is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594536" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594537" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594538" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594539" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530221" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594540" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594541" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594542" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594543" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594544" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594545" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594546" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594547" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594548" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594549" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530232" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594550" version="1" comment="libvirt-doc is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594551" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594552" version="1" comment="libvirt-nss is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594553" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594554" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594555" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594556" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594557" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530241" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594558" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594559" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530244" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594560" version="1" comment="libzypp is &lt;16.17.20-27.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594561" version="1" comment="zypper is &lt;1.13.45-18.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530247" version="1" comment="zypper-log is &lt;1.13.45-18.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594562" version="1" comment="openslp is &lt;2.0.0-18.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545782" version="1" comment="openslp-32bit is &lt;2.0.0-18.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594563" version="1" comment="openslp-server is &lt;2.0.0-18.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594564" version="1" comment="nodejs6 is &lt;6.14.4-11.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594565" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530250" version="1" comment="apache2-doc is &lt;2.4.23-29.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594566" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594567" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594568" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594569" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594570" version="1" comment="gnutls is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594571" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594572" version="1" comment="libgnutls28 is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545809" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594573" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530260" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594574" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530262" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594575" version="1" comment="nodejs6 is &lt;6.12.2-11.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594576" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594577" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594578" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594579" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594580" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594581" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594582" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594583" version="1" comment="smt is &lt;3.0.37-52.23.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594584" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530266" version="1" comment="yast2-smt is &lt;3.0.14-17.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594585" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594586" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550545" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594587" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550547" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594588" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530269" version="1" comment="openssl-doc is &lt;1.0.2j-60.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594589" version="1" comment="qemu is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594590" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530272" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594591" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594592" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530275" version="1" comment="qemu-ipxe is &lt;1.0.0-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550562" version="1" comment="qemu-kvm is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594593" version="1" comment="qemu-lang is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550564" version="1" comment="qemu-s390 is &lt;2.6.2-41.43.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530278" version="1" comment="qemu-seabios is &lt;1.9.1-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530279" version="1" comment="qemu-sgabios is &lt;8-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594594" version="1" comment="qemu-tools is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530281" version="1" comment="qemu-vgabios is &lt;1.9.1-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530282" version="1" comment="qemu-x86 is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594595" version="1" comment="ghostscript is &lt;9.25-23.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594596" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594597" version="1" comment="openslp is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545819" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594598" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594599" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594600" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594601" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594602" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594603" version="1" comment="cups-filters is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594604" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594605" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594606" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594607" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594608" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594609" version="1" comment="libecpg6 is &lt;10.5-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594610" version="1" comment="libpq5 is &lt;10.5-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545829" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530291" version="1" comment="postgresql-init is &lt;10-17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594611" version="1" comment="postgresql10 is &lt;10.5-1.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594612" version="1" comment="postgresql10-contrib is &lt;10.5-1.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530293" version="1" comment="postgresql10-docs is &lt;10.5-1.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594613" version="1" comment="postgresql10-server is &lt;10.5-1.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594614" version="1" comment="kernel-default is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594615" version="1" comment="kernel-default-base is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594616" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550577" version="1" comment="kernel-default-man is &lt;4.4.121-92.95.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530298" version="1" comment="kernel-devel is &lt;4.4.121-92.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530299" version="1" comment="kernel-macros is &lt;4.4.121-92.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530300" version="1" comment="kernel-source is &lt;4.4.121-92.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594617" version="1" comment="kernel-syms is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530302" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;1-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530303" version="1" comment="lttng-modules is &lt;2.7.1-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530304" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.121_92.95-9.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594618" version="1" comment="binutils is &lt;2.31-9.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530305" version="1" comment="xen is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530306" version="1" comment="xen-doc-html is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530307" version="1" comment="xen-libs is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530308" version="1" comment="xen-libs-32bit is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530309" version="1" comment="xen-tools is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530310" version="1" comment="xen-tools-domU is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594619" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594620" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594621" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594622" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530312" version="1" comment="postgresql96-docs is &lt;9.6.10-3.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594623" version="1" comment="postgresql96-server is &lt;9.6.10-3.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594624" version="1" comment="clamav is &lt;0.100.2-33.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594625" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548354" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594626" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594627" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594628" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594629" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594630" version="1" comment="smt is &lt;3.0.38-52.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594631" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594632" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530318" version="1" comment="apache2-doc is &lt;2.4.23-29.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594633" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594634" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594635" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594636" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594637" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594638" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594639" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594640" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594641" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594642" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594643" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594644" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594645" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594646" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594647" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594648" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545901" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594649" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545903" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594650" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545905" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594651" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545907" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594652" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545909" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594653" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545912" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594654" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545914" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594655" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545917" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594656" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594657" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594658" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594659" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594660" version="1" comment="libsystemd0 is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550610" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594661" version="1" comment="libudev1 is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550612" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594662" version="1" comment="systemd is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550614" version="1" comment="systemd-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520358" version="1" comment="systemd-bash-completion is &lt;228-150.53.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594663" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594664" version="1" comment="udev is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594665" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594666" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550657" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594667" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550659" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594668" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530332" version="1" comment="openssl-doc is &lt;1.0.2j-60.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594669" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594670" version="1" comment="rpm is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545951" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594671" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594672" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594673" version="1" comment="postgresql94 is &lt;9.4.19-21.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594674" version="1" comment="postgresql94-contrib is &lt;9.4.19-21.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530335" version="1" comment="postgresql94-docs is &lt;9.4.19-21.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594675" version="1" comment="postgresql94-server is &lt;9.4.19-21.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594676" version="1" comment="openssh is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594677" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594678" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594679" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594680" version="1" comment="python-oslo.cache is &lt;1.14.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594681" version="1" comment="python-oslo.concurrency is &lt;3.14.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594682" version="1" comment="python-oslo.db is &lt;4.13.6-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594683" version="1" comment="python-oslo.log is &lt;3.16.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594684" version="1" comment="python-oslo.messaging is &lt;5.10.2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594685" version="1" comment="python-oslo.middleware is &lt;3.19.1-4.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594686" version="1" comment="python-oslo.serialization is &lt;2.13.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594687" version="1" comment="python-oslo.service is &lt;1.16.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594688" version="1" comment="python-oslo.utils is &lt;3.16.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594689" version="1" comment="python-oslo.versionedobjects is &lt;1.17.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594690" version="1" comment="python-oslo.vmware is &lt;2.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594691" version="1" comment="python-oslotest is &lt;2.10.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594692" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530339" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594693" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594694" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530342" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594695" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520402" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520403" version="1" comment="python-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594696" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521792" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520404" version="1" comment="python3-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594697" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530344" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594698" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530346" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594699" version="1" comment="ghostscript is &lt;9.26-23.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594700" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594701" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594702" version="1" comment="git-core is &lt;2.12.3-27.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530348" version="1" comment="git-doc is &lt;2.12.3-27.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594703" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594704" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594705" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594706" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594707" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594708" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594709" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594710" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594711" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594712" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594713" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594714" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594715" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594716" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594717" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594718" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594719" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594720" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594721" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546022" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594722" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546024" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594723" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546026" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594724" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546029" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594725" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546031" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594726" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546034" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594727" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594728" version="1" comment="qemu is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594729" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530367" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594730" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594731" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530370" version="1" comment="qemu-ipxe is &lt;1.0.0-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550697" version="1" comment="qemu-kvm is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594732" version="1" comment="qemu-lang is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550699" version="1" comment="qemu-s390 is &lt;2.6.2-41.46.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530373" version="1" comment="qemu-seabios is &lt;1.9.1-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530374" version="1" comment="qemu-sgabios is &lt;8-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594733" version="1" comment="qemu-tools is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530376" version="1" comment="qemu-vgabios is &lt;1.9.1-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530377" version="1" comment="qemu-x86 is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594734" version="1" comment="mailman is &lt;2.1.17-3.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594735" version="1" comment="ansible is &lt;2.2.3.0-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594736" version="1" comment="memcached is &lt;1.4.39-3.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594737" version="1" comment="python-paramiko is &lt;2.0.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594738" version="1" comment="erlang is &lt;17.5.6-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594739" version="1" comment="erlang-epmd is &lt;17.5.6-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594740" version="1" comment="python-Django is &lt;1.8.19-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552190" version="1" comment="apache2 is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536748" version="1" comment="apache2-doc is &lt;2.4.23-29.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552191" version="1" comment="apache2-example-pages is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552192" version="1" comment="apache2-prefork is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552193" version="1" comment="apache2-utils is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552194" version="1" comment="apache2-worker is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594741" version="1" comment="kernel-default is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594742" version="1" comment="kernel-default-base is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594743" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550973" version="1" comment="kernel-default-man is &lt;4.4.121-92.73.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530382" version="1" comment="kernel-devel is &lt;4.4.121-92.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530383" version="1" comment="kernel-macros is &lt;4.4.121-92.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530384" version="1" comment="kernel-source is &lt;4.4.121-92.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594744" version="1" comment="kernel-syms is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530386" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594745" version="1" comment="python-Pillow is &lt;2.8.1-4.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594746" version="1" comment="nodejs6 is &lt;6.14.1-11.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594747" version="1" comment="python-pysaml2 is &lt;4.0.2-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530387" version="1" comment="xen is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530388" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530389" version="1" comment="xen-libs is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530390" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530391" version="1" comment="xen-tools is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530392" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594748" version="1" comment="curl is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594749" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546204" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594750" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594751" version="1" comment="MozillaFirefox-devel is &lt;52.8.0esr-109.31.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594752" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594753" version="1" comment="qemu is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594754" version="1" comment="qemu-block-curl is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530396" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594755" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594756" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530399" version="1" comment="qemu-ipxe is &lt;1.0.0-41.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550993" version="1" comment="qemu-kvm is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594757" version="1" comment="qemu-lang is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550995" version="1" comment="qemu-s390 is &lt;2.6.2-41.40.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530402" version="1" comment="qemu-seabios is &lt;1.9.1-41.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530403" version="1" comment="qemu-sgabios is &lt;8-41.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594758" version="1" comment="qemu-tools is &lt;2.6.2-41.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530405" version="1" comment="qemu-vgabios is &lt;1.9.1-41.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530406" version="1" comment="qemu-x86 is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594759" version="1" comment="kernel-default is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594760" version="1" comment="kernel-default-base is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594761" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551000" version="1" comment="kernel-default-man is &lt;4.4.121-92.80.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530410" version="1" comment="kernel-devel is &lt;4.4.121-92.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530411" version="1" comment="kernel-macros is &lt;4.4.121-92.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530412" version="1" comment="kernel-source is &lt;4.4.121-92.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594762" version="1" comment="kernel-syms is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530414" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;1-3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594763" version="1" comment="bash is &lt;4.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520999" version="1" comment="bash-doc is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594764" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551006" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521003" version="1" comment="readline-doc is &lt;6.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594765" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594766" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546247" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594767" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594768" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594769" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594770" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594771" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594772" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594773" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594774" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594775" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594776" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594777" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594778" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594779" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594780" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594781" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594782" version="1" comment="python-nova is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594783" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594784" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594785" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594786" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594787" version="1" comment="freeradius-server is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594788" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594789" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594790" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594791" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594792" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594793" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594794" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594795" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594796" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594797" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594798" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546273" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594799" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594800" version="1" comment="atftp is &lt;0.7.0-160.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594801" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551008" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594802" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594803" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594804" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594805" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594806" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594807" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530432" version="1" comment="hostinfo is &lt;1.0.1-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521131" version="1" comment="supportutils is &lt;3.0-95.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594808" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594809" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551017" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594810" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551019" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594811" version="1" comment="openssl is &lt;1.0.2j-60.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530435" version="1" comment="openssl-doc is &lt;1.0.2j-60.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594812" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594813" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521138" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.1-2.41.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594814" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594815" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594816" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594817" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594818" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594819" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594820" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551030" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594821" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551032" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594822" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551034" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594823" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551036" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594824" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551038" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594825" version="1" comment="libndr0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551040" version="1" comment="libndr0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594826" version="1" comment="libnetapi0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551042" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594827" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551044" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594828" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551046" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594829" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551048" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594830" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551050" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594831" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551052" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594832" version="1" comment="libsamdb0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551054" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594833" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551056" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594834" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551058" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594835" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551060" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594836" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551062" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594837" version="1" comment="libwbclient0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551064" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594838" version="1" comment="samba is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594839" version="1" comment="samba-client is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551067" version="1" comment="samba-client-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530478" version="1" comment="samba-doc is &lt;4.4.2-38.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594840" version="1" comment="samba-libs is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551069" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594841" version="1" comment="samba-winbind is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551071" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530483" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-122.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530484" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-122.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594842" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594843" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594844" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594845" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521155" version="1" comment="ucode-intel is &lt;20190507-13.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594846" version="1" comment="libsystemd0 is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551073" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594847" version="1" comment="libudev-devel is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594848" version="1" comment="libudev1 is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551076" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594849" version="1" comment="systemd is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551078" version="1" comment="systemd-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521181" version="1" comment="systemd-bash-completion is &lt;228-150.66.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594850" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594851" version="1" comment="udev is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594852" version="1" comment="qemu is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594853" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530490" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594854" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594855" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530493" version="1" comment="qemu-ipxe is &lt;1.0.0-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551085" version="1" comment="qemu-kvm is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594856" version="1" comment="qemu-lang is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551087" version="1" comment="qemu-s390 is &lt;2.6.2-41.52.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530496" version="1" comment="qemu-seabios is &lt;1.9.1-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530497" version="1" comment="qemu-sgabios is &lt;8-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594857" version="1" comment="qemu-tools is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530499" version="1" comment="qemu-vgabios is &lt;1.9.1-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530500" version="1" comment="qemu-x86 is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594858" version="1" comment="kernel-default is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594859" version="1" comment="kernel-default-base is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594860" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551092" version="1" comment="kernel-default-man is &lt;4.4.121-92.109.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530504" version="1" comment="kernel-devel is &lt;4.4.121-92.109.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530505" version="1" comment="kernel-macros is &lt;4.4.121-92.109.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530506" version="1" comment="kernel-source is &lt;4.4.121-92.109.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594861" version="1" comment="kernel-syms is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530508" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;1-3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521192" version="1" comment="ucode-intel is &lt;20190514-13.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594862" version="1" comment="openssh is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594863" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594864" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594865" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594866" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530511" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594867" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530514" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594869" version="1" comment="libsystemd0 is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551099" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594870" version="1" comment="libudev1 is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551101" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594871" version="1" comment="systemd is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551103" version="1" comment="systemd-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521208" version="1" comment="systemd-bash-completion is &lt;228-150.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594872" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594873" version="1" comment="udev is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594874" version="1" comment="curl is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594875" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546375" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530515" version="1" comment="xen is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530516" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530517" version="1" comment="xen-libs is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530518" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530519" version="1" comment="xen-tools is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530520" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594876" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594877" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594878" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594879" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594880" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594881" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594882" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594883" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594884" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530526" version="1" comment="bind-doc is &lt;9.9.9P1-63.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594885" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594886" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594887" version="1" comment="libvirt is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594888" version="1" comment="libvirt-client is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594889" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594890" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594891" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594892" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530533" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594893" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594894" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594895" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594896" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594897" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594898" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594899" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594900" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594901" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594902" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530544" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594903" version="1" comment="libvirt-doc is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594904" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594905" version="1" comment="libvirt-nss is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594906" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548575" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594907" version="1" comment="python is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548577" version="1" comment="python-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594908" version="1" comment="python-base is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548579" version="1" comment="python-base-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594909" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594910" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594911" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530551" version="1" comment="python-doc is &lt;2.7.13-28.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530552" version="1" comment="python-doc-pdf is &lt;2.7.13-28.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594912" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594913" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594914" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594915" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594916" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594917" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594918" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594919" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.11-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594920" version="1" comment="libmariadb3 is &lt;3.0.7-1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594921" version="1" comment="mariadb is &lt;10.2.22-10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594922" version="1" comment="mariadb-client is &lt;10.2.22-10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594923" version="1" comment="mariadb-errormessages is &lt;10.2.22-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594924" version="1" comment="mariadb-galera is &lt;10.2.22-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594925" version="1" comment="mariadb-tools is &lt;10.2.22-10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594926" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1553079189.3bf8922-1.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594927" version="1" comment="crowbar is &lt;4.0+git.1551088848.823bcaa3-7.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594928" version="1" comment="crowbar-core is &lt;4.0+git.1556285635.ab602dd4d-9.46.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594929" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1556285635.ab602dd4d-9.46.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594930" version="1" comment="crowbar-devel is &lt;4.0+git.1551088848.823bcaa3-7.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594931" version="1" comment="crowbar-ha is &lt;4.0+git.1556181005.47c643d-4.46.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594932" version="1" comment="crowbar-openstack is &lt;4.0+git.1554887450.ff7c30c1c-9.51.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594933" version="1" comment="galera-python-clustercheck is &lt;0.0+git.1506329536.8f5878c-1.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594934" version="1" comment="openstack-ceilometer is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594935" version="1" comment="openstack-ceilometer-agent-central is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594936" version="1" comment="openstack-ceilometer-agent-compute is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594937" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594938" version="1" comment="openstack-ceilometer-agent-notification is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594939" version="1" comment="openstack-ceilometer-api is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594940" version="1" comment="openstack-ceilometer-collector is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594941" version="1" comment="openstack-ceilometer-doc is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594942" version="1" comment="openstack-ceilometer-polling is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594943" version="1" comment="openstack-heat-gbp is &lt;5.1.1~dev1-2.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594944" version="1" comment="python-PyKMIP is &lt;0.5.0-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594945" version="1" comment="python-ceilometer is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594946" version="1" comment="python-heat-gbp is &lt;5.1.1~dev1-2.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594947" version="1" comment="python-pysaml2 is &lt;4.0.2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594948" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.0-7.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594949" version="1" comment="gvim is &lt;7.4.326-17.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594950" version="1" comment="vim is &lt;7.4.326-17.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521429" version="1" comment="vim-data is &lt;7.4.326-17.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594951" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594952" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521432" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.5-2.32.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594953" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594954" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594955" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594956" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594957" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594958" version="1" comment="ruby2.1-rubygem-activejob-4_2 is &lt;4.2.9-3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594959" version="1" comment="openssh is &lt;7.2p2-74.42.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594960" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594961" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594962" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594963" version="1" comment="kernel-default is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594964" version="1" comment="kernel-default-base is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594965" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551139" version="1" comment="kernel-default-man is &lt;4.4.121-92.114.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530561" version="1" comment="kernel-devel is &lt;4.4.121-92.114.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530562" version="1" comment="kernel-macros is &lt;4.4.121-92.114.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530563" version="1" comment="kernel-source is &lt;4.4.121-92.114.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594966" version="1" comment="kernel-syms is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530565" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530065" version="1" comment="python-Jinja2 is &lt;2.8-22.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594967" version="1" comment="dbus-1 is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594968" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594969" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546450" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594970" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521494" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594971" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594972" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551144" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594973" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551146" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594974" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594975" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551149" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594976" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594977" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594978" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594979" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594980" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551155" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594981" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551157" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594982" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548610" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594983" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551158" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551159" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551160" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594984" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546464" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594985" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530571" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594986" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530573" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594987" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594988" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594989" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594990" version="1" comment="dnsmasq-utils is &lt;2.78-18.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521548" version="1" comment="glib2-lang is &lt;2.48.2-12.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594991" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594992" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551163" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594993" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551165" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594994" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551167" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594995" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551169" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594996" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551171" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594997" version="1" comment="python-Pillow is &lt;2.8.1-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594998" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594999" version="1" comment="libpq5 is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546510" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595000" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595001" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530576" version="1" comment="postgresql10-docs is &lt;10.9-1.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595002" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595003" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595004" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595005" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595006" version="1" comment="kernel-default is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595007" version="1" comment="kernel-default-base is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595008" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551175" version="1" comment="kernel-default-man is &lt;4.4.121-92.117.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530584" version="1" comment="kernel-devel is &lt;4.4.121-92.117.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530585" version="1" comment="kernel-macros is &lt;4.4.121-92.117.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530586" version="1" comment="kernel-source is &lt;4.4.121-92.117.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595009" version="1" comment="kernel-syms is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530588" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521943" version="1" comment="glib2-lang is &lt;2.48.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595010" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595011" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551179" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595012" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551181" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595013" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551183" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595014" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551185" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595015" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551187" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595016" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595017" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595018" version="1" comment="MozillaFirefox-devel is &lt;60.8.0-109.83.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595019" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595020" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548634" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595021" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548636" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595022" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548638" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595023" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548640" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595024" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548642" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595025" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548644" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595026" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548647" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595027" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595028" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595029" version="1" comment="polkit is &lt;0.113-5.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595030" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521994" version="1" comment="ucode-intel is &lt;20190618-13.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595031" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530594" version="1" comment="bzip2-doc is &lt;1.0.6-30.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595032" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548656" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595033" version="1" comment="glibc is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551190" version="1" comment="glibc-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595034" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551192" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530599" version="1" comment="glibc-html is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530600" version="1" comment="glibc-i18ndata is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530601" version="1" comment="glibc-info is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595035" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551194" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595036" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551196" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595037" version="1" comment="nscd is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530607" version="1" comment="xen is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530608" version="1" comment="xen-doc-html is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530609" version="1" comment="xen-libs is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530610" version="1" comment="xen-libs-32bit is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530611" version="1" comment="xen-tools is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530612" version="1" comment="xen-tools-domU is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595038" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530613" version="1" comment="bzip2-doc is &lt;1.0.6-30.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595039" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548659" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595040" version="1" comment="python-requests is &lt;2.11.1-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595041" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595042" version="1" comment="polkit is &lt;0.113-5.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595043" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595044" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595045" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595046" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595047" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595048" version="1" comment="python-Django is &lt;1.8.19-3.12.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595049" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548669" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595050" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595051" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595052" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595053" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595054" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595055" version="1" comment="python3 is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595056" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595057" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595058" version="1" comment="python-Twisted is &lt;15.2.1-9.5.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595059" version="1" comment="evince is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595060" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522054" version="1" comment="evince-lang is &lt;3.20.2-6.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595061" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595062" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595063" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595064" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595065" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595066" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595067" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595068" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595069" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595070" version="1" comment="squid is &lt;3.5.21-26.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595071" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548681" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595072" version="1" comment="python is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548683" version="1" comment="python-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595073" version="1" comment="python-base is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548685" version="1" comment="python-base-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595074" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595075" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595076" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530626" version="1" comment="python-doc is &lt;2.7.13-28.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530627" version="1" comment="python-doc-pdf is &lt;2.7.13-28.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595077" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595078" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595079" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595080" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595081" version="1" comment="libvirt is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595082" version="1" comment="libvirt-client is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595083" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595084" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595085" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595086" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530636" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595087" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595088" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595089" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595090" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595091" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595092" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595093" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595094" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595095" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595096" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530647" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595097" version="1" comment="libvirt-doc is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595098" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595099" version="1" comment="libvirt-nss is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595100" version="1" comment="qemu is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595101" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530653" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595102" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595103" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530656" version="1" comment="qemu-ipxe is &lt;1.0.0-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551234" version="1" comment="qemu-kvm is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595104" version="1" comment="qemu-lang is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551236" version="1" comment="qemu-s390 is &lt;2.6.2-41.55.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530659" version="1" comment="qemu-seabios is &lt;1.9.1-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530660" version="1" comment="qemu-sgabios is &lt;8-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595105" version="1" comment="qemu-tools is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530662" version="1" comment="qemu-vgabios is &lt;1.9.1-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530663" version="1" comment="qemu-x86 is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595106" version="1" comment="postgresql94 is &lt;9.4.24-21.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595107" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530666" version="1" comment="postgresql94-docs is &lt;9.4.24-21.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530667" version="1" comment="postgresql94-plperl is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530668" version="1" comment="postgresql94-plpython is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530669" version="1" comment="postgresql94-pltcl is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595108" version="1" comment="postgresql94-server is &lt;9.4.24-21.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595109" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595110" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530673" version="1" comment="postgresql96-docs is &lt;9.6.15-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595111" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595112" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595113" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595114" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595115" version="1" comment="python-Django is &lt;1.8.19-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595116" version="1" comment="nodejs6 is &lt;6.17.0-11.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595117" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595118" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595119" version="1" comment="perl is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548722" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595120" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522099" version="1" comment="perl-doc is &lt;5.18.2-12.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595121" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595122" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595123" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595124" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595125" version="1" comment="zypper is &lt;1.13.54-18.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522104" version="1" comment="zypper-log is &lt;1.13.54-18.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595126" version="1" comment="kernel-default is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595127" version="1" comment="kernel-default-base is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595128" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551246" version="1" comment="kernel-default-man is &lt;4.4.121-92.120.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530682" version="1" comment="kernel-devel is &lt;4.4.121-92.120.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530683" version="1" comment="kernel-macros is &lt;4.4.121-92.120.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530684" version="1" comment="kernel-source is &lt;4.4.121-92.120.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595129" version="1" comment="kernel-syms is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530686" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530687" version="1" comment="libspice-server1 is &lt;0.12.7-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595130" version="1" comment="python-Pillow is &lt;2.8.1-4.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595131" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530689" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595132" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595133" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530692" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595134" version="1" comment="curl is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595135" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548731" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522116" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-2.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595138" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595139" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595140" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595142" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595143" version="1" comment="python-SQLAlchemy is &lt;1.0.14-4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595144" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530699" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595145" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530701" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595146" version="1" comment="python-Django is &lt;1.8.19-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595147" version="1" comment="ibus is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595148" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595149" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522148" version="1" comment="ibus-lang is &lt;1.5.13-15.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595150" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595151" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595152" version="1" comment="python-urllib3 is &lt;1.16-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595153" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595154" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551262" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595155" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551264" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595156" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530708" version="1" comment="openssl-doc is &lt;1.0.2j-60.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595157" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595158" version="1" comment="python3 is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595159" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595160" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595161" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595162" version="1" comment="MozillaFirefox-devel is &lt;60.9.0-109.86.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595163" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595164" version="1" comment="python-Twisted is &lt;15.2.1-9.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595165" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595166" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595167" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595168" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595169" version="1" comment="ghostscript is &lt;9.27-23.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595170" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595171" version="1" comment="curl is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595172" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546551" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595173" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551268" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519875" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595174" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595175" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548753" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595176" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548755" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595177" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595178" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595179" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-109.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595180" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595181" version="1" comment="binutils is &lt;2.32-9.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595182" version="1" comment="binutils-devel is &lt;2.32-9.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595183" version="1" comment="sudo is &lt;1.8.10p3-10.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595184" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595185" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595186" version="1" comment="crowbar-core is &lt;4.0+git.1570463621.40b11cd48-9.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595187" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1570463621.40b11cd48-9.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595188" version="1" comment="crowbar-openstack is &lt;4.0+git.1569429513.e7016b2b6-9.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595189" version="1" comment="grafana is &lt;4.6.5-1.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595190" version="1" comment="novnc is &lt;1.0.0-12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595191" version="1" comment="openstack-keystone is &lt;10.0.3~dev9-7.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595192" version="1" comment="openstack-keystone-doc is &lt;10.0.3~dev9-7.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595193" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595194" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595195" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595196" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595197" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595198" version="1" comment="openstack-neutron-lbaas is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595199" version="1" comment="openstack-neutron-lbaas-agent is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595200" version="1" comment="openstack-neutron-lbaas-doc is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595201" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595202" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595203" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595204" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595205" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595206" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595207" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595208" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595209" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595210" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595211" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595212" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595213" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595214" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595215" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595216" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595217" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595218" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595219" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595220" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595221" version="1" comment="openstack-tempest is &lt;12.2.1~a0~dev177-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595222" version="1" comment="openstack-tempest-test is &lt;12.2.1~a0~dev177-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595223" version="1" comment="python-keystone is &lt;10.0.3~dev9-7.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595224" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595225" version="1" comment="python-neutron-lbaas is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595226" version="1" comment="python-nova is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595227" version="1" comment="python-pysaml2 is &lt;4.0.2-3.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595228" version="1" comment="python-tempest is &lt;12.2.1~a0~dev177-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595229" version="1" comment="python-urllib3 is &lt;1.16-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595230" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-5.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595231" version="1" comment="ruby2.1-rubygem-easy_diff is &lt;1.0.0-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595232" version="1" comment="rubygem-chef is &lt;10.32.2-5.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595233" version="1" comment="sleshammer-aarch64 is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595234" version="1" comment="sleshammer-ppc64le is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595235" version="1" comment="sleshammer-s390x is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595236" version="1" comment="sleshammer-x86_64 is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595237" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595238" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595239" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530720" version="1" comment="xen is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530721" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530722" version="1" comment="xen-libs is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530723" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530724" version="1" comment="xen-tools is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530725" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595240" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595241" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-109.95.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595242" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595243" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595244" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551276" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595245" version="1" comment="libdcerpc0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551278" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595246" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551280" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595247" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551282" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595248" version="1" comment="libndr-standard0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551284" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595249" version="1" comment="libndr0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551286" version="1" comment="libndr0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595250" version="1" comment="libnetapi0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551288" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595251" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551290" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595252" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551292" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595253" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551294" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595254" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551296" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595255" version="1" comment="libsamba-util0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551298" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595256" version="1" comment="libsamdb0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551300" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595257" version="1" comment="libsmbclient0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551302" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595258" version="1" comment="libsmbconf0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551304" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595259" version="1" comment="libsmbldap0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551306" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595260" version="1" comment="libtevent-util0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551308" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595261" version="1" comment="libwbclient0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551310" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595262" version="1" comment="samba is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595263" version="1" comment="samba-client is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551313" version="1" comment="samba-client-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530767" version="1" comment="samba-doc is &lt;4.4.2-38.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595264" version="1" comment="samba-libs is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551315" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595265" version="1" comment="samba-winbind is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551317" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595266" version="1" comment="gdb is &lt;8.3.1-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595267" version="1" comment="ruby2.1-rubygem-haml is &lt;4.0.6-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595268" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548820" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595269" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551319" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522370" version="1" comment="ucode-intel is &lt;20191112-13.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595270" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595271" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548828" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595272" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595273" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548831" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595274" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595275" version="1" comment="ghostscript is &lt;9.27-23.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595276" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595277" version="1" comment="kernel-default is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595278" version="1" comment="kernel-default-base is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595279" version="1" comment="kernel-default-devel is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551323" version="1" comment="kernel-default-man is &lt;4.4.121-92.125.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530776" version="1" comment="kernel-devel is &lt;4.4.121-92.125.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530777" version="1" comment="kernel-macros is &lt;4.4.121-92.125.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530778" version="1" comment="kernel-source is &lt;4.4.121-92.125.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595280" version="1" comment="kernel-syms is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530780" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522383" version="1" comment="ucode-intel is &lt;20191112a-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525259" version="1" comment="python-ecdsa is &lt;0.13.3-5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595281" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548839" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595282" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595283" version="1" comment="cups is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595284" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595285" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548844" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595286" version="1" comment="clamav is &lt;0.100.3-33.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595287" version="1" comment="mailman is &lt;2.1.17-3.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595288" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595289" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595290" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595291" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595292" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595293" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595294" version="1" comment="clamav is &lt;0.100.3-33.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595295" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595296" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522424" version="1" comment="strongswan-doc is &lt;5.1.3-26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595297" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595298" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595299" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595300" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1560518045.ad7dc6d-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595301" version="1" comment="crowbar-core is &lt;4.0+git.1573109906.0f62e9503-9.57.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595302" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1573109906.0f62e9503-9.57.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595303" version="1" comment="crowbar-openstack is &lt;4.0+git.1573038068.1e32b3205-9.62.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595304" version="1" comment="crowbar-ui is &lt;1.1.0+git.1547500033.d0fb2bf2-4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595305" version="1" comment="galera-3-wsrep-provider is &lt;25.3.25-11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595306" version="1" comment="libmariadb3 is &lt;3.1.2-1.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595307" version="1" comment="mariadb is &lt;10.2.25-13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595308" version="1" comment="mariadb-client is &lt;10.2.25-13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595309" version="1" comment="mariadb-errormessages is &lt;10.2.25-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595310" version="1" comment="mariadb-galera is &lt;10.2.25-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595311" version="1" comment="mariadb-tools is &lt;10.2.25-13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595312" version="1" comment="openstack-dashboard-theme-SUSE is &lt;2016.2-5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595313" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1515995585.81ed236-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595314" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595315" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595316" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595317" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595318" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595319" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595320" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595321" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595322" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595323" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595324" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595325" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595326" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595327" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595328" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595329" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595330" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595331" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595332" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595333" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595334" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595335" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595336" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595337" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595338" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595339" version="1" comment="patterns-cloud-admin is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595340" version="1" comment="patterns-cloud-compute is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595341" version="1" comment="patterns-cloud-controller is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595342" version="1" comment="patterns-cloud-network is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595343" version="1" comment="patterns-cloud-user is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595344" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595345" version="1" comment="python-nova is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595346" version="1" comment="python-oslo.messaging is &lt;5.10.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595347" version="1" comment="python-oslo.utils is &lt;3.16.1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595348" version="1" comment="python-pysaml2 is &lt;4.0.2-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595349" version="1" comment="haproxy is &lt;1.6.11-11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595350" version="1" comment="git-core is &lt;2.12.3-27.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530788" version="1" comment="git-doc is &lt;2.12.3-27.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595351" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595352" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-109.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595353" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595354" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595355" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595356" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595357" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595358" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546575" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595359" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546577" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595360" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546579" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595361" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546581" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595362" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546583" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595363" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546585" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595364" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546588" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595365" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595366" version="1" comment="libblkid1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551327" version="1" comment="libblkid1-32bit is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595367" version="1" comment="libfdisk1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595368" version="1" comment="libmount1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551330" version="1" comment="libmount1-32bit is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595369" version="1" comment="libsmartcols1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595370" version="1" comment="libuuid1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551333" version="1" comment="libuuid1-32bit is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595371" version="1" comment="python-libmount is &lt;2.28-44.18.38 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595372" version="1" comment="util-linux is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530805" version="1" comment="util-linux-lang is &lt;2.28-44.18.18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595373" version="1" comment="util-linux-systemd is &lt;2.28-44.18.25 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595374" version="1" comment="uuidd is &lt;2.28-44.18.25 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595375" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595376" version="1" comment="nodejs6 is &lt;6.16.0-11.21.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595377" version="1" comment="libsystemd0 is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551339" version="1" comment="libsystemd0-32bit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595378" version="1" comment="libudev1 is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551341" version="1" comment="libudev1-32bit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595379" version="1" comment="systemd is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551343" version="1" comment="systemd-32bit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521627" version="1" comment="systemd-bash-completion is &lt;228-150.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595380" version="1" comment="systemd-sysvinit is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595381" version="1" comment="udev is &lt;228-150.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595382" version="1" comment="kernel-default is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595383" version="1" comment="kernel-default-base is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595384" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551349" version="1" comment="kernel-default-man is &lt;4.4.121-92.101.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530811" version="1" comment="kernel-devel is &lt;4.4.121-92.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530812" version="1" comment="kernel-macros is &lt;4.4.121-92.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530813" version="1" comment="kernel-source is &lt;4.4.121-92.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595385" version="1" comment="kernel-syms is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530815" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595386" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595387" version="1" comment="procps is &lt;3.3.9-11.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595388" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521632" version="1" comment="kernel-firmware is &lt;20170530-21.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521633" version="1" comment="ucode-amd is &lt;20170530-21.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595389" version="1" comment="python-amqp is &lt;1.4.9-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595390" version="1" comment="python-oslo.messaging is &lt;5.10.2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595391" version="1" comment="python-ovs is &lt;2.5.0-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595392" version="1" comment="python-paramiko is &lt;2.0.9-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595393" version="1" comment="python-psql2mysql is &lt;0.5.0+git.1539592188.13e5d0f-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595394" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548897" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595395" version="1" comment="python is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548899" version="1" comment="python-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595396" version="1" comment="python-base is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548901" version="1" comment="python-base-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595397" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595398" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530819" version="1" comment="python-doc is &lt;2.7.13-28.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530820" version="1" comment="python-doc-pdf is &lt;2.7.13-28.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595399" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595400" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595401" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595402" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595403" version="1" comment="python-Django is &lt;1.8.19-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595404" version="1" comment="qemu is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595405" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530825" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595406" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595407" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530828" version="1" comment="qemu-ipxe is &lt;1.0.0-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551355" version="1" comment="qemu-kvm is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595408" version="1" comment="qemu-lang is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551357" version="1" comment="qemu-s390 is &lt;2.6.2-41.49.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530831" version="1" comment="qemu-seabios is &lt;1.9.1-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530832" version="1" comment="qemu-sgabios is &lt;8-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595409" version="1" comment="qemu-tools is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530834" version="1" comment="qemu-vgabios is &lt;1.9.1-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530835" version="1" comment="qemu-x86 is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595410" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595411" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595412" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595413" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595414" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595415" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521656" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.6-2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595416" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595417" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595418" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595419" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595420" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595421" version="1" comment="libvirt is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595422" version="1" comment="libvirt-client is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595423" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595424" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595425" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595426" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530846" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595427" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595428" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595429" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595430" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595431" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595432" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595433" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595434" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595435" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595436" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530857" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595437" version="1" comment="libvirt-doc is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595438" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595439" version="1" comment="libvirt-nss is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595440" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595441" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595442" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595443" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595444" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595445" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595446" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595447" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595448" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595449" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595450" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595451" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530866" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595452" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595453" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530869" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595454" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530871" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595455" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530873" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595456" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546671" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595457" version="1" comment="openstack-cinder is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595458" version="1" comment="openstack-cinder-api is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595459" version="1" comment="openstack-cinder-backup is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595460" version="1" comment="openstack-cinder-doc is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595461" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595462" version="1" comment="openstack-cinder-volume is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595463" version="1" comment="openstack-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595464" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595465" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595466" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595467" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595468" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595469" version="1" comment="openstack-neutron-lbaas is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595470" version="1" comment="openstack-neutron-lbaas-agent is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595471" version="1" comment="openstack-neutron-lbaas-doc is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595472" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595473" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595474" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595475" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595476" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595477" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595478" version="1" comment="python-cinder is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595479" version="1" comment="python-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595480" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595481" version="1" comment="python-neutron-lbaas is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595482" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595483" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521698" version="1" comment="ucode-intel is &lt;20190312-13.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595484" version="1" comment="ntp is &lt;4.2.8p13-85.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595485" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595486" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595487" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551392" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595488" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551394" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595489" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530876" version="1" comment="openssl-doc is &lt;1.0.2j-60.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595490" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595491" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595492" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595493" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595494" version="1" comment="sssd is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551401" version="1" comment="sssd-32bit is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595495" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595496" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595497" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595498" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595499" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595500" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595501" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595502" version="1" comment="nodejs6 is &lt;6.17.0-11.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595503" version="1" comment="kernel-default is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595504" version="1" comment="kernel-default-base is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595505" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551412" version="1" comment="kernel-default-man is &lt;4.4.121-92.104.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530880" version="1" comment="kernel-devel is &lt;4.4.121-92.104.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530881" version="1" comment="kernel-macros is &lt;4.4.121-92.104.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530882" version="1" comment="kernel-source is &lt;4.4.121-92.104.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595506" version="1" comment="kernel-syms is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530884" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595507" version="1" comment="bash is &lt;4.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521745" version="1" comment="bash-doc is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595508" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551416" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521749" version="1" comment="readline-doc is &lt;6.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595509" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595510" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595511" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595512" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530887" version="1" comment="apache2-doc is &lt;2.4.23-29.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595513" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595514" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595515" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595516" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595517" version="1" comment="clamav is &lt;0.100.3-33.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595518" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595519" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595520" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595521" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595522" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548951" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595523" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595524" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530896" version="1" comment="xen is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530897" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530898" version="1" comment="xen-libs is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530899" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530900" version="1" comment="xen-tools is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530901" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595525" version="1" comment="wget is &lt;1.14-21.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595526" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595527" version="1" comment="python3 is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595528" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595529" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595530" version="1" comment="curl is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595531" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546718" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595532" version="1" comment="cups is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595533" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595534" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548956" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595535" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548963" version="1" comment="pam_radius-32bit is &lt;1.3.16-239.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595536" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595537" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530910" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.1-2.50.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595538" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595539" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595540" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595541" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595542" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595543" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595544" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595545" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595546" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595547" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595548" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595549" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548971" version="1" comment="libicu52_1-32bit is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595550" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595551" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551431" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595552" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595553" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595554" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530930" version="1" comment="openldap2-doc is &lt;2.4.41-18.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595555" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595556" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595557" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530934" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.2-2.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595558" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595559" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595560" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595561" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595562" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595563" version="1" comment="ghostscript is &lt;9.52-23.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595564" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595565" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595566" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595567" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-109.119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595568" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595569" version="1" comment="squid is &lt;3.5.21-26.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595570" version="1" comment="kernel-default is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595571" version="1" comment="kernel-default-base is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595572" version="1" comment="kernel-default-devel is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551447" version="1" comment="kernel-default-man is &lt;4.4.121-92.129.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530950" version="1" comment="kernel-devel is &lt;4.4.121-92.129.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530951" version="1" comment="kernel-macros is &lt;4.4.121-92.129.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530952" version="1" comment="kernel-source is &lt;4.4.121-92.129.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595573" version="1" comment="kernel-syms is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530954" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595574" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530956" version="1" comment="apache2-doc is &lt;2.4.23-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595575" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595576" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595577" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595578" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595579" version="1" comment="python-PyYAML is &lt;5.1.2-26.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595580" version="1" comment="git-core is &lt;2.26.2-27.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530962" version="1" comment="git-doc is &lt;2.26.2-27.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595581" version="1" comment="mailman is &lt;2.1.17-3.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530964" version="1" comment="tomcat is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530965" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530966" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530967" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530968" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530969" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530970" version="1" comment="tomcat-lib is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530971" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530972" version="1" comment="tomcat-webapps is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595582" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548995" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595583" version="1" comment="python is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548997" version="1" comment="python-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595584" version="1" comment="python-base is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548999" version="1" comment="python-base-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595585" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595586" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595587" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530982" version="1" comment="python-doc is &lt;2.7.17-28.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530983" version="1" comment="python-doc-pdf is &lt;2.7.17-28.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595588" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595589" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530986" version="1" comment="python-rpm-macros is &lt;20200207.5feb6c1-3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595590" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595591" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530989" version="1" comment="shared-python-startup is &lt;0.1-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595592" version="1" comment="qemu is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595593" version="1" comment="qemu-block-curl is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530992" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595594" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595595" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530995" version="1" comment="qemu-ipxe is &lt;1.0.0-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551458" version="1" comment="qemu-kvm is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595596" version="1" comment="qemu-lang is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551460" version="1" comment="qemu-s390 is &lt;2.6.2-41.59.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530998" version="1" comment="qemu-seabios is &lt;1.9.1-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530999" version="1" comment="qemu-sgabios is &lt;8-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595597" version="1" comment="qemu-tools is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531001" version="1" comment="qemu-vgabios is &lt;1.9.1-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531002" version="1" comment="qemu-x86 is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595598" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595599" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595600" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549008" version="1" comment="libexif12-32bit is &lt;0.6.22-8.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595601" version="1" comment="gvim is &lt;7.4.326-17.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595602" version="1" comment="vim is &lt;7.4.326-17.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531009" version="1" comment="vim-data is &lt;7.4.326-17.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595603" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595604" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-109.123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595605" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595606" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595607" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595608" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595609" version="1" comment="yast2-ruby-bindings is &lt;3.1.53-9.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595610" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595611" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595612" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595613" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595614" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595615" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595616" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531024" version="1" comment="ucode-intel is &lt;20200602-13.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595617" version="1" comment="kernel-default is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595618" version="1" comment="kernel-default-base is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595619" version="1" comment="kernel-default-devel is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551483" version="1" comment="kernel-default-man is &lt;4.4.121-92.135.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531028" version="1" comment="kernel-devel is &lt;4.4.121-92.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531029" version="1" comment="kernel-macros is &lt;4.4.121-92.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531030" version="1" comment="kernel-source is &lt;4.4.121-92.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595620" version="1" comment="kernel-syms is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531032" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595621" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595622" version="1" comment="libadns1 is &lt;1.4-103.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595623" version="1" comment="nodejs6 is &lt;6.17.1-11.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595624" version="1" comment="perl is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551488" version="1" comment="perl-32bit is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595625" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531037" version="1" comment="perl-doc is &lt;5.18.2-12.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595626" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531039" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595627" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595628" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531042" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595629" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531044" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595630" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531046" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595631" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595632" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595633" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595634" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595635" version="1" comment="curl is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595636" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551499" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531054" version="1" comment="tomcat is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531055" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531056" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531057" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531058" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531059" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531060" version="1" comment="tomcat-lib is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531061" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531062" version="1" comment="tomcat-webapps is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525269" version="1" comment="python3-certifi is &lt;2018.4.16-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525270" version="1" comment="python3-chardet is &lt;3.0.4-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531063" version="1" comment="python3-requests is &lt;2.20.1-5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525271" version="1" comment="python3-urllib3 is &lt;1.22-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595637" version="1" comment="mutt is &lt;1.10.1-55.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595638" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595639" version="1" comment="ntp is &lt;4.2.8p15-88.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595640" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595641" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551505" version="1" comment="libfreebl3-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595642" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551507" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595643" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551509" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595644" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551511" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595645" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551513" version="1" comment="mozilla-nspr-32bit is &lt;4.25-19.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595646" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551515" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595647" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595648" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551519" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595649" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595650" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551522" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595651" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595652" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595653" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531090" version="1" comment="openldap2-doc is &lt;2.4.41-18.71.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595654" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595655" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595656" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595657" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595658" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595659" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595660" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531098" version="1" comment="bind-doc is &lt;9.9.9P1-63.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595661" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551534" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595662" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595663" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595664" version="1" comment="squid is &lt;3.5.21-26.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595665" version="1" comment="mailman is &lt;2.1.17-3.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595666" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595667" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531107" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.3-2.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595668" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595669" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595670" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595671" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595672" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595673" version="1" comment="grub2 is &lt;2.02~beta2-115.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531114" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551547" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-115.49.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531115" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-115.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531116" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-115.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531117" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531118" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595674" version="1" comment="ghostscript is &lt;9.52-23.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595675" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595676" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595677" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595678" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595679" version="1" comment="libX11-6 is &lt;1.6.2-12.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551554" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531126" version="1" comment="libX11-data is &lt;1.6.2-12.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595680" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551556" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595681" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551558" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595682" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551560" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595683" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551562" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595684" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551564" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595685" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595686" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551567" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595687" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595688" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551570" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595689" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551572" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595690" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595691" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551575" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595692" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595693" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551578" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595694" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595695" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551581" version="1" comment="libxcb1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595696" version="1" comment="kernel-default is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595697" version="1" comment="kernel-default-base is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595698" version="1" comment="kernel-default-devel is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551585" version="1" comment="kernel-default-man is &lt;4.4.121-92.138.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531157" version="1" comment="kernel-devel is &lt;4.4.121-92.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531158" version="1" comment="kernel-macros is &lt;4.4.121-92.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531159" version="1" comment="kernel-source is &lt;4.4.121-92.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595699" version="1" comment="kernel-syms is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531161" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595700" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595701" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531162" version="1" comment="python-ipaddress is &lt;1.0.18-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595702" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595703" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595704" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551590" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531167" version="1" comment="libX11-data is &lt;1.6.2-12.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595705" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551592" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595706" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551594" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595707" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595708" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531174" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.4-2.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595709" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595710" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595711" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595712" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595713" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531180" version="1" comment="xen is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531181" version="1" comment="xen-doc-html is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531182" version="1" comment="xen-libs is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531183" version="1" comment="xen-libs-32bit is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531184" version="1" comment="xen-tools is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531185" version="1" comment="xen-tools-domU is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595714" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595715" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595716" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595717" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595718" version="1" comment="grub2 is &lt;2.02~beta2-115.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531191" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551607" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-115.56.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531192" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-115.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531193" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-115.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531194" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531195" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595719" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551609" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595720" version="1" comment="libdcerpc0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551611" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595721" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551613" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595722" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551615" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595723" version="1" comment="libndr-standard0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551617" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595724" version="1" comment="libndr0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551619" version="1" comment="libndr0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595725" version="1" comment="libnetapi0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551621" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595726" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551623" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595727" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551625" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595728" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551627" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595729" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551629" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595730" version="1" comment="libsamba-util0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551631" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595731" version="1" comment="libsamdb0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551633" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595732" version="1" comment="libsmbclient0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551635" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595733" version="1" comment="libsmbconf0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551637" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595734" version="1" comment="libsmbldap0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551639" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595735" version="1" comment="libtevent-util0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551641" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595736" version="1" comment="libwbclient0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551643" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595737" version="1" comment="samba is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595738" version="1" comment="samba-client is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551646" version="1" comment="samba-client-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531235" version="1" comment="samba-doc is &lt;4.4.2-38.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595739" version="1" comment="samba-libs is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551648" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595740" version="1" comment="samba-winbind is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551650" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595741" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595742" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595743" version="1" comment="freeradius-server is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595744" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595745" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595746" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595747" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595748" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595749" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595750" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595751" version="1" comment="freeradius-server-python is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595752" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595753" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595754" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531254" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595755" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.0-30.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531256" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595756" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595757" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595758" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531260" version="1" comment="apache2-doc is &lt;2.4.23-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595759" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595760" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595761" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595762" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595763" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531266" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595764" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531268" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595765" version="1" comment="nodejs6 is &lt;6.17.1-11.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595766" version="1" comment="squid is &lt;3.5.21-26.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595767" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551674" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531272" version="1" comment="libX11-data is &lt;1.6.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595768" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551676" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595769" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531276" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595770" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595771" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531279" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595772" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595773" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595774" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595775" version="1" comment="kernel-default is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595776" version="1" comment="kernel-default-base is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595777" version="1" comment="kernel-default-devel is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551685" version="1" comment="kernel-default-man is &lt;4.4.121-92.141.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531286" version="1" comment="kernel-devel is &lt;4.4.121-92.141.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531287" version="1" comment="kernel-macros is &lt;4.4.121-92.141.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531288" version="1" comment="kernel-source is &lt;4.4.121-92.141.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595778" version="1" comment="kernel-syms is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531290" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595779" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595780" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595781" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595782" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531293" version="1" comment="tomcat is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531294" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531295" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531296" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531297" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531298" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531299" version="1" comment="tomcat-lib is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531300" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531301" version="1" comment="tomcat-webapps is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537694" version="1" comment="shim is &lt;15+git47-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595783" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595784" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595785" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525275" version="1" comment="python-pip is &lt;10.0.1-11.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595786" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595787" version="1" comment="python3 is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595788" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595789" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595790" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595791" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551694" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595792" version="1" comment="libdcerpc0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551696" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595793" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551698" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595794" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551700" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595795" version="1" comment="libndr-standard0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551702" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595796" version="1" comment="libndr0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551704" version="1" comment="libndr0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595797" version="1" comment="libnetapi0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551706" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595798" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551708" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595799" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551710" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595800" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551712" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595801" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551714" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595802" version="1" comment="libsamba-util0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551716" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595803" version="1" comment="libsamdb0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551718" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595804" version="1" comment="libsmbclient0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551720" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595805" version="1" comment="libsmbconf0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551722" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595806" version="1" comment="libsmbldap0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551724" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595807" version="1" comment="libtevent-util0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551726" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595808" version="1" comment="libwbclient0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551728" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595809" version="1" comment="samba is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595810" version="1" comment="samba-client is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551731" version="1" comment="samba-client-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531347" version="1" comment="samba-doc is &lt;4.4.2-38.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595811" version="1" comment="samba-libs is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551733" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595812" version="1" comment="samba-winbind is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551735" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595813" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595814" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595815" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595816" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595817" version="1" comment="libQt5Core5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595818" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595819" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595820" version="1" comment="libQt5Network5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595821" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595822" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595823" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595824" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595825" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595826" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595827" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595828" version="1" comment="libQt5Test5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595829" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595830" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531370" version="1" comment="xen is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531371" version="1" comment="xen-doc-html is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531372" version="1" comment="xen-libs is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531373" version="1" comment="xen-libs-32bit is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531374" version="1" comment="xen-tools is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531375" version="1" comment="xen-tools-domU is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595831" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595832" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595833" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595834" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595835" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595836" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595837" version="1" comment="tigervnc is &lt;1.6.0-27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595838" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595839" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551763" version="1" comment="libproxy1-32bit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595840" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551765" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595841" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595842" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595843" version="1" comment="ansible is &lt;2.2.3.0-17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595844" version="1" comment="crowbar-core is &lt;4.0+git.1600767499.0615a418f-9.69.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595845" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1600767499.0615a418f-9.69.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595846" version="1" comment="crowbar-openstack is &lt;4.0+git.1599037255.25b759234-9.74.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595847" version="1" comment="grafana is &lt;6.7.4-1.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595848" version="1" comment="grafana-natel-discrete-panel is &lt;0.0.9-1.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595849" version="1" comment="openstack-aodh is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595850" version="1" comment="openstack-aodh-api is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595851" version="1" comment="openstack-aodh-doc is &lt;3.0.5~dev2-2.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595852" version="1" comment="openstack-aodh-evaluator is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595853" version="1" comment="openstack-aodh-expirer is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595854" version="1" comment="openstack-aodh-listener is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595855" version="1" comment="openstack-aodh-notifier is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595856" version="1" comment="openstack-barbican is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595857" version="1" comment="openstack-barbican-api is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595858" version="1" comment="openstack-barbican-doc is &lt;3.0.1~dev9-2.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595859" version="1" comment="openstack-barbican-keystone-listener is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595860" version="1" comment="openstack-barbican-retry is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595861" version="1" comment="openstack-barbican-worker is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595862" version="1" comment="openstack-cinder is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595863" version="1" comment="openstack-cinder-api is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595864" version="1" comment="openstack-cinder-backup is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595865" version="1" comment="openstack-cinder-doc is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595866" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595867" version="1" comment="openstack-cinder-volume is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595868" version="1" comment="openstack-gnocchi is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595869" version="1" comment="openstack-gnocchi-api is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595870" version="1" comment="openstack-gnocchi-carbonara is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595871" version="1" comment="openstack-gnocchi-indexer-sqlalchemy is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595872" version="1" comment="openstack-gnocchi-metricd is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595873" version="1" comment="openstack-gnocchi-statsd is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595874" version="1" comment="openstack-heat is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595875" version="1" comment="openstack-heat-api is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595876" version="1" comment="openstack-heat-api-cfn is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595877" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595878" version="1" comment="openstack-heat-doc is &lt;7.0.7~dev10-5.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595879" version="1" comment="openstack-heat-engine is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595880" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595881" version="1" comment="openstack-heat-test is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595882" version="1" comment="openstack-ironic is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595883" version="1" comment="openstack-ironic-api is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595884" version="1" comment="openstack-ironic-conductor is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595885" version="1" comment="openstack-ironic-doc is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595886" version="1" comment="openstack-magnum is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595887" version="1" comment="openstack-magnum-api is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595888" version="1" comment="openstack-magnum-conductor is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595889" version="1" comment="openstack-magnum-doc is &lt;3.3.2~dev7-14.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595890" version="1" comment="openstack-manila is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595891" version="1" comment="openstack-manila-api is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595892" version="1" comment="openstack-manila-data is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595893" version="1" comment="openstack-manila-doc is &lt;3.0.1~dev30-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595894" version="1" comment="openstack-manila-scheduler is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595895" version="1" comment="openstack-manila-share is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595896" version="1" comment="openstack-monasca-agent is &lt;1.10.1~dev4-13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595897" version="1" comment="openstack-murano is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595898" version="1" comment="openstack-murano-api is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595899" version="1" comment="openstack-murano-doc is &lt;3.0.1~dev21-7.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595900" version="1" comment="openstack-murano-engine is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595901" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595902" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595903" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595904" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595905" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595906" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595907" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595908" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595909" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595910" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595911" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595912" version="1" comment="openstack-neutron-vpn-agent is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595913" version="1" comment="openstack-neutron-vpnaas is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595914" version="1" comment="openstack-neutron-vpnaas-doc is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595915" version="1" comment="openstack-neutron-vyatta-agent is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595916" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595917" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595918" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595919" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595920" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595921" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595922" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595923" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595924" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595925" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595926" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595927" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595928" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595929" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595930" version="1" comment="openstack-sahara is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595931" version="1" comment="openstack-sahara-api is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595932" version="1" comment="openstack-sahara-doc is &lt;5.0.2~dev3-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595933" version="1" comment="openstack-sahara-engine is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595934" version="1" comment="python-Pillow is &lt;2.8.1-4.17.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595935" version="1" comment="python-aodh is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595936" version="1" comment="python-barbican is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595937" version="1" comment="python-cinder is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595938" version="1" comment="python-gnocchi is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595939" version="1" comment="python-heat is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595940" version="1" comment="python-ironic is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595941" version="1" comment="python-magnum is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595942" version="1" comment="python-manila is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595943" version="1" comment="python-monasca-agent is &lt;1.10.1~dev4-13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595944" version="1" comment="python-murano is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595945" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595946" version="1" comment="python-neutron-vpnaas is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595947" version="1" comment="python-nova is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595948" version="1" comment="python-sahara is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595949" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.3-7.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595950" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595951" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595952" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551770" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595953" version="1" comment="glibc is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551772" version="1" comment="glibc-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595954" version="1" comment="glibc-devel is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551774" version="1" comment="glibc-devel-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531397" version="1" comment="glibc-html is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531398" version="1" comment="glibc-i18ndata is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531399" version="1" comment="glibc-info is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595955" version="1" comment="glibc-locale is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551776" version="1" comment="glibc-locale-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595956" version="1" comment="glibc-profile is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551778" version="1" comment="glibc-profile-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595957" version="1" comment="nscd is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595958" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595959" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595960" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595961" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551784" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595962" version="1" comment="libdcerpc0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551786" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595963" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551788" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595964" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551790" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595965" version="1" comment="libndr-standard0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551792" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595966" version="1" comment="libndr0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551794" version="1" comment="libndr0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595967" version="1" comment="libnetapi0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551796" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595968" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551798" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595969" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551800" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595970" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551802" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595971" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551804" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595972" version="1" comment="libsamba-util0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551806" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595973" version="1" comment="libsamdb0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551808" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595974" version="1" comment="libsmbclient0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551810" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595975" version="1" comment="libsmbconf0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551812" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595976" version="1" comment="libsmbldap0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551814" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595977" version="1" comment="libtevent-util0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551816" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595978" version="1" comment="libwbclient0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551818" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595979" version="1" comment="samba is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595980" version="1" comment="samba-client is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551821" version="1" comment="samba-client-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531447" version="1" comment="samba-doc is &lt;4.4.2-38.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595981" version="1" comment="samba-libs is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551823" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595982" version="1" comment="samba-winbind is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551825" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595983" version="1" comment="crowbar-core is &lt;4.0+git.1578392992.fabfd186c-9.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595984" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1578392992.fabfd186c-9.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595985" version="1" comment="crowbar-openstack is &lt;4.0+git.1579171175.d53ab6363-9.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595986" version="1" comment="openstack-neutron-fwaas is &lt;9.0.2~dev5-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595987" version="1" comment="openstack-neutron-fwaas-doc is &lt;9.0.2~dev5-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595988" version="1" comment="python-neutron-fwaas is &lt;9.0.2~dev5-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595989" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.1-7.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595990" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531453" version="1" comment="ovmf is &lt;2015+git1462940744.321151f-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531454" version="1" comment="ovmf-tools is &lt;2015+git1462940744.321151f-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531455" version="1" comment="qemu-ovmf-x86_64 is &lt;2015+git1462940744.321151f-19.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595991" version="1" comment="libvirt is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595992" version="1" comment="libvirt-client is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595993" version="1" comment="libvirt-daemon is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595994" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595995" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595996" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531462" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595997" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595998" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595999" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596000" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596001" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596002" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596003" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596004" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596005" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596006" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531473" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596007" version="1" comment="libvirt-doc is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596008" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596009" version="1" comment="libvirt-nss is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531477" version="1" comment="apache-commons-httpclient is &lt;3.1-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596010" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596011" version="1" comment="libQt5Core5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596012" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596013" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596014" version="1" comment="libQt5Network5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596015" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596016" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596017" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596018" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596019" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596020" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596021" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596022" version="1" comment="libQt5Test5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596023" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596024" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596025" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596026" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596027" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596028" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596029" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551866" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596030" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551868" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596031" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551870" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596032" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551872" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596033" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551874" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596034" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551876" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596035" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551878" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531511" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596036" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551880" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531514" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531515" version="1" comment="libquadmath0-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596037" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551882" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596038" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596039" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525349" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531521" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596040" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551886" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531524" version="1" comment="ucode-intel is &lt;20201027-13.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596041" version="1" comment="libsystemd0 is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551888" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596042" version="1" comment="libudev-devel is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596043" version="1" comment="libudev1 is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551891" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596044" version="1" comment="systemd is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551893" version="1" comment="systemd-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522625" version="1" comment="systemd-bash-completion is &lt;228-150.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596045" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596046" version="1" comment="udev is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596047" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596048" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596049" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596050" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596051" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551901" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596052" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596053" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596054" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531535" version="1" comment="openldap2-doc is &lt;2.4.41-18.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596055" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596056" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596057" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596058" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531540" version="1" comment="xen is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531541" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531542" version="1" comment="xen-libs is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531543" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531544" version="1" comment="xen-tools is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531545" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596059" version="1" comment="libecpg6 is &lt;12.4-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596060" version="1" comment="libpq5 is &lt;12.4-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551911" version="1" comment="libpq5-32bit is &lt;12.4-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531549" version="1" comment="postgresql is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531550" version="1" comment="postgresql-contrib is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531551" version="1" comment="postgresql-docs is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531552" version="1" comment="postgresql-plperl is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531553" version="1" comment="postgresql-plpython is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531554" version="1" comment="postgresql-pltcl is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531555" version="1" comment="postgresql-server is &lt;12.0.1-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596061" version="1" comment="postgresql10 is &lt;10.14-4.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596062" version="1" comment="postgresql10-contrib is &lt;10.14-4.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531558" version="1" comment="postgresql10-docs is &lt;10.14-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596063" version="1" comment="postgresql10-plperl is &lt;10.14-4.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596064" version="1" comment="postgresql10-plpython is &lt;10.14-4.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596065" version="1" comment="postgresql10-pltcl is &lt;10.14-4.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596066" version="1" comment="postgresql10-server is &lt;10.14-4.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596067" version="1" comment="postgresql94 is &lt;9.4.26-24.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596068" version="1" comment="postgresql94-contrib is &lt;9.4.26-24.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531565" version="1" comment="postgresql94-docs is &lt;9.4.26-24.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596069" version="1" comment="postgresql94-plperl is &lt;9.4.26-24.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596070" version="1" comment="postgresql94-plpython is &lt;9.4.26-24.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596071" version="1" comment="postgresql94-pltcl is &lt;9.4.26-24.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596072" version="1" comment="postgresql94-server is &lt;9.4.26-24.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596073" version="1" comment="postgresql96 is &lt;9.6.19-6.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596074" version="1" comment="postgresql96-contrib is &lt;9.6.19-6.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531572" version="1" comment="postgresql96-docs is &lt;9.6.19-6.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596075" version="1" comment="postgresql96-plperl is &lt;9.6.19-6.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596076" version="1" comment="postgresql96-plpython is &lt;9.6.19-6.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596077" version="1" comment="postgresql96-pltcl is &lt;9.6.19-6.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596078" version="1" comment="postgresql96-server is &lt;9.6.19-6.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596079" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531578" version="1" comment="kernel-firmware is &lt;20170530-21.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531579" version="1" comment="ucode-amd is &lt;20170530-21.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596080" version="1" comment="libzypp is &lt;16.21.2-27.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596081" version="1" comment="libzypp-devel is &lt;16.21.2-27.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596082" version="1" comment="zypper is &lt;1.13.57-18.46.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531583" version="1" comment="zypper-log is &lt;1.13.57-18.46.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596083" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551935" version="1" comment="krb5-32bit is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596084" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596085" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596086" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596087" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596088" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596089" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596090" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596091" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531594" version="1" comment="postgresql10-docs is &lt;10.15-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596092" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596093" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596094" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596095" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596096" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596097" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531601" version="1" comment="postgresql96-docs is &lt;9.6.20-6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596098" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596099" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596100" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596101" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596102" version="1" comment="kernel-default is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596103" version="1" comment="kernel-default-base is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596104" version="1" comment="kernel-default-devel is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551957" version="1" comment="kernel-default-man is &lt;4.4.121-92.146.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531609" version="1" comment="kernel-devel is &lt;4.4.121-92.146.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531610" version="1" comment="kernel-macros is &lt;4.4.121-92.146.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531611" version="1" comment="kernel-source is &lt;4.4.121-92.146.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596105" version="1" comment="kernel-syms is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531613" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531614" version="1" comment="ucode-intel is &lt;20201118-13.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596106" version="1" comment="bluez is &lt;5.13-5.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596107" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596108" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596109" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596110" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596111" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596112" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596113" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596114" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009524556" version="1" comment="python-setuptools is &lt;40.6.2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525277" version="1" comment="python3-setuptools is &lt;40.6.2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596115" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596116" version="1" comment="python3 is &lt;3.4.10-25.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596117" version="1" comment="python3-base is &lt;3.4.10-25.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596118" version="1" comment="python3-curses is &lt;3.4.10-25.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596119" version="1" comment="python3-devel is &lt;3.4.10-25.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525278" version="1" comment="python-pip is &lt;10.0.1-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596120" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531630" version="1" comment="gdm-lang is &lt;3.10.0.1-54.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531631" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596121" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596122" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596123" version="1" comment="crowbar-openstack is &lt;4.0+git.1604938545.30c10db18-9.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596124" version="1" comment="grafana is &lt;6.7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596125" version="1" comment="influxdb is &lt;1.2.4-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596126" version="1" comment="python-urllib3 is &lt;1.16-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596127" version="1" comment="mariadb is &lt;10.2.36-19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596128" version="1" comment="mariadb-client is &lt;10.2.36-19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596129" version="1" comment="mariadb-errormessages is &lt;10.2.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596130" version="1" comment="mariadb-galera is &lt;10.2.36-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596131" version="1" comment="mariadb-tools is &lt;10.2.36-19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596132" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596133" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596134" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596135" version="1" comment="libpq5 is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551980" version="1" comment="libpq5-32bit is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596136" version="1" comment="mutt is &lt;1.10.1-55.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531640" version="1" comment="xen is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531641" version="1" comment="xen-doc-html is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531642" version="1" comment="xen-libs is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531643" version="1" comment="xen-libs-32bit is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531644" version="1" comment="xen-tools is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531645" version="1" comment="xen-tools-domU is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596137" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596138" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551984" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596139" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551986" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596140" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531652" version="1" comment="openssl-doc is &lt;1.0.2j-60.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596141" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551989" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596142" version="1" comment="python is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551991" version="1" comment="python-32bit is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596143" version="1" comment="python-base is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551993" version="1" comment="python-base-32bit is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596144" version="1" comment="python-curses is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596145" version="1" comment="python-demo is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596146" version="1" comment="python-devel is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531662" version="1" comment="python-doc is &lt;2.7.17-28.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531663" version="1" comment="python-doc-pdf is &lt;2.7.17-28.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596147" version="1" comment="python-gdbm is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596148" version="1" comment="python-idle is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596149" version="1" comment="python-tk is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596150" version="1" comment="python-xml is &lt;2.7.17-28.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596151" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596152" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-109.106.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596153" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596154" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596155" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596156" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596157" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596158" version="1" comment="libspice-controller0 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596159" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596160" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531676" version="1" comment="libspice-server1 is &lt;0.12.7-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596161" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596162" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596163" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531680" version="1" comment="xen is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531681" version="1" comment="xen-doc-html is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531682" version="1" comment="xen-libs is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531683" version="1" comment="xen-libs-32bit is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531684" version="1" comment="xen-tools is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531685" version="1" comment="xen-tools-domU is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596164" version="1" comment="clamav is &lt;0.103.0-33.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596165" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552013" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596166" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552015" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596167" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596168" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552018" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596169" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552020" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596170" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552022" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596171" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552024" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596172" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549031" version="1" comment="libasan5-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596173" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549033" version="1" comment="libatomic1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596174" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549035" version="1" comment="libgcc_s1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596175" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549037" version="1" comment="libgfortran5-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596176" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549039" version="1" comment="libgo14-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596177" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549041" version="1" comment="libgomp1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596178" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549043" version="1" comment="libitm1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531714" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531715" version="1" comment="libquadmath0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531716" version="1" comment="libquadmath0-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596179" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549045" version="1" comment="libstdc++6-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596180" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531720" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596181" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549048" version="1" comment="libubsan1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596182" version="1" comment="sudo is &lt;1.8.10p3-10.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596183" version="1" comment="dnsmasq-utils is &lt;2.78-18.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596184" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531725" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596185" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596186" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531728" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596187" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549062" version="1" comment="libexif12-32bit is &lt;0.6.21-8.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596188" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596189" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552028" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596190" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552030" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596191" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531735" version="1" comment="openssl-doc is &lt;1.0.2j-60.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596192" version="1" comment="nodejs6 is &lt;6.17.1-11.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596193" version="1" comment="ppp is &lt;2.4.7-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538002" version="1" comment="ovmf is &lt;2015+git1462940744.321151f-19.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538003" version="1" comment="ovmf-tools is &lt;2015+git1462940744.321151f-19.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538004" version="1" comment="qemu-ovmf-x86_64 is &lt;2015+git1462940744.321151f-19.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596194" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596195" version="1" comment="python3 is &lt;3.4.10-25.39.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596196" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596197" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596198" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596199" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549071" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596200" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596201" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596202" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596203" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596204" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531744" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596205" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-38.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596206" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531747" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596207" version="1" comment="rsyslog is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596208" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596209" version="1" comment="rsyslog-doc is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596210" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596211" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596212" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596213" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596214" version="1" comment="rsyslog-module-relp is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596215" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596216" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596217" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531749" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596218" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531751" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531752" version="1" comment="log4j is &lt;1.2.15-126.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596219" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596220" version="1" comment="python-PyYAML is &lt;5.1.2-26.9.4 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522744" version="1" comment="python-asn1crypto is &lt;0.24.0-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525286" version="1" comment="python-jsonpatch is &lt;1.1-10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525287" version="1" comment="python-jsonpointer is &lt;1.0-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522745" version="1" comment="python-packaging is &lt;17.1-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522746" version="1" comment="python-pyparsing is &lt;2.2.0-7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522747" version="1" comment="python3-asn1crypto is &lt;0.24.0-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525297" version="1" comment="python3-jsonpointer is &lt;1.0-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522748" version="1" comment="python3-packaging is &lt;17.1-2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522749" version="1" comment="python3-pyparsing is &lt;2.2.0-7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596221" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549088" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596222" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596223" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531756" version="1" comment="postgresql96-docs is &lt;9.6.17-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596224" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596225" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596226" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596227" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596228" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596229" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596230" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596231" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596232" version="1" comment="squid is &lt;3.5.21-26.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596233" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596234" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-109.101.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596235" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596236" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596237" version="1" comment="libpq5 is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549104" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596238" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596239" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531766" version="1" comment="postgresql10-docs is &lt;10.12-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596240" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596241" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596242" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596243" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596244" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596245" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-109.110.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596246" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531774" version="1" comment="tomcat is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531775" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531776" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531777" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531778" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531779" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531780" version="1" comment="tomcat-lib is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531781" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531782" version="1" comment="tomcat-webapps is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596247" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596248" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596249" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596250" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596251" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596252" version="1" comment="crowbar-core is &lt;4.0+git.1574788924.e4a6aeb0c-9.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596253" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1574788924.e4a6aeb0c-9.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596254" version="1" comment="crowbar-openstack is &lt;4.0+git.1574869671.9c7bade2d-9.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596255" version="1" comment="grafana-monasca-ui-drilldown is &lt;1.5.5~dev3-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596256" version="1" comment="openstack-horizon-plugin-monasca-ui is &lt;1.5.5~dev3-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596257" version="1" comment="openstack-monasca-api is &lt;1.7.1~dev18-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596258" version="1" comment="openstack-monasca-log-api is &lt;1.4.3~dev3-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596259" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596260" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596261" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596262" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596263" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596264" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596265" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596266" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596267" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596268" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596269" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596270" version="1" comment="python-horizon-plugin-monasca-ui is &lt;1.5.5~dev3-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596271" version="1" comment="python-monasca-api is &lt;1.7.1~dev18-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596272" version="1" comment="python-monasca-log-api is &lt;1.4.3~dev3-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596273" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596274" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596275" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596276" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596277" version="1" comment="mariadb is &lt;10.2.31-16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596278" version="1" comment="mariadb-client is &lt;10.2.31-16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596279" version="1" comment="mariadb-errormessages is &lt;10.2.31-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596280" version="1" comment="mariadb-galera is &lt;10.2.31-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596281" version="1" comment="mariadb-tools is &lt;10.2.31-16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596282" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596283" version="1" comment="python3 is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596284" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596285" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596286" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596287" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549127" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596288" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549129" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596289" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549131" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596290" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549133" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596291" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549135" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596292" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549138" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596293" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549140" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596294" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549143" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596295" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596296" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596297" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552051" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596298" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596299" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-109.113.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596300" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596301" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596302" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596303" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-109.116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596304" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596305" version="1" comment="git-core is &lt;2.26.0-27.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531809" version="1" comment="git-doc is &lt;2.26.0-27.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596306" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596307" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596308" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596309" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531814" version="1" comment="perl-CGI is &lt;4.38-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531815" version="1" comment="fwupdate is &lt;0.5-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531816" version="1" comment="fwupdate-efi is &lt;0.5-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531817" version="1" comment="libfwup0 is &lt;0.5-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596310" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531818" version="1" comment="xen is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531819" version="1" comment="xen-doc-html is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531820" version="1" comment="xen-libs is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531821" version="1" comment="xen-libs-32bit is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531822" version="1" comment="xen-tools is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531823" version="1" comment="xen-tools-domU is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596311" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596312" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596313" version="1" comment="dnsmasq-utils is &lt;2.78-18.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596314" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596315" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552055" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596316" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596317" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596318" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596319" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525303" version="1" comment="python-httplib2 is &lt;0.19.0-7.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596320" version="1" comment="libwebpmux1 is &lt;0.4.3-4.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596321" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531833" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596322" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596323" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531836" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596324" version="1" comment="python-Pillow is &lt;2.8.1-4.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596325" version="1" comment="crowbar-openstack is &lt;4.0+git.1616146720.44daffca0-9.81.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596326" version="1" comment="grafana is &lt;6.7.4-1.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596327" version="1" comment="kibana is &lt;4.6.6-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596328" version="1" comment="monasca-installer is &lt;20180608_12.47-16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596329" version="1" comment="python-Django is &lt;1.8.19-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596330" version="1" comment="python-py is &lt;1.8.1-11.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596331" version="1" comment="ruby2.1-rubygem-activerecord-session_store is &lt;0.1.2-3.4.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596332" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596333" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596334" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596335" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525305" version="1" comment="python-PyJWT is &lt;1.5.3-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596336" version="1" comment="ruby2.1-rubygem-nokogiri is &lt;1.6.1-5.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596337" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596338" version="1" comment="libpq5 is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552068" version="1" comment="libpq5-32bit is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531844" version="1" comment="postgresql is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531845" version="1" comment="postgresql-contrib is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531846" version="1" comment="postgresql-docs is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531847" version="1" comment="postgresql-plperl is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531848" version="1" comment="postgresql-plpython is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531849" version="1" comment="postgresql-pltcl is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531850" version="1" comment="postgresql-server is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596339" version="1" comment="openssh is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596340" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596341" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596342" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009560169" version="1" comment="python-py is &lt;1.8.1-11.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525304" version="1" comment="python-rsa is &lt;3.1.4-12.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596343" version="1" comment="sudo is &lt;1.8.10p3-10.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596344" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596345" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596346" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627134" version="1" comment="python-Pillow is &lt;2.8.1-4.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628227" version="1" comment="python-PyYAML is &lt;5.3.1-28.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596347" version="1" comment="openvswitch is &lt;2.5.11-25.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531860" version="1" comment="openvswitch-dpdk is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531861" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596348" version="1" comment="openvswitch-switch is &lt;2.5.11-25.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596349" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531864" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596350" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531866" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596351" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596352" version="1" comment="python3 is &lt;3.4.10-25.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596353" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596354" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596355" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596356" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552086" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596357" version="1" comment="python is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552088" version="1" comment="python-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596358" version="1" comment="python-base is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552090" version="1" comment="python-base-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596359" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596360" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596361" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531881" version="1" comment="python-doc is &lt;2.7.17-28.64.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531882" version="1" comment="python-doc-pdf is &lt;2.7.17-28.64.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596362" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596363" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596364" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596365" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596366" version="1" comment="kernel-default is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596367" version="1" comment="kernel-default-base is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596368" version="1" comment="kernel-default-devel is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552101" version="1" comment="kernel-default-man is &lt;4.4.121-92.149.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531890" version="1" comment="kernel-devel is &lt;4.4.121-92.149.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531891" version="1" comment="kernel-macros is &lt;4.4.121-92.149.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531892" version="1" comment="kernel-source is &lt;4.4.121-92.149.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596369" version="1" comment="kernel-syms is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531894" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596370" version="1" comment="openvswitch is &lt;2.5.11-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531896" version="1" comment="openvswitch-dpdk is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531897" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596371" version="1" comment="openvswitch-switch is &lt;2.5.11-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596372" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596373" version="1" comment="python-urllib3 is &lt;1.16-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596374" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552107" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596375" version="1" comment="screen is &lt;4.0.4-23.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596376" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596377" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531905" version="1" comment="bind-doc is &lt;9.9.9P1-63.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596378" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552112" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596379" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596380" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531910" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596381" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596382" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531913" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596383" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596384" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596385" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596386" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596387" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596388" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530079" version="1" comment="python-Jinja2 is &lt;2.8-22.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596389" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531921" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596390" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531923" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531924" version="1" comment="perl-XML-Twig is &lt;3.44-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596391" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596392" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596393" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596394" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596395" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596396" version="1" comment="grub2 is &lt;2.02-115.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531931" version="1" comment="grub2-i386-pc is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552129" version="1" comment="grub2-s390x-emu is &lt;2.02-115.59.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531932" version="1" comment="grub2-snapper-plugin is &lt;2.02-115.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531933" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-115.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531934" version="1" comment="grub2-x86_64-efi is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531935" version="1" comment="grub2-x86_64-xen is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596397" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552131" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596398" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596399" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596400" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531941" version="1" comment="openldap2-doc is &lt;2.4.41-18.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596401" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596402" version="1" comment="kernel-default is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596403" version="1" comment="kernel-default-base is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596404" version="1" comment="kernel-default-devel is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552139" version="1" comment="kernel-default-man is &lt;4.4.121-92.152.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531946" version="1" comment="kernel-devel is &lt;4.4.121-92.152.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531947" version="1" comment="kernel-macros is &lt;4.4.121-92.152.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531948" version="1" comment="kernel-source is &lt;4.4.121-92.152.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596405" version="1" comment="kernel-syms is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531950" version="1" comment="kgraft-patch-4_4_121-92_152-default is &lt;1-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596406" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596407" version="1" comment="git is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596408" version="1" comment="git-core is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596409" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596410" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531956" version="1" comment="git-doc is &lt;2.26.2-27.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596411" version="1" comment="git-email is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596412" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596413" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596414" version="1" comment="git-web is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596415" version="1" comment="gitk is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596416" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552152" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596417" version="1" comment="python is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552154" version="1" comment="python-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596418" version="1" comment="python-base is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552156" version="1" comment="python-base-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596419" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596420" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596421" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531971" version="1" comment="python-doc is &lt;2.7.18-28.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531972" version="1" comment="python-doc-pdf is &lt;2.7.18-28.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596422" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596423" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596424" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596425" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596426" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596427" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596428" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531980" version="1" comment="glib2-lang is &lt;2.48.2-12.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596429" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596430" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552169" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596431" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552171" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596432" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552173" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596433" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552175" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596434" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552177" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531992" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596435" version="1" comment="sudo is &lt;1.8.10p3-10.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596436" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596437" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596438" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596439" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552183" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596440" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552185" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596441" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532002" version="1" comment="openssl-doc is &lt;1.0.2j-60.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596442" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596443" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596444" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549156" version="1" comment="bind is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549157" version="1" comment="bind-chrootenv is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532008" version="1" comment="bind-doc is &lt;9.9.9P1-49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549158" version="1" comment="bind-libs is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547150" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549159" version="1" comment="bind-utils is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549160" version="1" comment="libjasper1 is &lt;1.900.14-181.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547174" version="1" comment="libjasper1-32bit is &lt;1.900.14-181.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549161" version="1" comment="ghostscript is &lt;9.15-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549162" version="1" comment="ghostscript-x11 is &lt;9.15-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549163" version="1" comment="libX11-6 is &lt;1.6.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549164" version="1" comment="libX11-6-32bit is &lt;1.6.2-8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517486" version="1" comment="libX11-data is &lt;1.6.2-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549165" version="1" comment="libX11-xcb1 is &lt;1.6.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549166" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549167" version="1" comment="libXfixes3 is &lt;5.0.1-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549168" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549169" version="1" comment="libXi6 is &lt;1.7.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549170" version="1" comment="libXi6-32bit is &lt;1.7.4-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549171" version="1" comment="libXrender1 is &lt;0.9.8-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549172" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549173" version="1" comment="libXtst6 is &lt;1.2.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549174" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549175" version="1" comment="libXv1 is &lt;1.0.10-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549176" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549177" version="1" comment="libXvMC1 is &lt;1.0.8-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549178" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549179" version="1" comment="python3 is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549180" version="1" comment="python3-base is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549181" version="1" comment="python3-curses is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549182" version="1" comment="libtcnative-1-0 is &lt;1.1.34-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549183" version="1" comment="qemu is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532028" version="1" comment="qemu-arm is &lt;2.6.2-31.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549184" version="1" comment="qemu-block-curl is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549185" version="1" comment="qemu-block-rbd is &lt;2.6.2-31.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549186" version="1" comment="qemu-block-ssh is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549187" version="1" comment="qemu-guest-agent is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517506" version="1" comment="qemu-ipxe is &lt;1.0.0-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549188" version="1" comment="qemu-kvm is &lt;2.6.2-31.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549189" version="1" comment="qemu-lang is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549190" version="1" comment="qemu-ppc is &lt;2.6.2-31.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549191" version="1" comment="qemu-s390 is &lt;2.6.2-31.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517508" version="1" comment="qemu-seabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517509" version="1" comment="qemu-sgabios is &lt;8-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549192" version="1" comment="qemu-tools is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517511" version="1" comment="qemu-vgabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517512" version="1" comment="qemu-x86 is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549193" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549194" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549195" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549196" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549197" version="1" comment="sudo is &lt;1.8.10p3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549198" version="1" comment="tar is &lt;1.27.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516651" version="1" comment="tar-lang is &lt;1.27.1-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549199" version="1" comment="libarchive13 is &lt;3.1.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549200" version="1" comment="dovecot22 is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549201" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549202" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549203" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549204" version="1" comment="libmysqlclient18 is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547200" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549205" version="1" comment="mariadb is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549206" version="1" comment="mariadb-client is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549207" version="1" comment="mariadb-errormessages is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549208" version="1" comment="mariadb-tools is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549209" version="1" comment="gvim is &lt;7.4.326-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549210" version="1" comment="vim is &lt;7.4.326-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516672" version="1" comment="vim-data is &lt;7.4.326-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549211" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549212" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549213" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549214" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549215" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549216" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549217" version="1" comment="libblkid1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549218" version="1" comment="libblkid1-32bit is &lt;2.28-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549219" version="1" comment="libfdisk1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549220" version="1" comment="libmount1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549221" version="1" comment="libmount1-32bit is &lt;2.28-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549222" version="1" comment="libsmartcols1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549223" version="1" comment="libuuid1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549224" version="1" comment="libuuid1-32bit is &lt;2.28-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549225" version="1" comment="python-libmount is &lt;2.28-42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549226" version="1" comment="util-linux is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517525" version="1" comment="util-linux-lang is &lt;2.28-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549227" version="1" comment="util-linux-systemd is &lt;2.28-42.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549228" version="1" comment="uuidd is &lt;2.28-42.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549229" version="1" comment="libpcre1 is &lt;8.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547214" version="1" comment="libpcre1-32bit is &lt;8.39-5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549230" version="1" comment="libpcre16-0 is &lt;8.39-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549231" version="1" comment="libX11-6 is &lt;1.6.2-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547226" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516697" version="1" comment="libX11-data is &lt;1.6.2-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549232" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547228" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549233" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549234" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549235" version="1" comment="libfreebl3 is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544426" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549236" version="1" comment="libfreebl3-hmac is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544428" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549237" version="1" comment="libsoftokn3 is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544430" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549238" version="1" comment="libsoftokn3-hmac is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544432" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549239" version="1" comment="mozilla-nss is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544434" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549240" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544436" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549241" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544438" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549242" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549243" version="1" comment="libXi6 is &lt;1.7.4-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547236" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544440" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534008" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544441" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534011" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549244" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549245" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549246" version="1" comment="kernel-default is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549247" version="1" comment="kernel-default-base is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549248" version="1" comment="kernel-default-devel is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549249" version="1" comment="kernel-default-man is &lt;4.4.21-84.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517531" version="1" comment="kernel-devel is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517532" version="1" comment="kernel-macros is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517533" version="1" comment="kernel-source is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549250" version="1" comment="kernel-syms is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549251" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549252" version="1" comment="libgc1 is &lt;7.2d-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517535" version="1" comment="xen is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549253" version="1" comment="xen-doc-html is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517536" version="1" comment="xen-libs is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517537" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549254" version="1" comment="xen-tools is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549255" version="1" comment="xen-tools-domU is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532091" version="1" comment="tomcat is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532092" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532093" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532094" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532095" version="1" comment="tomcat-javadoc is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532096" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532097" version="1" comment="tomcat-lib is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532098" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532099" version="1" comment="tomcat-webapps is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547248" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.21-20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547249" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.21-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547250" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.21-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549256" version="1" comment="libass5 is &lt;0.10.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549257" version="1" comment="kernel-default is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549258" version="1" comment="kernel-default-base is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549259" version="1" comment="kernel-default-devel is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549260" version="1" comment="kernel-default-man is &lt;4.4.21-90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517541" version="1" comment="kernel-devel is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517542" version="1" comment="kernel-macros is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517543" version="1" comment="kernel-source is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549261" version="1" comment="kernel-syms is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549262" version="1" comment="libpcre1 is &lt;8.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544450" version="1" comment="libpcre1-32bit is &lt;8.39-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549263" version="1" comment="libpcre16-0 is &lt;8.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549264" version="1" comment="ntp is &lt;4.2.8p9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549265" version="1" comment="ntp-doc is &lt;4.2.8p9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517545" version="1" comment="xen is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549266" version="1" comment="xen-doc-html is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517546" version="1" comment="xen-libs is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517547" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549267" version="1" comment="xen-tools is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549268" version="1" comment="xen-tools-domU is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549269" version="1" comment="gd is &lt;2.1.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549270" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549271" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549272" version="1" comment="libgme0 is &lt;0.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549273" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549274" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549275" version="1" comment="wget is &lt;1.14-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549276" version="1" comment="dnsmasq is &lt;2.71-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549277" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549278" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549279" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549280" version="1" comment="libdcerpc0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549281" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549282" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549283" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549284" version="1" comment="libndr-nbt0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549285" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549286" version="1" comment="libndr-standard0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549287" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549288" version="1" comment="libndr0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549289" version="1" comment="libndr0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549290" version="1" comment="libnetapi0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549291" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549292" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549293" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549294" version="1" comment="libsamba-errors0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549295" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549296" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549297" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549298" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549299" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549300" version="1" comment="libsamba-util0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549301" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549302" version="1" comment="libsamdb0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549303" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549304" version="1" comment="libsmbclient0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549305" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549306" version="1" comment="libsmbconf0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549307" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549308" version="1" comment="libsmbldap0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549309" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549310" version="1" comment="libtevent-util0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549311" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549312" version="1" comment="libwbclient0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549313" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549314" version="1" comment="samba is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549315" version="1" comment="samba-client is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549316" version="1" comment="samba-client-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517588" version="1" comment="samba-doc is &lt;4.4.2-31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549317" version="1" comment="samba-libs is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549318" version="1" comment="samba-libs-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549319" version="1" comment="samba-winbind is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549320" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549321" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549322" version="1" comment="libcares2 is &lt;1.9.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549323" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549324" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517595" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549325" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549326" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549327" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549328" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549329" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549330" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549331" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549332" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549333" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540821" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549334" version="1" comment="libtiff5 is &lt;4.0.7-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547334" version="1" comment="libtiff5-32bit is &lt;4.0.7-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549335" version="1" comment="tiff is &lt;4.0.7-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549336" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517607" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549337" version="1" comment="sudo is &lt;1.8.10p3-10.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549338" version="1" comment="openvpn is &lt;2.3.8-16.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549339" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549340" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517611" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549341" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549342" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549343" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549344" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549345" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549346" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549347" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549348" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549349" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549350" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549351" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549352" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549353" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549354" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549355" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549356" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549357" version="1" comment="libwireshark8 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549358" version="1" comment="libwiretap6 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549359" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549360" version="1" comment="libwsutil7 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549361" version="1" comment="wireshark is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549362" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549363" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549364" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549365" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549366" version="1" comment="libcairo2 is &lt;1.15.2-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549367" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549368" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549369" version="1" comment="MozillaFirefox-branding-SLE is &lt;52-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549370" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549371" version="1" comment="libxml2-2 is &lt;2.9.4-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549372" version="1" comment="libxml2-2-32bit is &lt;2.9.4-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532185" version="1" comment="libxml2-doc is &lt;2.9.4-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549373" version="1" comment="libxml2-tools is &lt;2.9.4-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549374" version="1" comment="python-libxml2 is &lt;2.9.4-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549375" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549376" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549377" version="1" comment="libpoppler44 is &lt;0.24.4-14.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549378" version="1" comment="postgresql94 is &lt;9.4.12-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549379" version="1" comment="postgresql94-contrib is &lt;9.4.12-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532193" version="1" comment="postgresql94-docs is &lt;9.4.12-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549380" version="1" comment="postgresql94-server is &lt;9.4.12-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549381" version="1" comment="freeradius-server is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549382" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549383" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549384" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549385" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549386" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549387" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549388" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549389" version="1" comment="freeradius-server-python is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549390" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549391" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549392" version="1" comment="kernel-default is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549393" version="1" comment="kernel-default-base is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549394" version="1" comment="kernel-default-devel is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549395" version="1" comment="kernel-default-man is &lt;4.4.59-92.24.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517660" version="1" comment="kernel-devel is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517661" version="1" comment="kernel-macros is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517662" version="1" comment="kernel-source is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549396" version="1" comment="kernel-syms is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549397" version="1" comment="apache2 is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532211" version="1" comment="apache2-doc is &lt;2.4.23-28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549398" version="1" comment="apache2-example-pages is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549399" version="1" comment="apache2-prefork is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549400" version="1" comment="apache2-utils is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549401" version="1" comment="apache2-worker is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549402" version="1" comment="gvim is &lt;7.4.326-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549403" version="1" comment="vim is &lt;7.4.326-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517666" version="1" comment="vim-data is &lt;7.4.326-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549404" version="1" comment="clamav is &lt;0.99.2-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549405" version="1" comment="bind is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549406" version="1" comment="bind-chrootenv is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532221" version="1" comment="bind-doc is &lt;9.9.9P1-62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549407" version="1" comment="bind-libs is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547561" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549408" version="1" comment="bind-utils is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549409" version="1" comment="unrar is &lt;5.0.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549410" version="1" comment="libxml2-2 is &lt;2.9.4-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549411" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532226" version="1" comment="libxml2-doc is &lt;2.9.4-45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549412" version="1" comment="libxml2-tools is &lt;2.9.4-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549413" version="1" comment="python-libxml2 is &lt;2.9.4-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517676" version="1" comment="xen is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549414" version="1" comment="xen-doc-html is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517677" version="1" comment="xen-libs is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517678" version="1" comment="xen-libs-32bit is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549415" version="1" comment="xen-tools is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549416" version="1" comment="xen-tools-domU is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549417" version="1" comment="qemu is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532230" version="1" comment="qemu-arm is &lt;2.6.2-41.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549418" version="1" comment="qemu-block-curl is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549419" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549420" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549421" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517681" version="1" comment="qemu-ipxe is &lt;1.0.0-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549422" version="1" comment="qemu-kvm is &lt;2.6.2-41.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549423" version="1" comment="qemu-lang is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549424" version="1" comment="qemu-ppc is &lt;2.6.2-41.16.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549425" version="1" comment="qemu-s390 is &lt;2.6.2-41.16.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517683" version="1" comment="qemu-seabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517684" version="1" comment="qemu-sgabios is &lt;8-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549426" version="1" comment="qemu-tools is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517686" version="1" comment="qemu-vgabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517687" version="1" comment="qemu-x86 is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549427" version="1" comment="libsystemd0 is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549428" version="1" comment="libsystemd0-32bit is &lt;228-149.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549429" version="1" comment="libudev1 is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549430" version="1" comment="libudev1-32bit is &lt;228-149.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549431" version="1" comment="systemd is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549432" version="1" comment="systemd-32bit is &lt;228-149.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517694" version="1" comment="systemd-bash-completion is &lt;228-149.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549433" version="1" comment="systemd-sysvinit is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549434" version="1" comment="udev is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549435" version="1" comment="sudo is &lt;1.8.10p3-10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549436" version="1" comment="libquicktime0 is &lt;1.2.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549437" version="1" comment="libgcrypt20 is &lt;1.6.1-16.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549438" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549439" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549440" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549441" version="1" comment="libcares2 is &lt;1.9.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549442" version="1" comment="libncurses5 is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549443" version="1" comment="libncurses5-32bit is &lt;5.9-44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549444" version="1" comment="libncurses6 is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549445" version="1" comment="libncurses6-32bit is &lt;5.9-44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540858" version="1" comment="ncurses-devel is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549446" version="1" comment="ncurses-devel-32bit is &lt;5.9-44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549447" version="1" comment="ncurses-utils is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549448" version="1" comment="tack is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549449" version="1" comment="terminfo is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549450" version="1" comment="terminfo-base is &lt;5.9-44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549451" version="1" comment="gnutls is &lt;3.2.15-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549452" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549453" version="1" comment="libgnutls28 is &lt;3.2.15-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549454" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549455" version="1" comment="libICE6 is &lt;1.0.8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549456" version="1" comment="libICE6-32bit is &lt;1.0.8-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517898" version="1" comment="libspice-server1 is &lt;0.12.7-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549457" version="1" comment="kernel-default is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549458" version="1" comment="kernel-default-base is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549459" version="1" comment="kernel-default-devel is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549460" version="1" comment="kernel-default-man is &lt;4.4.74-92.29.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517902" version="1" comment="kernel-devel is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517903" version="1" comment="kernel-macros is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517904" version="1" comment="kernel-source is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549461" version="1" comment="kernel-syms is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549462" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549463" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549464" version="1" comment="libXdmcp6 is &lt;1.1.1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549465" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549466" version="1" comment="evince is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549467" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517912" version="1" comment="evince-lang is &lt;3.20.1-6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549468" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549469" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549470" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549471" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549472" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549473" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549474" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549475" version="1" comment="libevview3-3 is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549476" version="1" comment="nautilus-evince is &lt;3.20.1-6.14.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549477" version="1" comment="dracut is &lt;044.1-109.8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549478" version="1" comment="dracut-fips is &lt;044.1-109.8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549479" version="1" comment="libsystemd0 is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549480" version="1" comment="libsystemd0-32bit is &lt;228-150.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549481" version="1" comment="libudev1 is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549482" version="1" comment="libudev1-32bit is &lt;228-150.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549483" version="1" comment="systemd is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549484" version="1" comment="systemd-32bit is &lt;228-150.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517931" version="1" comment="systemd-bash-completion is &lt;228-150.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549485" version="1" comment="systemd-sysvinit is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549486" version="1" comment="udev is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549487" version="1" comment="libjasper1 is &lt;1.900.14-195.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549488" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549489" version="1" comment="apache2 is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532285" version="1" comment="apache2-doc is &lt;2.4.23-29.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549490" version="1" comment="apache2-example-pages is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549491" version="1" comment="apache2-prefork is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549492" version="1" comment="apache2-utils is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549493" version="1" comment="apache2-worker is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549494" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549495" version="1" comment="libical1 is &lt;1.0.1-16.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549496" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541441" version="1" comment="libpoppler44 is &lt;0.24.4-14.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549497" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549498" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549499" version="1" comment="libpoppler60 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549500" version="1" comment="poppler-tools is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549501" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549502" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549503" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549504" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547567" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549505" version="1" comment="mariadb is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549506" version="1" comment="mariadb-client is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549507" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549508" version="1" comment="mariadb-tools is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549509" version="1" comment="libwireshark8 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549510" version="1" comment="libwiretap6 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549511" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549512" version="1" comment="libwsutil7 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549513" version="1" comment="wireshark is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549514" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549515" version="1" comment="kernel-default is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549516" version="1" comment="kernel-default-base is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549517" version="1" comment="kernel-default-devel is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549518" version="1" comment="kernel-default-man is &lt;4.4.74-92.32.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517967" version="1" comment="kernel-devel is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517968" version="1" comment="kernel-macros is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517969" version="1" comment="kernel-source is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549519" version="1" comment="kernel-syms is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549520" version="1" comment="libzypp is &lt;16.15.2-27.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549521" version="1" comment="zypper is &lt;1.13.30-18.13.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517973" version="1" comment="zypper-log is &lt;1.13.30-18.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549522" version="1" comment="libncurses5 is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549523" version="1" comment="libncurses5-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549524" version="1" comment="libncurses6 is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549525" version="1" comment="libncurses6-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540903" version="1" comment="ncurses-devel is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549526" version="1" comment="ncurses-devel-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549527" version="1" comment="ncurses-utils is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549528" version="1" comment="tack is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549529" version="1" comment="terminfo is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549530" version="1" comment="terminfo-base is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549531" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549532" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549533" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549534" version="1" comment="rsvg-view is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549535" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549536" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518003" version="1" comment="libsoup-lang is &lt;2.54.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549537" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549538" version="1" comment="kernel-default is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549539" version="1" comment="kernel-default-base is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549540" version="1" comment="kernel-default-devel is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549541" version="1" comment="kernel-default-man is &lt;4.4.74-92.35.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518008" version="1" comment="kernel-devel is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518009" version="1" comment="kernel-macros is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518010" version="1" comment="kernel-source is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549542" version="1" comment="kernel-syms is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549543" version="1" comment="strongswan is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518013" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549544" version="1" comment="strongswan-hmac is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549545" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549546" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549547" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549548" version="1" comment="libxml2-2 is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549549" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532336" version="1" comment="libxml2-doc is &lt;2.9.4-46.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549550" version="1" comment="libxml2-tools is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549551" version="1" comment="python-libxml2 is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549552" version="1" comment="curl is &lt;7.37.0-37.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549553" version="1" comment="libcurl4 is &lt;7.37.0-37.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549554" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549555" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549556" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549557" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549558" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549559" version="1" comment="libplist3 is &lt;1.12-20.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549560" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549561" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549562" version="1" comment="gnome-shell is &lt;3.20.4-77.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549563" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518036" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549564" version="1" comment="freeradius-server is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549565" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549566" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549567" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549568" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549569" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549570" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549571" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549572" version="1" comment="freeradius-server-python is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549573" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549574" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549575" version="1" comment="openssh is &lt;7.2p2-66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549576" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549577" version="1" comment="openssh-fips is &lt;7.2p2-66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549578" version="1" comment="openssh-helpers is &lt;7.2p2-66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547589" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.10-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534735" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.10-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534737" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.10-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544971" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-38.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534249" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-38.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544972" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-38.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534252" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-38.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549579" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549580" version="1" comment="libospf0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549581" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549582" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549583" version="1" comment="libzebra1 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549584" version="1" comment="quagga is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549585" version="1" comment="expat is &lt;2.1.0-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549586" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549587" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540949" version="1" comment="git-core is &lt;2.12.3-27.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532374" version="1" comment="git-doc is &lt;2.12.3-27.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549588" version="1" comment="libicu-doc is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549589" version="1" comment="libicu52_1 is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549590" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549591" version="1" comment="libicu52_1-data is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518050" version="1" comment="xen is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549592" version="1" comment="xen-doc-html is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518051" version="1" comment="xen-libs is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518052" version="1" comment="xen-libs-32bit is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549593" version="1" comment="xen-tools is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549594" version="1" comment="xen-tools-domU is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549595" version="1" comment="postgresql94 is &lt;9.4.13-21.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549596" version="1" comment="postgresql94-contrib is &lt;9.4.13-21.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532380" version="1" comment="postgresql94-docs is &lt;9.4.13-21.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549597" version="1" comment="postgresql94-server is &lt;9.4.13-21.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549598" version="1" comment="libecpg6 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549599" version="1" comment="libpq5 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544979" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549600" version="1" comment="postgresql96 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549601" version="1" comment="postgresql96-contrib is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532386" version="1" comment="postgresql96-docs is &lt;9.6.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549602" version="1" comment="postgresql96-server is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518058" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549603" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549604" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549605" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549606" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549607" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549608" version="1" comment="evince is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549609" version="1" comment="evince-browser-plugin is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518066" version="1" comment="evince-lang is &lt;3.20.1-6.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549610" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549611" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549612" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549613" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549614" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549615" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549616" version="1" comment="libevdocument3-4 is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549617" version="1" comment="libevview3-3 is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549618" version="1" comment="nautilus-evince is &lt;3.20.1-6.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549619" version="1" comment="libsystemd0 is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549620" version="1" comment="libsystemd0-32bit is &lt;228-132.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549621" version="1" comment="libudev1 is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549622" version="1" comment="libudev1-32bit is &lt;228-132.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549623" version="1" comment="systemd is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549624" version="1" comment="systemd-32bit is &lt;228-132.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518084" version="1" comment="systemd-bash-completion is &lt;228-132.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549625" version="1" comment="systemd-sysvinit is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549626" version="1" comment="udev is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549627" version="1" comment="cvs is &lt;1.12.12-182.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532408" version="1" comment="cvs-doc is &lt;1.12.12-182.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549628" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549629" version="1" comment="pcsc-lite is &lt;1.8.10-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549630" version="1" comment="dbus-1 is &lt;1.8.22-24.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549631" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549632" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549633" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518095" version="1" comment="xen is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549634" version="1" comment="xen-doc-html is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518096" version="1" comment="xen-libs is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518097" version="1" comment="xen-libs-32bit is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549635" version="1" comment="xen-tools is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549636" version="1" comment="xen-tools-domU is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549637" version="1" comment="kernel-default is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549638" version="1" comment="kernel-default-base is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549639" version="1" comment="kernel-default-devel is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549640" version="1" comment="kernel-default-man is &lt;4.4.74-92.38.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518101" version="1" comment="kernel-devel is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518102" version="1" comment="kernel-macros is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518103" version="1" comment="kernel-source is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549641" version="1" comment="kernel-syms is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549642" version="1" comment="cpp48 is &lt;4.8.5-31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545006" version="1" comment="gcc48 is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545007" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545008" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518111" version="1" comment="gcc48-info is &lt;4.8.5-31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545009" version="1" comment="gcc48-locale is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518112" version="1" comment="libasan0 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518113" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545010" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545011" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549643" version="1" comment="emacs is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532420" version="1" comment="emacs-el is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518121" version="1" comment="emacs-info is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549644" version="1" comment="emacs-nox is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549645" version="1" comment="emacs-x11 is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549646" version="1" comment="etags is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549647" version="1" comment="libzip2 is &lt;0.11.1-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549648" version="1" comment="apache2 is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532426" version="1" comment="apache2-doc is &lt;2.4.23-29.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549649" version="1" comment="apache2-example-pages is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549650" version="1" comment="apache2-prefork is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549651" version="1" comment="apache2-utils is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549652" version="1" comment="apache2-worker is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549653" version="1" comment="libwireshark8 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549654" version="1" comment="libwiretap6 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549655" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549656" version="1" comment="libwsutil7 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549657" version="1" comment="wireshark is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549658" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549659" version="1" comment="libtiff5 is &lt;4.0.8-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549660" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549661" version="1" comment="tiff is &lt;4.0.8-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549662" version="1" comment="liblouis-data is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549663" version="1" comment="liblouis9 is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549664" version="1" comment="python-louis is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549665" version="1" comment="python3-louis is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549666" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549667" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549668" version="1" comment="tcmu-runner is &lt;1.0.4-3.3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549669" version="1" comment="dnsmasq is &lt;2.78-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549670" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549671" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549672" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549673" version="1" comment="libdcerpc0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549674" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549675" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549676" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549677" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549678" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549679" version="1" comment="libndr-standard0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549680" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549681" version="1" comment="libndr0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549682" version="1" comment="libndr0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549683" version="1" comment="libnetapi0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549684" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549685" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549686" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549687" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549688" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549689" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549690" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549691" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549692" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549693" version="1" comment="libsamba-util0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549694" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549695" version="1" comment="libsamdb0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549696" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549697" version="1" comment="libsmbclient0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549698" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549699" version="1" comment="libsmbconf0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549700" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549701" version="1" comment="libsmbldap0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549702" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549703" version="1" comment="libtevent-util0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549704" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549705" version="1" comment="libwbclient0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549706" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549707" version="1" comment="samba is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549708" version="1" comment="samba-client is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549709" version="1" comment="samba-client-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518179" version="1" comment="samba-doc is &lt;4.4.2-38.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549710" version="1" comment="samba-libs is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549711" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549712" version="1" comment="samba-winbind is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549713" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549714" version="1" comment="krb5 is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549715" version="1" comment="krb5-32bit is &lt;1.12.5-40.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549716" version="1" comment="krb5-client is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549717" version="1" comment="krb5-doc is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549718" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549719" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549720" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549721" version="1" comment="krb5-server is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549722" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549723" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549724" version="1" comment="libfreebl3 is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545037" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549725" version="1" comment="libfreebl3-hmac is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545039" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549726" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545041" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549727" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545043" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549728" version="1" comment="mozilla-nss is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545045" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549729" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545047" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549730" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545050" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549731" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549732" version="1" comment="libvirt is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549733" version="1" comment="libvirt-client is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549734" version="1" comment="libvirt-daemon is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549735" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549736" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549737" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518207" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549738" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549739" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549740" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549741" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549742" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549743" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549744" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549745" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549746" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518217" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549747" version="1" comment="libvirt-doc is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549748" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549749" version="1" comment="libvirt-nss is &lt;2.0.0-27.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518232" version="1" comment="xerces-j2 is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532505" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532506" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541021" version="1" comment="git-core is &lt;2.12.3-27.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532508" version="1" comment="git-doc is &lt;2.12.3-27.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549750" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549751" version="1" comment="policycoreutils is &lt;2.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549752" version="1" comment="policycoreutils-python is &lt;2.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549753" version="1" comment="curl is &lt;7.37.0-37.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549754" version="1" comment="libcurl4 is &lt;7.37.0-37.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549755" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549756" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549757" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549758" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549759" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549760" version="1" comment="openvpn is &lt;2.3.8-16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549761" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549762" version="1" comment="gnutls is &lt;3.2.15-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549763" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549764" version="1" comment="libgnutls28 is &lt;3.2.15-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547668" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549765" version="1" comment="tcpdump is &lt;4.9.2-14.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549766" version="1" comment="libwireshark8 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549767" version="1" comment="libwiretap6 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549768" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549769" version="1" comment="libwsutil7 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549770" version="1" comment="wireshark is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549771" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518245" version="1" comment="xen is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549772" version="1" comment="xen-doc-html is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518246" version="1" comment="xen-libs is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518247" version="1" comment="xen-libs-32bit is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549773" version="1" comment="xen-tools is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549774" version="1" comment="xen-tools-domU is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549775" version="1" comment="kernel-default is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549776" version="1" comment="kernel-default-base is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549777" version="1" comment="kernel-default-devel is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549778" version="1" comment="kernel-default-man is &lt;4.4.90-92.45.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518251" version="1" comment="kernel-devel is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518252" version="1" comment="kernel-macros is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518253" version="1" comment="kernel-source is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549779" version="1" comment="kernel-syms is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549780" version="1" comment="wget is &lt;1.14-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518256" version="1" comment="SuSEfirewall2 is &lt;3.6.312-2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549781" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549782" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549783" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549784" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549785" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549786" version="1" comment="qemu is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532541" version="1" comment="qemu-arm is &lt;2.6.2-41.22.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549787" version="1" comment="qemu-block-curl is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549788" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.22.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549789" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549790" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518266" version="1" comment="qemu-ipxe is &lt;1.0.0-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549791" version="1" comment="qemu-kvm is &lt;2.6.2-41.22.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549792" version="1" comment="qemu-lang is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549793" version="1" comment="qemu-ppc is &lt;2.6.2-41.22.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549794" version="1" comment="qemu-s390 is &lt;2.6.2-41.22.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518268" version="1" comment="qemu-seabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518269" version="1" comment="qemu-sgabios is &lt;8-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549795" version="1" comment="qemu-tools is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518271" version="1" comment="qemu-vgabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518272" version="1" comment="qemu-x86 is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549796" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549797" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549798" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549799" version="1" comment="python-sssd-config is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549800" version="1" comment="sssd is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549801" version="1" comment="sssd-32bit is &lt;1.13.4-34.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549802" version="1" comment="sssd-ad is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549803" version="1" comment="sssd-ipa is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549804" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549805" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549806" version="1" comment="sssd-ldap is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549807" version="1" comment="sssd-proxy is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549808" version="1" comment="sssd-tools is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549809" version="1" comment="krb5 is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549810" version="1" comment="krb5-32bit is &lt;1.12.5-40.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549811" version="1" comment="krb5-client is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549812" version="1" comment="krb5-doc is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549813" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549814" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549815" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549816" version="1" comment="krb5-server is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549817" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549818" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549819" version="1" comment="shadow is &lt;4.2.1-27.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541472" version="1" comment="libpoppler44 is &lt;0.24.4-14.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549820" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549821" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549822" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549823" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549824" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549825" version="1" comment="cpio is &lt;2.11-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517073" version="1" comment="cpio-lang is &lt;2.11-32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549826" version="1" comment="ceph-common is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549827" version="1" comment="libcephfs1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549828" version="1" comment="librados2 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549829" version="1" comment="libradosstriper1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549830" version="1" comment="librbd1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549831" version="1" comment="python-cephfs is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549832" version="1" comment="python-rados is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549833" version="1" comment="python-rbd is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532585" version="1" comment="tomcat is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532586" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532587" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532588" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532589" version="1" comment="tomcat-javadoc is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532590" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532591" version="1" comment="tomcat-lib is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532592" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532593" version="1" comment="tomcat-webapps is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549834" version="1" comment="file is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549835" version="1" comment="file-magic is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549836" version="1" comment="libmagic1 is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549837" version="1" comment="libmagic1-32bit is &lt;5.22-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549838" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549839" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549840" version="1" comment="tboot is &lt;20160518_1.9.4-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549841" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549842" version="1" comment="perl is &lt;5.18.2-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549843" version="1" comment="perl-32bit is &lt;5.18.2-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549844" version="1" comment="perl-base is &lt;5.18.2-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518322" version="1" comment="perl-doc is &lt;5.18.2-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518323" version="1" comment="kernel-firmware is &lt;20170530-21.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518324" version="1" comment="ucode-amd is &lt;20170530-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549845" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549846" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549847" version="1" comment="libdcerpc0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549848" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549849" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549850" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549851" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549852" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549853" version="1" comment="libndr-standard0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549854" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549855" version="1" comment="libndr0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549856" version="1" comment="libndr0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549857" version="1" comment="libnetapi0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549858" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549859" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549860" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549861" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549862" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549863" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549864" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549865" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549866" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549867" version="1" comment="libsamba-util0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549868" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549869" version="1" comment="libsamdb0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549870" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549871" version="1" comment="libsmbclient0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549872" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549873" version="1" comment="libsmbconf0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549874" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549875" version="1" comment="libsmbldap0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549876" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549877" version="1" comment="libtevent-util0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549878" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549879" version="1" comment="libwbclient0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549880" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549881" version="1" comment="samba is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549882" version="1" comment="samba-client is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549883" version="1" comment="samba-client-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518364" version="1" comment="samba-doc is &lt;4.4.2-38.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549884" version="1" comment="samba-libs is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549885" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549886" version="1" comment="samba-winbind is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549887" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549888" version="1" comment="libxml2-2 is &lt;2.9.4-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549889" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532625" version="1" comment="libxml2-doc is &lt;2.9.4-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549890" version="1" comment="libxml2-tools is &lt;2.9.4-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549891" version="1" comment="python-libxml2 is &lt;2.9.4-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549892" version="1" comment="guile is &lt;2.0.9-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549893" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549894" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541071" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549895" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549896" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549897" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549898" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549899" version="1" comment="openssl is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532635" version="1" comment="openssl-doc is &lt;1.0.2j-60.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549900" version="1" comment="binutils is &lt;2.29.1-9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518378" version="1" comment="xen is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549901" version="1" comment="xen-doc-html is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518379" version="1" comment="xen-libs is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518380" version="1" comment="xen-libs-32bit is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549902" version="1" comment="xen-tools is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549903" version="1" comment="xen-tools-domU is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549904" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549905" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549906" version="1" comment="libz1 is &lt;1.2.8-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549907" version="1" comment="libz1-32bit is &lt;1.2.8-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541078" version="1" comment="zlib-devel is &lt;1.2.8-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518386" version="1" comment="libspice-server1 is &lt;0.12.7-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549908" version="1" comment="libXcursor1 is &lt;1.1.14-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549909" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549910" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549911" version="1" comment="libshibsp6 is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549912" version="1" comment="shibboleth-sp is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549913" version="1" comment="kernel-default is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549914" version="1" comment="kernel-default-base is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549915" version="1" comment="kernel-default-devel is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549916" version="1" comment="kernel-default-man is &lt;4.4.90-92.50.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518392" version="1" comment="kernel-devel is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518393" version="1" comment="kernel-macros is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518394" version="1" comment="kernel-source is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549917" version="1" comment="kernel-syms is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549918" version="1" comment="openssh is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549919" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549920" version="1" comment="openssh-fips is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549921" version="1" comment="openssh-helpers is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549922" version="1" comment="libsaml8 is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549923" version="1" comment="opensaml-bin is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549924" version="1" comment="opensaml-schemas is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541094" version="1" comment="libapr-util1 is &lt;1.5.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549925" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549926" version="1" comment="libmysqlclient18 is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547795" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549927" version="1" comment="mariadb is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549928" version="1" comment="mariadb-client is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549929" version="1" comment="mariadb-errormessages is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549930" version="1" comment="mariadb-tools is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541101" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549931" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549932" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549933" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549934" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549935" version="1" comment="openssl is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532667" version="1" comment="openssl-doc is &lt;1.0.2j-60.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549936" version="1" comment="expat is &lt;2.1.0-20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549937" version="1" comment="libexpat1 is &lt;2.1.0-20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547802" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549938" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549939" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549940" version="1" comment="libecpg6 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549941" version="1" comment="libpq5 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549942" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549943" version="1" comment="postgresql96 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549944" version="1" comment="postgresql96-contrib is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532676" version="1" comment="postgresql96-docs is &lt;9.6.6-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549945" version="1" comment="postgresql96-server is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549946" version="1" comment="kernel-default is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549947" version="1" comment="kernel-default-base is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549948" version="1" comment="kernel-default-devel is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549949" version="1" comment="kernel-default-man is &lt;4.4.103-92.53.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518416" version="1" comment="kernel-devel is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518417" version="1" comment="kernel-macros is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518418" version="1" comment="kernel-source is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549950" version="1" comment="kernel-syms is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547803" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.5-30.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535147" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.5-30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535149" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.5-30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549951" version="1" comment="evince is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549952" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518422" version="1" comment="evince-lang is &lt;3.20.2-6.19.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549953" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549954" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549955" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549956" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549957" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549958" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549959" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549960" version="1" comment="libevview3-3 is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549961" version="1" comment="nautilus-evince is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549962" version="1" comment="libwireshark8 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549963" version="1" comment="libwiretap6 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549964" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549965" version="1" comment="libwsutil7 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549966" version="1" comment="wireshark is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549967" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518440" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549968" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549969" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549970" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549971" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549972" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545271" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-38.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535151" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-38.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545272" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-38.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535154" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-38.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549973" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549974" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549975" version="1" comment="libopus0 is &lt;1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541126" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549976" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549977" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549978" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549979" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549980" version="1" comment="openssl is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532709" version="1" comment="openssl-doc is &lt;1.0.2j-59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549981" version="1" comment="libtiff5 is &lt;4.0.7-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547806" version="1" comment="libtiff5-32bit is &lt;4.0.7-40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549982" version="1" comment="tiff is &lt;4.0.7-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547814" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.0-23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547815" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547816" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549983" version="1" comment="libXpm4 is &lt;3.5.11-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547824" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549984" version="1" comment="gd is &lt;2.1.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549985" version="1" comment="ppp is &lt;2.4.7-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549986" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549987" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549988" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549989" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549990" version="1" comment="libjasper1 is &lt;1.900.14-184.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547836" version="1" comment="libjasper1-32bit is &lt;1.900.14-184.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549991" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549992" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549993" version="1" comment="libblkid1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549994" version="1" comment="libblkid1-32bit is &lt;2.28-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549995" version="1" comment="libfdisk1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549996" version="1" comment="libmount1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549997" version="1" comment="libmount1-32bit is &lt;2.28-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549998" version="1" comment="libsmartcols1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549999" version="1" comment="libuuid1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550000" version="1" comment="libuuid1-32bit is &lt;2.28-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550001" version="1" comment="python-libmount is &lt;2.28-44.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550002" version="1" comment="util-linux is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518461" version="1" comment="util-linux-lang is &lt;2.28-44.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550003" version="1" comment="util-linux-systemd is &lt;2.28-44.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550004" version="1" comment="uuidd is &lt;2.28-44.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518464" version="1" comment="xen is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550005" version="1" comment="xen-doc-html is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518465" version="1" comment="xen-libs is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518466" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550006" version="1" comment="xen-tools is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550007" version="1" comment="xen-tools-domU is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550008" version="1" comment="kernel-default is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550009" version="1" comment="kernel-default-base is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550010" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550011" version="1" comment="kernel-default-man is &lt;4.4.49-92.11.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518470" version="1" comment="kernel-devel is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518471" version="1" comment="kernel-macros is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518472" version="1" comment="kernel-source is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550012" version="1" comment="kernel-syms is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550013" version="1" comment="bind is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550014" version="1" comment="bind-chrootenv is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532737" version="1" comment="bind-doc is &lt;9.9.9P1-56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550015" version="1" comment="bind-libs is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547858" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550016" version="1" comment="bind-utils is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550017" version="1" comment="libquicktime0 is &lt;1.2.4-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550018" version="1" comment="libXvnc1 is &lt;1.6.0-16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550019" version="1" comment="tigervnc is &lt;1.6.0-16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550020" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550021" version="1" comment="qemu is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532745" version="1" comment="qemu-arm is &lt;2.6.2-41.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550022" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550023" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550024" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550025" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518479" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550026" version="1" comment="qemu-kvm is &lt;2.6.2-41.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550027" version="1" comment="qemu-lang is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550028" version="1" comment="qemu-ppc is &lt;2.6.2-41.9.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550029" version="1" comment="qemu-s390 is &lt;2.6.2-41.9.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518481" version="1" comment="qemu-seabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518482" version="1" comment="qemu-sgabios is &lt;8-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550030" version="1" comment="qemu-tools is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518484" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518485" version="1" comment="qemu-x86 is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550031" version="1" comment="dbus-1 is &lt;1.8.22-24.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550032" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550033" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547866" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518489" version="1" comment="libvmtools0 is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518490" version="1" comment="open-vm-tools is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518491" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550034" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550035" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545314" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534345" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545315" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534348" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550036" version="1" comment="sane-backends is &lt;1.0.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550037" version="1" comment="freeradius-server is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550038" version="1" comment="freeradius-server-doc is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550039" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550040" version="1" comment="freeradius-server-ldap is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550041" version="1" comment="freeradius-server-libs is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550042" version="1" comment="freeradius-server-mysql is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550043" version="1" comment="freeradius-server-perl is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550044" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550045" version="1" comment="freeradius-server-python is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550046" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550047" version="1" comment="freeradius-server-utils is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550048" version="1" comment="rrdtool is &lt;1.4.7-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550049" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550050" version="1" comment="apache2 is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532772" version="1" comment="apache2-doc is &lt;2.4.23-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550051" version="1" comment="apache2-example-pages is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550052" version="1" comment="apache2-prefork is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550053" version="1" comment="apache2-utils is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550054" version="1" comment="apache2-worker is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550055" version="1" comment="wget is &lt;1.14-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550056" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547888" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.1-26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547889" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547890" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550057" version="1" comment="libpng16-16 is &lt;1.6.8-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547892" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550058" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550059" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550060" version="1" comment="libdcerpc0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550061" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550062" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550063" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550064" version="1" comment="libndr-nbt0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550065" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550066" version="1" comment="libndr-standard0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550067" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550068" version="1" comment="libndr0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550069" version="1" comment="libndr0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550070" version="1" comment="libnetapi0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550071" version="1" comment="libnetapi0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550072" version="1" comment="libsamba-credentials0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550073" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550074" version="1" comment="libsamba-errors0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550075" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550076" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550077" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550078" version="1" comment="libsamba-passdb0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550079" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550080" version="1" comment="libsamba-util0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550081" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550082" version="1" comment="libsamdb0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550083" version="1" comment="libsamdb0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550084" version="1" comment="libsmbclient0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550085" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550086" version="1" comment="libsmbconf0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550087" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550088" version="1" comment="libsmbldap0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550089" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550090" version="1" comment="libtevent-util0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550091" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550092" version="1" comment="libwbclient0 is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550093" version="1" comment="libwbclient0-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550094" version="1" comment="samba is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550095" version="1" comment="samba-client is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550096" version="1" comment="samba-client-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518532" version="1" comment="samba-doc is &lt;4.4.2-36.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550097" version="1" comment="samba-libs is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550098" version="1" comment="samba-libs-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550099" version="1" comment="samba-winbind is &lt;4.4.2-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550100" version="1" comment="samba-winbind-32bit is &lt;4.4.2-36.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550101" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550102" version="1" comment="libpng12-0 is &lt;1.2.50-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547941" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550103" version="1" comment="kernel-default is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550104" version="1" comment="kernel-default-base is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550105" version="1" comment="kernel-default-devel is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550106" version="1" comment="kernel-default-man is &lt;4.4.49-92.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518541" version="1" comment="kernel-devel is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518542" version="1" comment="kernel-macros is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518543" version="1" comment="kernel-source is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550107" version="1" comment="kernel-syms is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550108" version="1" comment="bind is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550109" version="1" comment="bind-chrootenv is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532810" version="1" comment="bind-doc is &lt;9.9.9P1-53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550110" version="1" comment="bind-libs is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547951" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550111" version="1" comment="bind-utils is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550112" version="1" comment="audiofile is &lt;0.3.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550113" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547955" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550114" version="1" comment="dracut is &lt;044-108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550115" version="1" comment="dracut-fips is &lt;044-108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550116" version="1" comment="libpng15-15 is &lt;1.5.22-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550117" version="1" comment="libjasper1 is &lt;1.900.14-194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547958" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550118" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518552" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550119" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550120" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550121" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550122" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550123" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550124" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550125" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550126" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550127" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541177" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550128" version="1" comment="gstreamer is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518564" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550129" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550130" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550131" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550132" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518569" version="1" comment="xen is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550133" version="1" comment="xen-doc-html is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518570" version="1" comment="xen-libs is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518571" version="1" comment="xen-libs-32bit is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550134" version="1" comment="xen-tools is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550135" version="1" comment="xen-tools-domU is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550136" version="1" comment="bind is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550137" version="1" comment="bind-chrootenv is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532836" version="1" comment="bind-doc is &lt;9.9.9P1-59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550138" version="1" comment="bind-libs is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547968" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550139" version="1" comment="bind-utils is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550140" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550141" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550142" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550143" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-12.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518580" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-12.12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550144" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518582" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550145" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550146" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550147" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550148" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550149" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550150" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550151" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550152" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550153" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550154" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550155" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550156" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550157" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550158" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550159" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550160" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550161" version="1" comment="libsndfile1 is &lt;1.0.25-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547992" version="1" comment="libsndfile1-32bit is &lt;1.0.25-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550162" version="1" comment="curl is &lt;7.37.0-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550163" version="1" comment="libcurl4 is &lt;7.37.0-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547995" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550164" version="1" comment="libtiff5 is &lt;4.0.7-43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547997" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550165" version="1" comment="tiff is &lt;4.0.7-43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550166" version="1" comment="ntp is &lt;4.2.8p10-60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550167" version="1" comment="ntp-doc is &lt;4.2.8p10-60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550168" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550169" version="1" comment="ruby2.1 is &lt;2.1.9-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550170" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550171" version="1" comment="minicom is &lt;2.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550172" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550173" version="1" comment="tigervnc is &lt;1.6.0-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550174" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550175" version="1" comment="libpcap1 is &lt;1.8.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550176" version="1" comment="tcpdump is &lt;4.9.0-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550177" version="1" comment="perl-DBD-mysql is &lt;4.021-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550178" version="1" comment="ghostscript is &lt;9.15-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550179" version="1" comment="ghostscript-x11 is &lt;9.15-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518607" version="1" comment="xen is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550180" version="1" comment="xen-doc-html is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518608" version="1" comment="xen-libs is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518609" version="1" comment="xen-libs-32bit is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550181" version="1" comment="xen-tools is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550182" version="1" comment="xen-tools-domU is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550183" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548017" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550184" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517324" version="1" comment="apparmor-docs is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550185" version="1" comment="apparmor-parser is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517326" version="1" comment="apparmor-profiles is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517327" version="1" comment="apparmor-utils is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550186" version="1" comment="libapparmor1 is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548021" version="1" comment="libapparmor1-32bit is &lt;2.8.2-54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550187" version="1" comment="pam_apparmor is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548023" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550188" version="1" comment="perl-apparmor is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550189" version="1" comment="squid is &lt;3.5.21-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550190" version="1" comment="qemu is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532879" version="1" comment="qemu-arm is &lt;2.6.2-39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550191" version="1" comment="qemu-block-curl is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550192" version="1" comment="qemu-block-rbd is &lt;2.6.2-39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550193" version="1" comment="qemu-block-ssh is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550194" version="1" comment="qemu-guest-agent is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518612" version="1" comment="qemu-ipxe is &lt;1.0.0-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550195" version="1" comment="qemu-kvm is &lt;2.6.2-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550196" version="1" comment="qemu-lang is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550197" version="1" comment="qemu-ppc is &lt;2.6.2-39.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550198" version="1" comment="qemu-s390 is &lt;2.6.2-39.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518614" version="1" comment="qemu-seabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518615" version="1" comment="qemu-sgabios is &lt;8-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550199" version="1" comment="qemu-tools is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518617" version="1" comment="qemu-vgabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518618" version="1" comment="qemu-x86 is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550200" version="1" comment="kernel-default is &lt;4.4.59-92.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550201" version="1" comment="kernel-default-base is &lt;4.4.59-92.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550202" version="1" comment="kernel-default-devel is &lt;4.4.59-92.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550203" version="1" comment="kernel-default-man is &lt;4.4.59-92.17.3 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518622" version="1" comment="kernel-devel is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518623" version="1" comment="kernel-macros is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518624" version="1" comment="kernel-source is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550204" version="1" comment="kernel-syms is &lt;4.4.59-92.17.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532890" version="1" comment="tomcat is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532891" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532892" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532893" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532894" version="1" comment="tomcat-javadoc is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532895" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532896" version="1" comment="tomcat-lib is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532897" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532898" version="1" comment="tomcat-webapps is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532899" version="1" comment="dovecot is &lt;2.2-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550205" version="1" comment="dovecot22 is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550206" version="1" comment="dovecot22-backend-mysql is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550207" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550208" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550209" version="1" comment="MozillaFirefox is &lt;45.9.0esr-105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550210" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550211" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550212" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550213" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550214" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550215" version="1" comment="libfreebl3 is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545385" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550216" version="1" comment="libfreebl3-hmac is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545387" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550217" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545389" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550218" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545391" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550219" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545393" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550220" version="1" comment="mozilla-nss is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545395" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550221" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545397" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550222" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545399" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550223" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550224" version="1" comment="libxslt-tools is &lt;1.1.28-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550225" version="1" comment="libxslt1 is &lt;1.1.28-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548046" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550226" version="1" comment="bash is &lt;4.3-82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518627" version="1" comment="bash-doc is &lt;4.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550227" version="1" comment="libreadline6 is &lt;6.3-82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550228" version="1" comment="libreadline6-32bit is &lt;6.3-82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518631" version="1" comment="readline-doc is &lt;6.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550229" version="1" comment="libmysqlclient18 is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548048" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550230" version="1" comment="mariadb is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550231" version="1" comment="mariadb-client is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550232" version="1" comment="mariadb-errormessages is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550233" version="1" comment="mariadb-tools is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550234" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550235" version="1" comment="libtirpc3 is &lt;1.0.1-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550236" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550237" version="1" comment="rpcbind is &lt;0.2.3-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550238" version="1" comment="libkde4 is &lt;4.12.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548055" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550239" version="1" comment="libkdecore4 is &lt;4.12.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548057" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550240" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548059" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541230" version="1" comment="git-core is &lt;2.12.3-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532935" version="1" comment="git-doc is &lt;2.12.3-26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550241" version="1" comment="libsndfile1 is &lt;1.0.25-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548072" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548074" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.5-29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548075" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.5-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548076" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.5-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545406" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534521" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545407" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534524" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550242" version="1" comment="libplist3 is &lt;1.12-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550243" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550244" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550245" version="1" comment="libdcerpc0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550246" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550247" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550248" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550249" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550250" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550251" version="1" comment="libndr-standard0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550252" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550253" version="1" comment="libndr0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550254" version="1" comment="libndr0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550255" version="1" comment="libnetapi0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550256" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550257" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550258" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550259" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550260" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550261" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550262" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550263" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550264" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550265" version="1" comment="libsamba-util0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550266" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550267" version="1" comment="libsamdb0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550268" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550269" version="1" comment="libsmbclient0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550270" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550271" version="1" comment="libsmbconf0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550272" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550273" version="1" comment="libsmbldap0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550274" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550275" version="1" comment="libtevent-util0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550276" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550277" version="1" comment="libwbclient0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550278" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550279" version="1" comment="samba is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550280" version="1" comment="samba-client is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550281" version="1" comment="samba-client-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518677" version="1" comment="samba-doc is &lt;4.4.2-38.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550282" version="1" comment="samba-libs is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550283" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550284" version="1" comment="samba-winbind is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550285" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550286" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550287" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550288" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550289" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550290" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550291" version="1" comment="pam is &lt;1.1.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548138" version="1" comment="pam-32bit is &lt;1.1.8-23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517451" version="1" comment="pam-doc is &lt;1.1.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550292" version="1" comment="ghostscript is &lt;9.15-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550293" version="1" comment="ghostscript-x11 is &lt;9.15-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550294" version="1" comment="squidGuard is &lt;1.4-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550295" version="1" comment="squidGuard-doc is &lt;1.4-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550296" version="1" comment="kernel-default is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550297" version="1" comment="kernel-default-base is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550298" version="1" comment="kernel-default-devel is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550299" version="1" comment="kernel-default-man is &lt;4.4.38-93.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518686" version="1" comment="kernel-devel is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518687" version="1" comment="kernel-macros is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518688" version="1" comment="kernel-source is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550300" version="1" comment="kernel-syms is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550301" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550302" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550303" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550304" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550305" version="1" comment="libwireshark8 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550306" version="1" comment="libwiretap6 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550307" version="1" comment="libwscodecs1 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550308" version="1" comment="libwsutil7 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550309" version="1" comment="wireshark is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550310" version="1" comment="wireshark-gtk is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550311" version="1" comment="sudo is &lt;1.8.10p3-10.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550312" version="1" comment="libxml2-2 is &lt;2.9.4-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550313" version="1" comment="libxml2-2-32bit is &lt;2.9.4-36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532986" version="1" comment="libxml2-doc is &lt;2.9.4-36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550314" version="1" comment="libxml2-tools is &lt;2.9.4-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550315" version="1" comment="python-libxml2 is &lt;2.9.4-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550316" version="1" comment="strongswan is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518698" version="1" comment="strongswan-doc is &lt;5.1.3-25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550317" version="1" comment="strongswan-hmac is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550318" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550319" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550320" version="1" comment="libhogweed2 is &lt;2.7.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550321" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550322" version="1" comment="libnettle4 is &lt;2.7.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550323" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550324" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550325" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550326" version="1" comment="libxml2-2 is &lt;2.9.4-39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550327" version="1" comment="libxml2-2-32bit is &lt;2.9.4-39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532998" version="1" comment="libxml2-doc is &lt;2.9.4-39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550328" version="1" comment="libxml2-tools is &lt;2.9.4-39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550329" version="1" comment="python-libxml2 is &lt;2.9.4-39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550330" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550331" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550332" version="1" comment="openldap2 is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550333" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550334" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533005" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-255.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533006" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-255.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550335" version="1" comment="libmicrohttpd10 is &lt;0.9.30-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550336" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550337" version="1" comment="libQt5Core5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550338" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550339" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550340" version="1" comment="libQt5Network5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550341" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550342" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550343" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550344" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550345" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550346" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550347" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550348" version="1" comment="libQt5Test5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550349" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550350" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550351" version="1" comment="libQtQuick5 is &lt;5.6.1-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550352" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550353" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550354" version="1" comment="netpbm is &lt;10.66.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550355" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550356" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550357" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550358" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550359" version="1" comment="apache2 is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533029" version="1" comment="apache2-doc is &lt;2.4.23-16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550360" version="1" comment="apache2-example-pages is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550361" version="1" comment="apache2-prefork is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550362" version="1" comment="apache2-utils is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550363" version="1" comment="apache2-worker is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550364" version="1" comment="glibc is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550365" version="1" comment="glibc-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550366" version="1" comment="glibc-devel is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550367" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533036" version="1" comment="glibc-html is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518742" version="1" comment="glibc-i18ndata is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533037" version="1" comment="glibc-info is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550368" version="1" comment="glibc-locale is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550369" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550370" version="1" comment="glibc-profile is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550371" version="1" comment="glibc-profile-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550372" version="1" comment="nscd is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550373" version="1" comment="kernel-default is &lt;4.4.59-92.20.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550374" version="1" comment="kernel-default-base is &lt;4.4.59-92.20.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550375" version="1" comment="kernel-default-devel is &lt;4.4.59-92.20.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550376" version="1" comment="kernel-default-man is &lt;4.4.59-92.20.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518749" version="1" comment="kernel-devel is &lt;4.4.59-92.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518750" version="1" comment="kernel-macros is &lt;4.4.59-92.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518751" version="1" comment="kernel-source is &lt;4.4.59-92.20.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550377" version="1" comment="kernel-syms is &lt;4.4.59-92.20.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550378" version="1" comment="openvpn is &lt;2.3.8-16.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550379" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550380" version="1" comment="gd is &lt;2.1.0-24.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536455" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536456" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536457" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536458" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536459" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536460" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536461" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536462" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536463" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536464" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536465" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550381" version="1" comment="libxmltooling6 is &lt;1.5.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550382" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536466" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536467" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536468" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536469" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550383" version="1" comment="glibc is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550385" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550387" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550389" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550391" version="1" comment="nscd is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545508" version="1" comment="git-core is &lt;2.12.3-27.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550392" version="1" comment="kernel-default is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550393" version="1" comment="kernel-default-base is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550394" version="1" comment="kernel-default-devel is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550395" version="1" comment="kernel-default-man is &lt;4.4.103-92.56.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518759" version="1" comment="kernel-devel is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518760" version="1" comment="kernel-macros is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518761" version="1" comment="kernel-source is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550396" version="1" comment="kernel-syms is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550397" version="1" comment="libvirt is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550398" version="1" comment="libvirt-client is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550399" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550400" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550401" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550402" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550403" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550404" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550405" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550406" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550407" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550408" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550409" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550410" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550411" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550412" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550413" version="1" comment="libvirt-doc is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550414" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550415" version="1" comment="libvirt-nss is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548176" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548177" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548178" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548179" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545518" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545519" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545520" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545521" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545522" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550416" version="1" comment="rsync is &lt;3.1.0-13.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548180" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541516" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550417" version="1" comment="procmail is &lt;3.22-269.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545536" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541517" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545537" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548186" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548187" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548189" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548190" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548194" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548195" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548196" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548197" version="1" comment="mariadb-tools is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545538" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545539" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545540" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550418" version="1" comment="kernel-default is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550419" version="1" comment="kernel-default-base is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550420" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550422" version="1" comment="kernel-syms is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550423" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550424" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550425" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550427" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550429" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536502" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536503" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536504" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536505" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536506" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536507" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536508" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536509" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536510" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545541" version="1" comment="perl is &lt;5.18.2-12.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545543" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550430" version="1" comment="libwireshark8 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550431" version="1" comment="libwiretap6 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550432" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550433" version="1" comment="libwsutil7 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550434" version="1" comment="wireshark is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550435" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550436" version="1" comment="shadow is &lt;4.2.1-27.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550437" version="1" comment="libexif12 is &lt;0.6.21-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550438" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536512" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550439" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550440" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550441" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536513" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536514" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536515" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550442" version="1" comment="curl is &lt;7.37.0-37.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550443" version="1" comment="libcurl4 is &lt;7.37.0-37.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550444" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533069" version="1" comment="libvorbis-doc is &lt;1.3.3-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550445" version="1" comment="libvorbis0 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550446" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550447" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550448" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550449" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550450" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550451" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550452" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550453" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550454" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550455" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550456" version="1" comment="transfig is &lt;3.2.5e-2.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550457" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550459" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550461" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550463" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550465" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550467" version="1" comment="libndr0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550469" version="1" comment="libnetapi0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550471" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550473" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550475" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550477" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550479" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550481" version="1" comment="libsamdb0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550483" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550485" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550487" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550489" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550491" version="1" comment="libwbclient0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550493" version="1" comment="samba is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550494" version="1" comment="samba-client is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550496" version="1" comment="samba-libs is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550498" version="1" comment="samba-winbind is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545660" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545661" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545662" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545663" version="1" comment="clamav is &lt;0.100.1-33.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550500" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550501" version="1" comment="kernel-default is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550502" version="1" comment="kernel-default-base is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550503" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550505" version="1" comment="kernel-syms is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536543" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536544" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536545" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536546" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536547" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536548" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536549" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536550" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536551" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536552" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536553" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550506" version="1" comment="clamav is &lt;0.99.3-33.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550507" version="1" comment="openssh is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550508" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550509" version="1" comment="openssh-fips is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550510" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550511" version="1" comment="gd is &lt;2.1.0-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550512" version="1" comment="apache2 is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533082" version="1" comment="apache2-doc is &lt;2.4.23-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550513" version="1" comment="apache2-example-pages is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550514" version="1" comment="apache2-prefork is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550515" version="1" comment="apache2-utils is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550516" version="1" comment="apache2-worker is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550517" version="1" comment="libvirt is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550518" version="1" comment="libvirt-client is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550519" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550520" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550521" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550522" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550523" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550524" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550525" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550526" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550527" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550528" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550529" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550530" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550531" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550532" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550533" version="1" comment="libvirt-doc is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550534" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550535" version="1" comment="libvirt-nss is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545750" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545751" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545752" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545753" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545756" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541609" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545757" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536577" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550536" version="1" comment="libzypp is &lt;16.17.20-27.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550537" version="1" comment="zypper is &lt;1.13.45-18.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545781" version="1" comment="openslp is &lt;2.0.0-18.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545783" version="1" comment="openslp-server is &lt;2.0.0-18.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550538" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550539" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550540" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550541" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550542" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545806" version="1" comment="gnutls is &lt;3.2.15-18.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545807" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545808" version="1" comment="libgnutls28 is &lt;3.2.15-18.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548300" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541626" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536585" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536586" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536587" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536588" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536589" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536590" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536591" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536592" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536593" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536594" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536595" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536596" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545810" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545811" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545812" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545813" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545814" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545815" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548301" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548302" version="1" comment="smt is &lt;3.0.37-52.23.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548303" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550543" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550544" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550546" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550548" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550549" version="1" comment="libncurses5 is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550550" version="1" comment="libncurses5-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550551" version="1" comment="libncurses6 is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550552" version="1" comment="libncurses6-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541322" version="1" comment="ncurses-devel is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550553" version="1" comment="ncurses-devel-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550554" version="1" comment="ncurses-utils is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550555" version="1" comment="tack is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550556" version="1" comment="terminfo is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550557" version="1" comment="terminfo-base is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550558" version="1" comment="qemu is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550559" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550560" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550561" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550563" version="1" comment="qemu-lang is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536606" version="1" comment="qemu-ppc is &lt;2.6.2-41.43.3 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550565" version="1" comment="qemu-tools is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545816" version="1" comment="ghostscript is &lt;9.25-23.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545817" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550566" version="1" comment="libsystemd0 is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550567" version="1" comment="libsystemd0-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550568" version="1" comment="libudev1 is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550569" version="1" comment="libudev1-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550570" version="1" comment="systemd is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550571" version="1" comment="systemd-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518816" version="1" comment="systemd-bash-completion is &lt;228-150.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550572" version="1" comment="systemd-sysvinit is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550573" version="1" comment="udev is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545818" version="1" comment="openslp is &lt;2.0.0-18.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545820" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548314" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548315" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548316" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548317" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545821" version="1" comment="cups-filters is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545822" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545823" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545824" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545825" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545826" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545827" version="1" comment="libecpg6 is &lt;10.5-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545828" version="1" comment="libpq5 is &lt;10.5-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545830" version="1" comment="postgresql10 is &lt;10.5-1.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545831" version="1" comment="postgresql10-contrib is &lt;10.5-1.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545832" version="1" comment="postgresql10-server is &lt;10.5-1.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550574" version="1" comment="kernel-default is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550575" version="1" comment="kernel-default-base is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550576" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550578" version="1" comment="kernel-syms is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536620" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;1-3.4.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550579" version="1" comment="bind is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550580" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533101" version="1" comment="bind-doc is &lt;9.9.9P1-63.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550581" version="1" comment="bind-libs is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548322" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550582" version="1" comment="bind-utils is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536621" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536622" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536623" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536624" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536625" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536626" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536627" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536628" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536629" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536630" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536631" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550583" version="1" comment="openvswitch is &lt;2.5.1-25.12.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550584" version="1" comment="openvswitch-dpdk is &lt;2.5.1-25.12.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550585" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-25.12.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550586" version="1" comment="openvswitch-switch is &lt;2.5.1-25.12.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545846" version="1" comment="binutils is &lt;2.31-9.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550587" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550588" version="1" comment="ecryptfs-utils is &lt;103-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550589" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548351" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548352" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545885" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545886" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545887" version="1" comment="postgresql96-server is &lt;9.6.10-3.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550590" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550591" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545888" version="1" comment="clamav is &lt;0.100.2-33.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548353" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548355" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548356" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548357" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550592" version="1" comment="libsndfile1 is &lt;1.0.25-36.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550593" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548358" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548359" version="1" comment="smt is &lt;3.0.38-52.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548360" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536642" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550594" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550595" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550596" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550597" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550598" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545890" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545891" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545892" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545893" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545894" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545895" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545896" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545897" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545898" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545899" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548361" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545900" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545902" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545904" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545906" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545908" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545911" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545913" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545916" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545918" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550599" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550600" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550601" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550602" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550603" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550604" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550605" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550606" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550607" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550608" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545922" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545923" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545924" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550609" version="1" comment="libsystemd0 is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550611" version="1" comment="libudev1 is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550613" version="1" comment="systemd is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550615" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550616" version="1" comment="udev is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536662" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536663" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536664" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536665" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536666" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536667" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536668" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536669" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536670" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536671" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550617" version="1" comment="qemu is &lt;2.6.2-41.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533120" version="1" comment="qemu-arm is &lt;2.6.2-41.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550618" version="1" comment="qemu-block-curl is &lt;2.6.2-41.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550619" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550620" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550621" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518844" version="1" comment="qemu-ipxe is &lt;1.0.0-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550622" version="1" comment="qemu-kvm is &lt;2.6.2-41.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550623" version="1" comment="qemu-lang is &lt;2.6.2-41.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550624" version="1" comment="qemu-ppc is &lt;2.6.2-41.31.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550625" version="1" comment="qemu-s390 is &lt;2.6.2-41.31.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518846" version="1" comment="qemu-seabios is &lt;1.9.1-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518847" version="1" comment="qemu-sgabios is &lt;8-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550626" version="1" comment="qemu-tools is &lt;2.6.2-41.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518849" version="1" comment="qemu-vgabios is &lt;1.9.1-41.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518850" version="1" comment="qemu-x86 is &lt;2.6.2-41.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550627" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550628" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550629" version="1" comment="mariadb is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550630" version="1" comment="mariadb-client is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550631" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550632" version="1" comment="mariadb-tools is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550633" version="1" comment="libvirt is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550634" version="1" comment="libvirt-client is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550635" version="1" comment="libvirt-daemon is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550636" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550637" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550638" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518865" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550639" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550640" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550641" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550642" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550643" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550644" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550645" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550646" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550647" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518875" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550648" version="1" comment="libvirt-doc is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550649" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550650" version="1" comment="libvirt-nss is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550651" version="1" comment="libxml2-2 is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550652" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533151" version="1" comment="libxml2-doc is &lt;2.9.4-46.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550653" version="1" comment="libxml2-tools is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550654" version="1" comment="python-libxml2 is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550655" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550656" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550658" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550660" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545949" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545950" version="1" comment="rpm is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545952" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545953" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550661" version="1" comment="ghostscript is &lt;9.15-23.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550662" version="1" comment="ghostscript-x11 is &lt;9.15-23.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545954" version="1" comment="postgresql94 is &lt;9.4.19-21.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545955" version="1" comment="postgresql94-contrib is &lt;9.4.19-21.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545956" version="1" comment="postgresql94-server is &lt;9.4.19-21.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550663" version="1" comment="openssh is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550664" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550665" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550666" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545971" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541807" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545972" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550667" version="1" comment="kernel-default is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550668" version="1" comment="kernel-default-base is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550669" version="1" comment="kernel-default-devel is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550670" version="1" comment="kernel-default-man is &lt;4.4.114-92.64.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518886" version="1" comment="kernel-devel is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518887" version="1" comment="kernel-macros is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518888" version="1" comment="kernel-source is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550671" version="1" comment="kernel-syms is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550672" version="1" comment="ft2demos is &lt;2.6.3-7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550673" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550674" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550675" version="1" comment="ipsec-tools is &lt;0.8.0-19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550676" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550677" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548395" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541816" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545983" version="1" comment="ghostscript is &lt;9.26-23.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545984" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545985" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545986" version="1" comment="git-core is &lt;2.12.3-27.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536695" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536696" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536697" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536698" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536699" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536700" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536701" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550678" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550679" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550680" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550681" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550682" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550683" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550684" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550685" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550686" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550687" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550688" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550689" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550690" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550691" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550692" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546018" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546019" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546020" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546021" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546023" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546025" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546028" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546030" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546033" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546035" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550693" version="1" comment="qemu is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550694" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550695" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550696" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550698" version="1" comment="qemu-lang is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536732" version="1" comment="qemu-ppc is &lt;2.6.2-41.46.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550700" version="1" comment="qemu-tools is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546036" version="1" comment="mailman is &lt;2.1.17-3.3.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550701" version="1" comment="glibc is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550702" version="1" comment="glibc-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550703" version="1" comment="glibc-devel is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550704" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533165" version="1" comment="glibc-html is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518946" version="1" comment="glibc-i18ndata is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533166" version="1" comment="glibc-info is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550705" version="1" comment="glibc-locale is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550706" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550707" version="1" comment="glibc-profile is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550708" version="1" comment="glibc-profile-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550709" version="1" comment="nscd is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550710" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550711" version="1" comment="libospf0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550712" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550713" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550714" version="1" comment="libzebra1 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550715" version="1" comment="quagga is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550716" version="1" comment="p7zip is &lt;9.20.1-7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550717" version="1" comment="dovecot22 is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550718" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550719" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550720" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518951" version="1" comment="xen is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550721" version="1" comment="xen-doc-html is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518952" version="1" comment="xen-libs is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518953" version="1" comment="xen-libs-32bit is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550722" version="1" comment="xen-tools is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550723" version="1" comment="xen-tools-domU is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550724" version="1" comment="libecpg6 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550725" version="1" comment="libpq5 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550726" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550727" version="1" comment="postgresql96 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550728" version="1" comment="postgresql96-contrib is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533185" version="1" comment="postgresql96-docs is &lt;9.6.7-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550729" version="1" comment="postgresql96-server is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550730" version="1" comment="db48-utils is &lt;4.8.30-29.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550731" version="1" comment="libdb-4_8 is &lt;4.8.30-29.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550732" version="1" comment="libdb-4_8-32bit is &lt;4.8.30-29.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550733" version="1" comment="dhcp is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550734" version="1" comment="dhcp-client is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550735" version="1" comment="dhcp-relay is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550736" version="1" comment="dhcp-server is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550737" version="1" comment="libsystemd0 is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550738" version="1" comment="libsystemd0-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550739" version="1" comment="libudev1 is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550740" version="1" comment="libudev1-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550741" version="1" comment="systemd is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550742" version="1" comment="systemd-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518969" version="1" comment="systemd-bash-completion is &lt;228-150.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550743" version="1" comment="systemd-sysvinit is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550744" version="1" comment="udev is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550745" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550746" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550747" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550748" version="1" comment="openexr is &lt;2.1.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550749" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550750" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550751" version="1" comment="cups is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550752" version="1" comment="cups-client is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550753" version="1" comment="cups-libs is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546056" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550754" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550755" version="1" comment="squid is &lt;3.5.21-26.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550756" version="1" comment="augeas is &lt;1.2.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550757" version="1" comment="augeas-lenses is &lt;1.2.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550758" version="1" comment="libaugeas0 is &lt;1.2.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550759" version="1" comment="glibc is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550760" version="1" comment="glibc-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550761" version="1" comment="glibc-devel is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550762" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533214" version="1" comment="glibc-html is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519002" version="1" comment="glibc-i18ndata is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533215" version="1" comment="glibc-info is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550763" version="1" comment="glibc-locale is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550764" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550765" version="1" comment="glibc-profile is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550766" version="1" comment="glibc-profile-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550767" version="1" comment="nscd is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550768" version="1" comment="shadow is &lt;4.2.1-27.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548431" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.10-30.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535629" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.10-30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535631" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.10-30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550769" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550770" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550771" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550772" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550773" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550774" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550775" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550776" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550777" version="1" comment="postgresql94 is &lt;9.4.16-21.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550778" version="1" comment="postgresql94-contrib is &lt;9.4.16-21.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533230" version="1" comment="postgresql94-docs is &lt;9.4.16-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550779" version="1" comment="postgresql94-server is &lt;9.4.16-21.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519012" version="1" comment="kernel-firmware is &lt;20170530-21.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519013" version="1" comment="ucode-amd is &lt;20170530-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550780" version="1" comment="libcdio14 is &lt;0.90-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550781" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550782" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550783" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550784" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550785" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550786" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548438" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550787" version="1" comment="mariadb is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550788" version="1" comment="mariadb-client is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550789" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550790" version="1" comment="mariadb-tools is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519024" version="1" comment="ucode-intel is &lt;20180312-13.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550791" version="1" comment="kernel-default is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550792" version="1" comment="kernel-default-base is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550793" version="1" comment="kernel-default-devel is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550794" version="1" comment="kernel-default-man is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550795" version="1" comment="kernel-devel is &lt;4.4.103-92.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550796" version="1" comment="kernel-macros is &lt;4.4.103-92.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550797" version="1" comment="kernel-source is &lt;4.4.103-92.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550798" version="1" comment="kernel-syms is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550799" version="1" comment="libxmltooling6 is &lt;1.5.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550800" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546069" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535646" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546070" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535649" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550801" version="1" comment="crash is &lt;7.1.5-15.3.45 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550802" version="1" comment="crash-kmp-default is &lt;7.1.5_k4.4.114_92.67-15.3.45 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550803" version="1" comment="libecpg6 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550804" version="1" comment="libpq5 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550805" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550806" version="1" comment="postgresql96 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550807" version="1" comment="postgresql96-contrib is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533246" version="1" comment="postgresql96-docs is &lt;9.6.8-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550808" version="1" comment="postgresql96-server is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550809" version="1" comment="curl is &lt;7.37.0-37.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550810" version="1" comment="libcurl4 is &lt;7.37.0-37.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550811" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533250" version="1" comment="libvorbis-doc is &lt;1.3.3-10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550812" version="1" comment="libvorbis0 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550813" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550814" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550815" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550816" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550817" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550818" version="1" comment="kernel-default is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550819" version="1" comment="kernel-default-base is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550820" version="1" comment="kernel-default-devel is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550821" version="1" comment="kernel-default-man is &lt;4.4.120-92.70.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519042" version="1" comment="kernel-devel is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519043" version="1" comment="kernel-macros is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519044" version="1" comment="kernel-source is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550822" version="1" comment="kernel-syms is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550823" version="1" comment="clamav is &lt;0.99.4-33.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550824" version="1" comment="dhcp is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550825" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550826" version="1" comment="dhcp-relay is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550827" version="1" comment="dhcp-server is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533263" version="1" comment="tomcat is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533264" version="1" comment="tomcat-admin-webapps is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533265" version="1" comment="tomcat-docs-webapp is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533266" version="1" comment="tomcat-el-3_0-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533267" version="1" comment="tomcat-javadoc is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533268" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533269" version="1" comment="tomcat-lib is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533270" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533271" version="1" comment="tomcat-webapps is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550828" version="1" comment="libwireshark8 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550829" version="1" comment="libwiretap6 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550830" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550831" version="1" comment="libwsutil7 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550832" version="1" comment="wireshark is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550833" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550834" version="1" comment="glibc is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550835" version="1" comment="glibc-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550836" version="1" comment="glibc-devel is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550837" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533280" version="1" comment="glibc-html is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519059" version="1" comment="glibc-i18ndata is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533281" version="1" comment="glibc-info is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550838" version="1" comment="glibc-locale is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550839" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550840" version="1" comment="glibc-profile is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550841" version="1" comment="glibc-profile-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550842" version="1" comment="nscd is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550843" version="1" comment="librelp0 is &lt;1.2.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550844" version="1" comment="libvncclient0 is &lt;0.9.9-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550845" version="1" comment="libvncserver0 is &lt;0.9.9-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550846" version="1" comment="qemu is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533289" version="1" comment="qemu-arm is &lt;2.6.2-41.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550847" version="1" comment="qemu-block-curl is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550848" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550849" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550850" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519065" version="1" comment="qemu-ipxe is &lt;1.0.0-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550851" version="1" comment="qemu-kvm is &lt;2.6.2-41.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550852" version="1" comment="qemu-lang is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550853" version="1" comment="qemu-ppc is &lt;2.6.2-41.37.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550854" version="1" comment="qemu-s390 is &lt;2.6.2-41.37.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519067" version="1" comment="qemu-seabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519068" version="1" comment="qemu-sgabios is &lt;8-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550855" version="1" comment="qemu-tools is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519070" version="1" comment="qemu-vgabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519071" version="1" comment="qemu-x86 is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550856" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550857" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550858" version="1" comment="libdcerpc0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550859" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550860" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550861" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550862" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550863" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550864" version="1" comment="libndr-standard0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550865" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550866" version="1" comment="libndr0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550867" version="1" comment="libndr0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550868" version="1" comment="libnetapi0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550869" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550870" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550871" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550872" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550873" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550874" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550875" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550876" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550877" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550878" version="1" comment="libsamba-util0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550879" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550880" version="1" comment="libsamdb0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550881" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550882" version="1" comment="libsmbclient0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550883" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550884" version="1" comment="libsmbconf0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550885" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550886" version="1" comment="libsmbldap0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550887" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550888" version="1" comment="libtevent-util0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550889" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550890" version="1" comment="libwbclient0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550891" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550892" version="1" comment="samba is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550893" version="1" comment="samba-client is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550894" version="1" comment="samba-client-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519111" version="1" comment="samba-doc is &lt;4.4.2-38.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550895" version="1" comment="samba-libs is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550896" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550897" version="1" comment="samba-winbind is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550898" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550899" version="1" comment="memcached is &lt;1.4.39-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550900" version="1" comment="krb5 is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550901" version="1" comment="krb5-32bit is &lt;1.12.5-40.23.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550902" version="1" comment="krb5-client is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550903" version="1" comment="krb5-doc is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550904" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550905" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550906" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550907" version="1" comment="krb5-server is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550908" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550909" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550910" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550911" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550912" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550913" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550914" version="1" comment="libvirt is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550915" version="1" comment="libvirt-client is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550916" version="1" comment="libvirt-daemon is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550917" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550918" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550919" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519135" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550920" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550921" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550922" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550923" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550924" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550925" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550926" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550927" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550928" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550929" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519145" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550930" version="1" comment="libvirt-doc is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550931" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550932" version="1" comment="libvirt-nss is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550933" version="1" comment="libtiff5 is &lt;4.0.9-44.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550934" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550935" version="1" comment="tiff is &lt;4.0.9-44.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550936" version="1" comment="postgresql94 is &lt;9.4.17-21.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550937" version="1" comment="postgresql94-contrib is &lt;9.4.17-21.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533353" version="1" comment="postgresql94-docs is &lt;9.4.17-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550938" version="1" comment="postgresql94-server is &lt;9.4.17-21.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550939" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550940" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550941" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550942" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519157" version="1" comment="xen is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550943" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519158" version="1" comment="xen-libs is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519159" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550944" version="1" comment="xen-tools is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550945" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550946" version="1" comment="policycoreutils is &lt;2.5-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550947" version="1" comment="policycoreutils-python is &lt;2.5-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541426" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550948" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550949" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550950" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550951" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550952" version="1" comment="openssl is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533365" version="1" comment="openssl-doc is &lt;1.0.2j-60.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550953" version="1" comment="postgresql94 is &lt;9.4.15-21.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550954" version="1" comment="postgresql94-contrib is &lt;9.4.15-21.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533368" version="1" comment="postgresql94-docs is &lt;9.4.15-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550955" version="1" comment="postgresql94-server is &lt;9.4.15-21.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550956" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550957" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550958" version="1" comment="mariadb is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550959" version="1" comment="mariadb-client is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550960" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550961" version="1" comment="mariadb-tools is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536734" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536735" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536736" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536737" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536738" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536739" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536740" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536741" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536742" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536743" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536744" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550962" version="1" comment="openslp is &lt;2.0.0-18.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550963" version="1" comment="openslp-32bit is &lt;2.0.0-18.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550964" version="1" comment="openslp-server is &lt;2.0.0-18.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536745" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536746" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519174" version="1" comment="kernel-firmware is &lt;20170530-21.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519175" version="1" comment="ucode-amd is &lt;20170530-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550965" version="1" comment="apache2 is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550966" version="1" comment="apache2-example-pages is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550967" version="1" comment="apache2-prefork is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550968" version="1" comment="apache2-utils is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550969" version="1" comment="apache2-worker is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550970" version="1" comment="kernel-default is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550971" version="1" comment="kernel-default-base is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550972" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550974" version="1" comment="kernel-syms is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550975" version="1" comment="rsync is &lt;3.1.0-13.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550976" version="1" comment="libncurses5 is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550977" version="1" comment="libncurses5-32bit is &lt;5.9-55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550978" version="1" comment="libncurses6 is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550979" version="1" comment="libncurses6-32bit is &lt;5.9-55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541433" version="1" comment="ncurses-devel is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550980" version="1" comment="ncurses-devel-32bit is &lt;5.9-55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550981" version="1" comment="ncurses-utils is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550982" version="1" comment="tack is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550983" version="1" comment="terminfo is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550984" version="1" comment="terminfo-base is &lt;5.9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536757" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536758" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536759" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536760" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536761" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536762" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536763" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550985" version="1" comment="curl is &lt;7.37.0-37.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550986" version="1" comment="libcurl4 is &lt;7.37.0-37.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550987" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536764" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536765" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536766" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536767" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536768" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536769" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536770" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550988" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546202" version="1" comment="curl is &lt;7.37.0-37.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546203" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546205" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546206" version="1" comment="MozillaFirefox-devel is &lt;52.8.0esr-109.31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546207" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550989" version="1" comment="qemu is &lt;2.6.2-41.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550990" version="1" comment="qemu-block-curl is &lt;2.6.2-41.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550991" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550992" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550994" version="1" comment="qemu-lang is &lt;2.6.2-41.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536776" version="1" comment="qemu-ppc is &lt;2.6.2-41.40.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550996" version="1" comment="qemu-tools is &lt;2.6.2-41.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550997" version="1" comment="kernel-default is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550998" version="1" comment="kernel-default-base is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550999" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551001" version="1" comment="kernel-syms is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551002" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551003" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551004" version="1" comment="bash is &lt;4.3-83.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551005" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546245" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546246" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546248" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546257" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546258" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546259" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546260" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546261" version="1" comment="freeradius-server is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546262" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546263" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546264" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546265" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546266" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546267" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546268" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546269" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546270" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546271" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546272" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546274" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546275" version="1" comment="atftp is &lt;0.7.0-160.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551007" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551009" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551010" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551011" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551012" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551013" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551014" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551015" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551016" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551018" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551020" version="1" comment="openssl is &lt;1.0.2j-60.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551021" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551022" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551023" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551024" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551025" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551026" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551027" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551028" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551029" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551031" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551033" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551035" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551037" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551039" version="1" comment="libndr0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551041" version="1" comment="libnetapi0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551043" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551045" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551047" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551049" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551051" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551053" version="1" comment="libsamdb0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551055" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551057" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551059" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551061" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551063" version="1" comment="libwbclient0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551065" version="1" comment="samba is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551066" version="1" comment="samba-client is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551068" version="1" comment="samba-libs is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551070" version="1" comment="samba-winbind is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548547" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548548" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548549" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548550" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551072" version="1" comment="libsystemd0 is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551074" version="1" comment="libudev-devel is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551075" version="1" comment="libudev1 is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551077" version="1" comment="systemd is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551079" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551080" version="1" comment="udev is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551081" version="1" comment="qemu is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551082" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551083" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551084" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551086" version="1" comment="qemu-lang is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536858" version="1" comment="qemu-ppc is &lt;2.6.2-41.52.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551088" version="1" comment="qemu-tools is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551089" version="1" comment="kernel-default is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551090" version="1" comment="kernel-default-base is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551091" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551093" version="1" comment="kernel-syms is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536864" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;1-3.5.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551094" version="1" comment="openssh is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551095" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551096" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551097" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546364" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542012" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546365" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551098" version="1" comment="libsystemd0 is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551100" version="1" comment="libudev1 is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551102" version="1" comment="systemd is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551104" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551105" version="1" comment="udev is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546373" version="1" comment="curl is &lt;7.37.0-37.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546374" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546376" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546377" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546378" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546379" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546380" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546381" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546382" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548569" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548570" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548572" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548573" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536890" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536891" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551106" version="1" comment="libvirt is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551107" version="1" comment="libvirt-client is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551108" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551109" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551110" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551111" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551112" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551113" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551114" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551115" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551116" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551117" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551118" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551119" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551120" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551121" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551122" version="1" comment="libvirt-doc is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551123" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551124" version="1" comment="libvirt-nss is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548574" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548576" version="1" comment="python is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548578" version="1" comment="python-base is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548580" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548581" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548582" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548583" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548584" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548585" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548586" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546406" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546407" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546408" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546416" version="1" comment="gvim is &lt;7.4.326-17.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546417" version="1" comment="vim is &lt;7.4.326-17.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551125" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551126" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551127" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551128" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551129" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551130" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551131" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551132" version="1" comment="openssh is &lt;7.2p2-74.42.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551133" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551134" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551135" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551136" version="1" comment="kernel-default is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551137" version="1" comment="kernel-default-base is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551138" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551140" version="1" comment="kernel-syms is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536941" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546447" version="1" comment="dbus-1 is &lt;1.8.22-24.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546448" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546449" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551141" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551142" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551143" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551145" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551147" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551148" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551150" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551151" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551152" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551153" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551154" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551156" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548609" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548611" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546463" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548612" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542060" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536962" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536963" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536964" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536965" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536966" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536967" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536968" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546473" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546474" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546475" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551161" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551162" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551164" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551166" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551168" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551170" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536978" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546508" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546509" version="1" comment="libpq5 is &lt;10.9-1.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546511" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546512" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546513" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546514" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546515" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546516" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551172" version="1" comment="kernel-default is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551173" version="1" comment="kernel-default-base is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551174" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551176" version="1" comment="kernel-syms is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536991" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551177" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551178" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551180" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551182" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551184" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551186" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551188" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.9.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548630" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548631" version="1" comment="MozillaFirefox-devel is &lt;60.8.0-109.83.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548632" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548633" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548635" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548637" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548639" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548641" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548643" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548646" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548648" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546528" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546529" version="1" comment="polkit is &lt;0.113-5.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546530" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537013" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537014" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537015" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537016" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537017" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537018" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537019" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548654" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548655" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551189" version="1" comment="glibc is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551191" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551193" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551195" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551197" version="1" comment="nscd is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548657" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548658" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548660" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548661" version="1" comment="polkit is &lt;0.113-5.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548662" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548663" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548664" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548665" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548666" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548668" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548673" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548674" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548675" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548676" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548677" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548678" version="1" comment="python3 is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548679" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551198" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551199" version="1" comment="evince is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551200" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551201" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551202" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551203" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551204" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551205" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551206" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551207" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551208" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551209" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551210" version="1" comment="squid is &lt;3.5.21-26.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548680" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548682" version="1" comment="python is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548684" version="1" comment="python-base is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548686" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548687" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548688" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548689" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548690" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548691" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548692" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551211" version="1" comment="libvirt is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551212" version="1" comment="libvirt-client is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551213" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551214" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551215" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551216" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551217" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551218" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551219" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551220" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551221" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551222" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551223" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551224" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551225" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551226" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551227" version="1" comment="libvirt-doc is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551228" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551229" version="1" comment="libvirt-nss is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551230" version="1" comment="qemu is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551231" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551232" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551233" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551235" version="1" comment="qemu-lang is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537091" version="1" comment="qemu-ppc is &lt;2.6.2-41.55.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551237" version="1" comment="qemu-tools is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548696" version="1" comment="postgresql94 is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548697" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548698" version="1" comment="postgresql94-plperl is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548699" version="1" comment="postgresql94-plpython is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548700" version="1" comment="postgresql94-pltcl is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548701" version="1" comment="postgresql94-server is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548702" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548703" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548704" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548705" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548706" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548707" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537105" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548721" version="1" comment="perl is &lt;5.18.2-12.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548723" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551238" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551239" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551240" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551241" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551242" version="1" comment="zypper is &lt;1.13.54-18.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551243" version="1" comment="kernel-default is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551244" version="1" comment="kernel-default-base is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551245" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551247" version="1" comment="kernel-syms is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537117" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548727" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542250" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548728" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548729" version="1" comment="curl is &lt;7.37.0-37.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548730" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551248" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551249" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551250" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551251" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551252" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551253" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551254" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548732" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542257" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551255" version="1" comment="ibus is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551256" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551257" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551258" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551259" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551260" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551261" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551263" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551265" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546546" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546547" version="1" comment="python3 is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546548" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551266" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548743" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548744" version="1" comment="MozillaFirefox-devel is &lt;60.9.0-109.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548745" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548746" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548747" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548748" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548749" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548750" version="1" comment="ghostscript is &lt;9.27-23.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548751" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546549" version="1" comment="curl is &lt;7.37.0-37.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546550" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551267" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551269" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548752" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548754" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537160" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537161" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537162" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537163" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537164" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537165" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537166" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537167" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548756" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548757" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548758" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-109.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548759" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548760" version="1" comment="binutils is &lt;2.32-9.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548761" version="1" comment="binutils-devel is &lt;2.32-9.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551270" version="1" comment="sudo is &lt;1.8.10p3-10.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548763" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548764" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551271" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551272" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551273" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537180" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537181" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537182" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537183" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537184" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537185" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537186" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548768" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548769" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-109.95.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548770" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551274" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551275" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551277" version="1" comment="libdcerpc0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551279" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551281" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551283" version="1" comment="libndr-standard0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551285" version="1" comment="libndr0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551287" version="1" comment="libnetapi0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551289" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551291" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551293" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551295" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551297" version="1" comment="libsamba-util0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551299" version="1" comment="libsamdb0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551301" version="1" comment="libsmbclient0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551303" version="1" comment="libsmbconf0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551305" version="1" comment="libsmbldap0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551307" version="1" comment="libtevent-util0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551309" version="1" comment="libwbclient0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551311" version="1" comment="samba is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551312" version="1" comment="samba-client is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551314" version="1" comment="samba-libs is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551316" version="1" comment="samba-winbind is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548818" version="1" comment="gdb is &lt;8.3.1-1.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548819" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551318" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548826" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548827" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548829" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548830" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548832" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548836" version="1" comment="ghostscript is &lt;9.27-23.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548837" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551320" version="1" comment="kernel-default is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551321" version="1" comment="kernel-default-base is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551322" version="1" comment="kernel-default-devel is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551324" version="1" comment="kernel-syms is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537227" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548838" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548840" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548841" version="1" comment="cups is &lt;1.7.5-20.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548842" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548843" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548845" version="1" comment="clamav is &lt;0.100.3-33.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548846" version="1" comment="mailman is &lt;2.1.17-3.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548847" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548848" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548849" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548850" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546552" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546553" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548851" version="1" comment="clamav is &lt;0.100.3-33.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551325" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537243" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537244" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537245" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537246" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537247" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537248" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548852" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548853" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548854" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548855" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548856" version="1" comment="git-core is &lt;2.12.3-27.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548857" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548858" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-109.98.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548859" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546570" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546571" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546572" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546573" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546574" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546576" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546578" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546580" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546582" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546584" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546587" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546589" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537265" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537266" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537267" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537268" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537269" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537270" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537271" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537272" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537273" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551326" version="1" comment="libblkid1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551328" version="1" comment="libfdisk1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551329" version="1" comment="libmount1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551331" version="1" comment="libsmartcols1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551332" version="1" comment="libuuid1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551334" version="1" comment="python-libmount is &lt;2.28-44.18.38 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551335" version="1" comment="util-linux is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551336" version="1" comment="util-linux-systemd is &lt;2.28-44.18.25 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551337" version="1" comment="uuidd is &lt;2.28-44.18.25 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551338" version="1" comment="libsystemd0 is &lt;228-150.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551340" version="1" comment="libudev1 is &lt;228-150.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551342" version="1" comment="systemd is &lt;228-150.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551344" version="1" comment="systemd-sysvinit is &lt;228-150.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551345" version="1" comment="udev is &lt;228-150.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551346" version="1" comment="kernel-default is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551347" version="1" comment="kernel-default-base is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551348" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551350" version="1" comment="kernel-syms is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537292" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546605" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546606" version="1" comment="procps is &lt;3.3.9-11.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546621" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548896" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548898" version="1" comment="python is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548900" version="1" comment="python-base is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548902" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548903" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548905" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548906" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548907" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548908" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551351" version="1" comment="qemu is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551352" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551353" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551354" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551356" version="1" comment="qemu-lang is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537310" version="1" comment="qemu-ppc is &lt;2.6.2-41.49.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551358" version="1" comment="qemu-tools is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546622" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546623" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546624" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546625" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551359" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551360" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551361" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551362" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551363" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551364" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551365" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551366" version="1" comment="libvirt is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551367" version="1" comment="libvirt-client is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551368" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551369" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551370" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551371" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551372" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551373" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551374" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551375" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551376" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551377" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551378" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551379" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551380" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551381" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551382" version="1" comment="libvirt-doc is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551383" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551384" version="1" comment="libvirt-nss is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548938" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548939" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548940" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548941" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551385" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551386" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551387" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551388" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551389" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546654" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546655" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546656" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542123" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546657" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548942" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542124" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546670" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537359" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537360" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537361" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537362" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537363" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537364" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546672" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546673" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537367" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548943" version="1" comment="ntp is &lt;4.2.8p13-85.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548944" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537370" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551390" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551391" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551393" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551395" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551396" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551397" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551398" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551399" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551400" version="1" comment="sssd is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551402" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551403" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551404" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551405" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551406" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551407" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551408" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551409" version="1" comment="kernel-default is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551410" version="1" comment="kernel-default-base is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551411" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551413" version="1" comment="kernel-syms is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537391" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551414" version="1" comment="bash is &lt;4.3-83.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551415" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546683" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546684" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546685" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551417" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551418" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551419" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551420" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551421" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546692" version="1" comment="clamav is &lt;0.100.3-33.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546696" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546697" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546698" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546699" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548950" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548952" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537409" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546709" version="1" comment="wget is &lt;1.14-21.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546710" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546711" version="1" comment="python3 is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546712" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551422" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546716" version="1" comment="curl is &lt;7.37.0-37.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546717" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548953" version="1" comment="cups is &lt;1.7.5-20.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548954" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548955" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548962" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551423" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551424" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551425" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551426" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551427" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551428" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551429" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548964" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548965" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548966" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548967" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548968" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548969" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548970" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548972" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551430" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551432" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551433" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551434" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551435" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551436" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551437" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551438" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551439" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551440" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551441" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551442" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548978" version="1" comment="ghostscript is &lt;9.52-23.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548979" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548980" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548981" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548982" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-109.119.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548983" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551443" version="1" comment="squid is &lt;3.5.21-26.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551444" version="1" comment="kernel-default is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551445" version="1" comment="kernel-default-base is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551446" version="1" comment="kernel-default-devel is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551448" version="1" comment="kernel-syms is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537459" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551449" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551450" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551451" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551452" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551453" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548984" version="1" comment="git-core is &lt;2.26.2-27.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548985" version="1" comment="mailman is &lt;2.1.17-3.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537467" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537468" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537469" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537470" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537471" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537472" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548994" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548996" version="1" comment="python is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548998" version="1" comment="python-base is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549000" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549001" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549002" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549003" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549004" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549005" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549006" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551454" version="1" comment="qemu is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551455" version="1" comment="qemu-block-curl is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551456" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551457" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551459" version="1" comment="qemu-lang is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537488" version="1" comment="qemu-ppc is &lt;2.6.2-41.59.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551461" version="1" comment="qemu-tools is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551462" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551463" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549007" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551464" version="1" comment="gvim is &lt;7.4.326-17.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551465" version="1" comment="vim is &lt;7.4.326-17.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551466" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551467" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-109.123.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551468" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551469" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551470" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551471" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551472" version="1" comment="yast2-ruby-bindings is &lt;3.1.53-9.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551473" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551474" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551475" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551476" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551477" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551478" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551479" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551480" version="1" comment="kernel-default is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551481" version="1" comment="kernel-default-base is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551482" version="1" comment="kernel-default-devel is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551484" version="1" comment="kernel-syms is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537513" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551485" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551486" version="1" comment="libadns1 is &lt;1.4-103.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551487" version="1" comment="perl is &lt;5.18.2-12.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551489" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551490" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542540" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551491" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551492" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542541" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551493" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551494" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551495" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551496" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551497" version="1" comment="curl is &lt;7.37.0-37.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551498" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537529" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537530" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537531" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537532" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537533" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551500" version="1" comment="mutt is &lt;1.10.1-55.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551501" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,ppc64le,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551502" version="1" comment="ntp is &lt;4.2.8p15-88.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551503" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551504" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551506" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551508" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551510" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551512" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551514" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551516" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551518" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551520" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551521" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551523" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551524" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551525" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551526" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551527" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551528" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551529" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551530" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551531" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551532" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551533" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551535" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537561" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537562" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551536" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551537" version="1" comment="squid is &lt;3.5.21-26.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537565" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537566" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537567" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537568" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537569" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551538" version="1" comment="mailman is &lt;2.1.17-3.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551539" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551540" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551541" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551542" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551543" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551544" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551545" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551546" version="1" comment="grub2 is &lt;2.02~beta2-115.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537579" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-115.49.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551548" version="1" comment="ghostscript is &lt;9.52-23.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551549" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551550" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551551" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551552" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551553" version="1" comment="libX11-6 is &lt;1.6.2-12.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551555" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551557" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551559" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551561" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551563" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551565" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551566" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551568" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551569" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551571" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551573" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551574" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551576" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551577" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551579" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551580" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551582" version="1" comment="kernel-default is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551583" version="1" comment="kernel-default-base is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551584" version="1" comment="kernel-default-devel is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551586" version="1" comment="kernel-syms is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537606" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551587" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551588" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551589" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551591" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551593" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551595" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551596" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551597" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551598" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551599" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551600" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551601" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551602" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551603" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551604" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551605" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551606" version="1" comment="grub2 is &lt;2.02~beta2-115.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537624" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-115.56.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551608" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551610" version="1" comment="libdcerpc0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551612" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551614" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551616" version="1" comment="libndr-standard0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551618" version="1" comment="libndr0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551620" version="1" comment="libnetapi0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551622" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551624" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551626" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551628" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551630" version="1" comment="libsamba-util0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551632" version="1" comment="libsamdb0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551634" version="1" comment="libsmbclient0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551636" version="1" comment="libsmbconf0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551638" version="1" comment="libsmbldap0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551640" version="1" comment="libtevent-util0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551642" version="1" comment="libwbclient0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551644" version="1" comment="samba is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551645" version="1" comment="samba-client is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551647" version="1" comment="samba-libs is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551649" version="1" comment="samba-winbind is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551651" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551652" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551653" version="1" comment="freeradius-server is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551654" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551655" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551656" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551657" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551658" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551659" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551660" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551661" version="1" comment="freeradius-server-python is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551662" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551663" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549012" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542568" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.0-30.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551664" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551665" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551666" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551667" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551668" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551669" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551670" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551671" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542898" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551672" version="1" comment="squid is &lt;3.5.21-26.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551673" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551675" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551677" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542900" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551678" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537677" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537678" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537679" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537680" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537681" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551679" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551680" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551681" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551682" version="1" comment="kernel-default is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551683" version="1" comment="kernel-default-base is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551684" version="1" comment="kernel-default-devel is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551686" version="1" comment="kernel-syms is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537689" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549013" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549014" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549015" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549016" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551687" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551688" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551689" version="1" comment="python3 is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551690" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551691" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551692" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551693" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551695" version="1" comment="libdcerpc0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551697" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551699" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551701" version="1" comment="libndr-standard0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551703" version="1" comment="libndr0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551705" version="1" comment="libnetapi0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551707" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551709" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551711" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551713" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551715" version="1" comment="libsamba-util0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551717" version="1" comment="libsamdb0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551719" version="1" comment="libsmbclient0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551721" version="1" comment="libsmbconf0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551723" version="1" comment="libsmbldap0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551725" version="1" comment="libtevent-util0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551727" version="1" comment="libwbclient0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551729" version="1" comment="samba is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551730" version="1" comment="samba-client is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551732" version="1" comment="samba-libs is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551734" version="1" comment="samba-winbind is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551736" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551737" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551738" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551739" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551740" version="1" comment="libQt5Core5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551741" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551742" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551743" version="1" comment="libQt5Network5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551744" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551745" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551746" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551747" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551748" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551749" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551750" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551751" version="1" comment="libQt5Test5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551752" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551753" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551754" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551755" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551756" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551757" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551758" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551759" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551760" version="1" comment="tigervnc is &lt;1.6.0-27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551761" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551762" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551764" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551766" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551767" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551768" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551769" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551771" version="1" comment="glibc is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551773" version="1" comment="glibc-devel is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551775" version="1" comment="glibc-locale is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551777" version="1" comment="glibc-profile is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551779" version="1" comment="nscd is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551780" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551781" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551782" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551783" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551785" version="1" comment="libdcerpc0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551787" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551789" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551791" version="1" comment="libndr-standard0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551793" version="1" comment="libndr0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551795" version="1" comment="libnetapi0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551797" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551799" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551801" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551803" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551805" version="1" comment="libsamba-util0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551807" version="1" comment="libsamdb0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551809" version="1" comment="libsmbclient0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551811" version="1" comment="libsmbconf0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551813" version="1" comment="libsmbldap0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551815" version="1" comment="libtevent-util0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551817" version="1" comment="libwbclient0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551819" version="1" comment="samba is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551820" version="1" comment="samba-client is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551822" version="1" comment="samba-libs is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551824" version="1" comment="samba-winbind is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551826" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551827" version="1" comment="libvirt is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551828" version="1" comment="libvirt-client is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551829" version="1" comment="libvirt-daemon is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551830" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551831" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551832" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551833" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551834" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551835" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551836" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551837" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551838" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551839" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551840" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551841" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551842" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551843" version="1" comment="libvirt-doc is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551844" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551845" version="1" comment="libvirt-nss is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551846" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551847" version="1" comment="libQt5Core5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551848" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551849" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551850" version="1" comment="libQt5Network5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551851" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551852" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551853" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551854" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551855" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551856" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551857" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551858" version="1" comment="libQt5Test5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551859" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551860" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551861" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551862" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551863" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551864" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537825" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537826" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537827" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537828" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537829" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551865" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551867" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551869" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551871" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551873" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551875" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551877" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537837" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551879" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537839" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551881" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551883" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551884" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537843" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551885" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551887" version="1" comment="libsystemd0 is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551889" version="1" comment="libudev-devel is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551890" version="1" comment="libudev1 is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551892" version="1" comment="systemd is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551894" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551895" version="1" comment="udev is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551896" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551897" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551898" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551899" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551900" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551902" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551903" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551904" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551905" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551906" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551907" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551908" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551909" version="1" comment="libecpg6 is &lt;12.4-3.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551910" version="1" comment="libpq5 is &lt;12.4-3.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551912" version="1" comment="postgresql10 is &lt;10.14-4.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551913" version="1" comment="postgresql10-contrib is &lt;10.14-4.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551914" version="1" comment="postgresql10-plperl is &lt;10.14-4.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551915" version="1" comment="postgresql10-plpython is &lt;10.14-4.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551916" version="1" comment="postgresql10-pltcl is &lt;10.14-4.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551917" version="1" comment="postgresql10-server is &lt;10.14-4.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551918" version="1" comment="postgresql94 is &lt;9.4.26-24.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551919" version="1" comment="postgresql94-contrib is &lt;9.4.26-24.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551920" version="1" comment="postgresql94-plperl is &lt;9.4.26-24.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551921" version="1" comment="postgresql94-plpython is &lt;9.4.26-24.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551922" version="1" comment="postgresql94-pltcl is &lt;9.4.26-24.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551923" version="1" comment="postgresql94-server is &lt;9.4.26-24.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551924" version="1" comment="postgresql96 is &lt;9.6.19-6.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551925" version="1" comment="postgresql96-contrib is &lt;9.6.19-6.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551926" version="1" comment="postgresql96-plperl is &lt;9.6.19-6.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551927" version="1" comment="postgresql96-plpython is &lt;9.6.19-6.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551928" version="1" comment="postgresql96-pltcl is &lt;9.6.19-6.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551929" version="1" comment="postgresql96-server is &lt;9.6.19-6.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551930" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551931" version="1" comment="libzypp is &lt;16.21.2-27.70.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551932" version="1" comment="libzypp-devel is &lt;16.21.2-27.70.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551933" version="1" comment="zypper is &lt;1.13.57-18.46.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551934" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551936" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551937" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551938" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551939" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551940" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551941" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537895" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537896" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537897" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537898" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537899" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551942" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551943" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551944" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551945" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551946" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551947" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551948" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551949" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551950" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551951" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551952" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551953" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551954" version="1" comment="kernel-default is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551955" version="1" comment="kernel-default-base is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551956" version="1" comment="kernel-default-devel is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551958" version="1" comment="kernel-syms is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537916" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551959" version="1" comment="bluez is &lt;5.13-5.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551960" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551961" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551962" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551963" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551964" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551965" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551966" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551967" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551968" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551969" version="1" comment="python3 is &lt;3.4.10-25.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551970" version="1" comment="python3-base is &lt;3.4.10-25.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551971" version="1" comment="python3-curses is &lt;3.4.10-25.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551972" version="1" comment="python3-devel is &lt;3.4.10-25.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551973" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551974" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551975" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551976" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551977" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551978" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551979" version="1" comment="libpq5 is &lt;12.5-3.9.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551981" version="1" comment="mutt is &lt;1.10.1-55.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537939" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537940" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537941" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537942" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537943" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551982" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551983" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551985" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551987" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551988" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551990" version="1" comment="python is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551992" version="1" comment="python-base is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551994" version="1" comment="python-curses is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551995" version="1" comment="python-demo is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551996" version="1" comment="python-devel is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551997" version="1" comment="python-gdbm is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551998" version="1" comment="python-idle is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551999" version="1" comment="python-tk is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552000" version="1" comment="python-xml is &lt;2.7.17-28.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549026" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549027" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-109.106.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549028" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552001" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552002" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552003" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552004" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552005" version="1" comment="libspice-controller0 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552006" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552007" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552008" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552009" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552010" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552011" version="1" comment="clamav is &lt;0.103.0-33.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552012" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552014" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552016" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552017" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552019" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552021" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552023" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549030" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549032" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549034" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549036" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549038" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549040" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549042" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537986" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537987" version="1" comment="libquadmath0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549044" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549046" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537990" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549047" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552025" version="1" comment="sudo is &lt;1.8.10p3-10.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549059" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542713" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549060" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549061" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552026" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552027" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552029" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552031" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549063" version="1" comment="ppp is &lt;2.4.7-4.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549064" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549065" version="1" comment="python3 is &lt;3.4.10-25.39.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549066" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549067" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549068" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549070" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549075" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549076" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549077" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549078" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549079" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542719" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549080" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552032" version="1" comment="rsyslog is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552033" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552034" version="1" comment="rsyslog-doc is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552035" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552036" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552037" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552038" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552039" version="1" comment="rsyslog-module-relp is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552040" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552041" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549086" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542735" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552042" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549087" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549089" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549090" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549091" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549092" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549093" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549094" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549095" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549096" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549097" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549098" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552043" version="1" comment="squid is &lt;3.5.21-26.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549099" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549100" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-109.101.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549101" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549102" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549103" version="1" comment="libpq5 is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549105" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549106" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549107" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549108" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549109" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549110" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549111" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549112" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-109.110.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549113" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552044" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552045" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552046" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552047" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552048" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549119" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549120" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549121" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549122" version="1" comment="python3 is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549123" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549124" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549125" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538069" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538070" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538071" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538072" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538073" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538074" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549126" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549128" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549130" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549132" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549134" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549137" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549139" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549142" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549144" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552049" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552050" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549145" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549146" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-109.113.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549147" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549148" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549149" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-109.116.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549150" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549151" version="1" comment="git-core is &lt;2.26.0-27.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549152" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549153" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549154" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549155" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552052" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552053" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552054" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552056" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552057" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552058" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552059" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552060" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543165" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552061" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552062" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552063" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552064" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552065" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552066" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552067" version="1" comment="libpq5 is &lt;13.1-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552069" version="1" comment="openssh is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552070" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552071" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552072" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552073" version="1" comment="sudo is &lt;1.8.10p3-10.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552074" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552075" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552076" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552077" version="1" comment="openvswitch is &lt;2.5.11-25.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552078" version="1" comment="openvswitch-switch is &lt;2.5.11-25.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552079" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543206" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552080" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552081" version="1" comment="python3 is &lt;3.4.10-25.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552082" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552083" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552084" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538131" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538132" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538133" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538134" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538135" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552085" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552087" version="1" comment="python is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552089" version="1" comment="python-base is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552091" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552092" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552093" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552094" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552095" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552096" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552097" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552098" version="1" comment="kernel-default is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552099" version="1" comment="kernel-default-base is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552100" version="1" comment="kernel-default-devel is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552102" version="1" comment="kernel-syms is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538150" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552103" version="1" comment="openvswitch is &lt;2.5.11-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552104" version="1" comment="openvswitch-switch is &lt;2.5.11-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552105" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552106" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552108" version="1" comment="screen is &lt;4.0.4-23.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552109" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552110" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552111" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552113" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552114" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543223" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552115" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552116" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552117" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552118" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552119" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552120" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552121" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552122" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543254" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552123" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552124" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552125" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552126" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552127" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552128" version="1" comment="grub2 is &lt;2.02-115.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538177" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-115.59.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552130" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552132" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552133" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552134" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552135" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552136" version="1" comment="kernel-default is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552137" version="1" comment="kernel-default-base is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552138" version="1" comment="kernel-default-devel is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552140" version="1" comment="kernel-syms is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538188" version="1" comment="kgraft-patch-4_4_121-92_152-default is &lt;1-3.3.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552141" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552142" version="1" comment="git is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552143" version="1" comment="git-core is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552144" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552145" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552146" version="1" comment="git-email is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552147" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552148" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552149" version="1" comment="git-web is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552150" version="1" comment="gitk is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552151" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552153" version="1" comment="python is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552155" version="1" comment="python-base is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552157" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552158" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552159" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552160" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552161" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552162" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552163" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552164" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552165" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552166" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552167" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552168" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552170" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552172" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552174" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552176" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538219" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538220" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538221" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538222" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538223" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538224" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552178" version="1" comment="sudo is &lt;1.8.10p3-10.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552179" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552180" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552181" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552182" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552184" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552186" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552187" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552188" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552189" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519646" version="1" comment="glibc is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519647" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519648" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519649" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519651" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519652" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530086" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530087" version="1" comment="glibc-profile-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519653" version="1" comment="nscd is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530088" version="1" comment="git-core is &lt;2.12.3-27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530090" version="1" comment="libvirt is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530091" version="1" comment="libvirt-client is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530092" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530093" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530094" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530095" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530097" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530098" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530099" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530100" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530101" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530102" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530103" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530104" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530105" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530106" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530108" version="1" comment="libvirt-doc is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530109" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530110" version="1" comment="libvirt-nss is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519711" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530111" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530112" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519712" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519713" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530113" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530114" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519714" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519719" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530121" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530123" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530125" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530127" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530128" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519721" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519722" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519740" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519744" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519745" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519746" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530130" version="1" comment="mariadb-tools is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519747" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530131" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530132" version="1" comment="kernel-default is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530133" version="1" comment="kernel-default-base is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530134" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530138" version="1" comment="kernel-syms is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519760" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519761" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519762" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530140" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530141" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519763" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519792" version="1" comment="perl is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519793" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519794" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519796" version="1" comment="shadow is &lt;4.2.1-27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530149" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530150" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530151" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530152" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530153" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530154" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530155" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530156" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530157" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530158" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530159" version="1" comment="libndr0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530160" version="1" comment="libndr0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530161" version="1" comment="libnetapi0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530162" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530163" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530164" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530165" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530166" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530167" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530168" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530169" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530170" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530171" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530172" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530173" version="1" comment="libsamdb0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530174" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530175" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530176" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530177" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530178" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530179" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530180" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530181" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530182" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530183" version="1" comment="libwbclient0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530184" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530185" version="1" comment="samba is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530186" version="1" comment="samba-client is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530187" version="1" comment="samba-client-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530189" version="1" comment="samba-libs is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530190" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530191" version="1" comment="samba-winbind is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530192" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519951" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530193" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519953" version="1" comment="clamav is &lt;0.100.1-33.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530194" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530195" version="1" comment="kernel-default is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530196" version="1" comment="kernel-default-base is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530197" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530201" version="1" comment="kernel-syms is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530211" version="1" comment="openssh is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530212" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530213" version="1" comment="openssh-fips is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530214" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530215" version="1" comment="libvirt is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530216" version="1" comment="libvirt-client is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530217" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530218" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530219" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530220" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530222" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530223" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530224" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530225" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530226" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530227" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530228" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530229" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530230" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530231" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530233" version="1" comment="libvirt-doc is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530234" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530235" version="1" comment="libvirt-nss is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530236" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530237" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530238" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530239" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530240" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530242" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530243" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530245" version="1" comment="libzypp is &lt;16.17.20-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530246" version="1" comment="zypper is &lt;1.13.45-18.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520063" version="1" comment="openslp is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520064" version="1" comment="openslp-32bit is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530248" version="1" comment="openslp-server is &lt;2.0.0-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530249" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530251" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530252" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530253" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530254" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530255" version="1" comment="gnutls is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530256" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530257" version="1" comment="libgnutls28 is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530258" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530259" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530261" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520113" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520114" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520115" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520116" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520117" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520118" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530263" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530264" version="1" comment="smt is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530265" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520119" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520120" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520121" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530267" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530268" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520122" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530270" version="1" comment="qemu is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530271" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530273" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530274" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530276" version="1" comment="qemu-kvm is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530277" version="1" comment="qemu-lang is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530280" version="1" comment="qemu-tools is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520124" version="1" comment="ghostscript is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520125" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520128" version="1" comment="openslp is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520129" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530283" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520141" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530284" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530285" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520142" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530286" version="1" comment="cups-filters is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530287" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530288" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530289" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520147" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530290" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520151" version="1" comment="libecpg6 is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520152" version="1" comment="libpq5 is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520153" version="1" comment="libpq5-32bit is &lt;10.5-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520154" version="1" comment="postgresql10 is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530292" version="1" comment="postgresql10-contrib is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530294" version="1" comment="postgresql10-server is &lt;10.5-1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530295" version="1" comment="kernel-default is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530296" version="1" comment="kernel-default-base is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530297" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530301" version="1" comment="kernel-syms is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520243" version="1" comment="binutils is &lt;2.31-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520262" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520263" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520273" version="1" comment="clamav is &lt;0.100.2-33.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520274" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520275" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520276" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520277" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520278" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530314" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530315" version="1" comment="smt is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530316" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530317" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530319" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530320" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530321" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530322" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520313" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520314" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520315" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520316" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520317" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520318" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520350" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530329" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520351" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520352" version="1" comment="libsystemd0 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520353" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520354" version="1" comment="libudev1 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520355" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520356" version="1" comment="systemd is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520357" version="1" comment="systemd-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520359" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520360" version="1" comment="udev is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530330" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530331" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520376" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521784" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520377" version="1" comment="rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520378" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520379" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520380" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520384" version="1" comment="openssh is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520385" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530337" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520386" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530338" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530340" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530341" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520401" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521791" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530343" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530345" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520410" version="1" comment="ghostscript is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520411" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520412" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530347" version="1" comment="git-core is &lt;2.12.3-27.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530349" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530350" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530351" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530352" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530353" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530354" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530355" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530356" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530357" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530358" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530359" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530360" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530361" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530362" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530363" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520455" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530364" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520456" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520457" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520458" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520459" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520460" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520461" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520462" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520463" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520464" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520465" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520467" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520469" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530365" version="1" comment="qemu is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530366" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530368" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530369" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530371" version="1" comment="qemu-kvm is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530372" version="1" comment="qemu-lang is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530375" version="1" comment="qemu-tools is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530378" version="1" comment="mailman is &lt;2.1.17-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530379" version="1" comment="kernel-default is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530380" version="1" comment="kernel-default-base is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530381" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530385" version="1" comment="kernel-syms is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520965" version="1" comment="curl is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520966" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520967" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520970" version="1" comment="MozillaFirefox is &lt;52.8.0esr-109.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530393" version="1" comment="MozillaFirefox-devel is &lt;52.8.0esr-109.31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530394" version="1" comment="qemu is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530395" version="1" comment="qemu-block-curl is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530397" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530398" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530400" version="1" comment="qemu-kvm is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530401" version="1" comment="qemu-lang is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530404" version="1" comment="qemu-tools is &lt;2.6.2-41.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530407" version="1" comment="kernel-default is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530408" version="1" comment="kernel-default-base is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530409" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530413" version="1" comment="kernel-syms is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520998" version="1" comment="bash is &lt;4.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521001" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521002" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530415" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521005" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521006" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521007" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521034" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521035" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521037" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521039" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530416" version="1" comment="freeradius-server is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530417" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530418" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530419" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530420" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530421" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530422" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530423" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530424" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530425" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530426" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521117" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521118" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521119" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521120" version="1" comment="atftp is &lt;0.7.0-160.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521121" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521122" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521123" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530427" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530428" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530429" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530430" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530431" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521132" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521133" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521134" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530433" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530434" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521135" version="1" comment="openssl is &lt;1.0.2j-60.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521139" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521140" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530436" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530437" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530438" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530439" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530440" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530441" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530442" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530443" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530444" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530445" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530446" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530447" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530448" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530449" version="1" comment="libndr0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530450" version="1" comment="libndr0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530451" version="1" comment="libnetapi0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530452" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530453" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530454" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530455" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530456" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530457" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530458" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530459" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530460" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530461" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530462" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530463" version="1" comment="libsamdb0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530464" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530465" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530466" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530467" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530468" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530469" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530470" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530471" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530472" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530473" version="1" comment="libwbclient0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530474" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530475" version="1" comment="samba is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530476" version="1" comment="samba-client is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530477" version="1" comment="samba-client-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530479" version="1" comment="samba-libs is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530480" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530481" version="1" comment="samba-winbind is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530482" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521150" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530485" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530486" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521151" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521175" version="1" comment="libsystemd0 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521176" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521177" version="1" comment="libudev1 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521178" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521179" version="1" comment="systemd is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521180" version="1" comment="systemd-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521182" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521183" version="1" comment="udev is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530488" version="1" comment="qemu is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530489" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530491" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530492" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530494" version="1" comment="qemu-kvm is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530495" version="1" comment="qemu-lang is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530498" version="1" comment="qemu-tools is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530501" version="1" comment="kernel-default is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530502" version="1" comment="kernel-default-base is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530503" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530507" version="1" comment="kernel-syms is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521193" version="1" comment="openssh is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521194" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530509" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521195" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530510" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530512" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530513" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521202" version="1" comment="libsystemd0 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521203" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521204" version="1" comment="libudev1 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521205" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521206" version="1" comment="systemd is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521207" version="1" comment="systemd-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521209" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521210" version="1" comment="udev is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521212" version="1" comment="curl is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521213" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521214" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521224" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530521" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521225" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521232" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530522" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530523" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521233" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530524" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530525" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521234" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521235" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530527" version="1" comment="libvirt is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530528" version="1" comment="libvirt-client is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530529" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530530" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530531" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530532" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530534" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530535" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530536" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530537" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530538" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530539" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530540" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530541" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530542" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530543" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530545" version="1" comment="libvirt-doc is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530546" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530547" version="1" comment="libvirt-nss is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521236" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521237" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521238" version="1" comment="python is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530548" version="1" comment="python-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521239" version="1" comment="python-base is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530549" version="1" comment="python-base-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521240" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530550" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530553" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530554" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521242" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521243" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521244" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521245" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521246" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521427" version="1" comment="gvim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521428" version="1" comment="vim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521430" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521431" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521433" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521434" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530555" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521435" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530556" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521455" version="1" comment="openssh is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521456" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530557" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521457" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530558" version="1" comment="kernel-default is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530559" version="1" comment="kernel-default-base is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530560" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530564" version="1" comment="kernel-syms is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530566" version="1" comment="dbus-1 is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530567" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530568" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530569" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521493" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521495" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521496" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521497" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521498" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521499" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521500" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521502" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521503" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521504" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521505" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521506" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521507" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521508" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521509" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521510" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521511" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521516" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521517" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521518" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521520" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521523" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521525" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521526" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521924" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530570" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530572" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521537" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530574" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521538" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521549" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521550" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521551" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521553" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521554" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521555" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521556" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521557" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521558" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521559" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521560" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521936" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521937" version="1" comment="libpq5 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521938" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521939" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530575" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530577" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530578" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530579" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530580" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530581" version="1" comment="kernel-default is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530582" version="1" comment="kernel-default-base is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530583" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530587" version="1" comment="kernel-syms is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521944" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521945" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521946" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521948" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521949" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521950" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521951" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521952" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521953" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521954" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521955" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521974" version="1" comment="MozillaFirefox is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530589" version="1" comment="MozillaFirefox-devel is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521975" version="1" comment="MozillaFirefox-translations-common is &lt;60.8.0-109.83.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521976" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521977" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530590" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530591" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521978" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521979" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530592" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530593" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521980" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521981" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521982" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521983" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521984" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521985" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521986" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521590" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521592" version="1" comment="polkit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521593" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521995" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521996" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521997" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530595" version="1" comment="glibc is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530596" version="1" comment="glibc-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530597" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530598" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530602" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530603" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530604" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530605" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530606" version="1" comment="nscd is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522027" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522028" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522029" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522035" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522037" version="1" comment="polkit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522038" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522039" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530614" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530615" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522040" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530616" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530617" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530618" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530619" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530620" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530621" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522041" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522042" version="1" comment="python3 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522043" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522044" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522052" version="1" comment="evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522053" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522055" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522056" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522057" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522058" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522059" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522060" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522061" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522062" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522063" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530622" version="1" comment="squid is &lt;3.5.21-26.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522067" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522068" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522069" version="1" comment="python is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530623" version="1" comment="python-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522070" version="1" comment="python-base is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530624" version="1" comment="python-base-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522071" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530625" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530628" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530629" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522073" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522074" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530630" version="1" comment="libvirt is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530631" version="1" comment="libvirt-client is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530632" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530633" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530634" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530635" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530637" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530638" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530639" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530640" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530641" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530642" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530643" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530644" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530645" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530646" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530648" version="1" comment="libvirt-doc is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530649" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530650" version="1" comment="libvirt-nss is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530651" version="1" comment="qemu is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530652" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530654" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530655" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530657" version="1" comment="qemu-kvm is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530658" version="1" comment="qemu-lang is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530661" version="1" comment="qemu-tools is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530664" version="1" comment="postgresql94 is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530665" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530670" version="1" comment="postgresql94-server is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530671" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530672" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530674" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530675" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530676" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530677" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522096" version="1" comment="perl is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522097" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522098" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522100" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522101" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530678" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522102" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522103" version="1" comment="zypper is &lt;1.13.54-18.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530679" version="1" comment="kernel-default is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530680" version="1" comment="kernel-default-base is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530681" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530685" version="1" comment="kernel-syms is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530688" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530690" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530691" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530693" version="1" comment="curl is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530694" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530695" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522114" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522115" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522117" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522118" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530696" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522119" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530697" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530698" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530700" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522144" version="1" comment="ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522145" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522146" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522149" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522152" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530702" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530703" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530704" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530705" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530706" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530707" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521597" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521598" version="1" comment="python3 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521599" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521600" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522212" version="1" comment="MozillaFirefox is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530709" version="1" comment="MozillaFirefox-devel is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522213" version="1" comment="MozillaFirefox-translations-common is &lt;60.9.0-109.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530710" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530711" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530712" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530713" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522218" version="1" comment="ghostscript is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522219" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521601" version="1" comment="curl is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521602" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521603" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522236" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522237" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530714" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530715" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522245" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522246" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530716" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522247" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522248" version="1" comment="binutils is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530718" version="1" comment="sudo is &lt;1.8.10p3-10.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522250" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522252" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522280" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530719" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522281" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522293" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530726" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522294" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530727" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530728" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530729" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530730" version="1" comment="libdcerpc0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530731" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530732" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530733" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530734" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530735" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530736" version="1" comment="libndr-standard0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530737" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530738" version="1" comment="libndr0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530739" version="1" comment="libndr0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530740" version="1" comment="libnetapi0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530741" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530742" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530743" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530744" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530745" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530746" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530747" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530748" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530749" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530750" version="1" comment="libsamba-util0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530751" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530752" version="1" comment="libsamdb0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530753" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530754" version="1" comment="libsmbclient0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530755" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530756" version="1" comment="libsmbconf0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530757" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530758" version="1" comment="libsmbldap0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530759" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530760" version="1" comment="libtevent-util0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530761" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530762" version="1" comment="libwbclient0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530763" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530764" version="1" comment="samba is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530765" version="1" comment="samba-client is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530766" version="1" comment="samba-client-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530768" version="1" comment="samba-libs is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530769" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530770" version="1" comment="samba-winbind is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530771" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530772" version="1" comment="gdb is &lt;8.3.1-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522350" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522351" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522352" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522353" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522374" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522375" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522376" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522377" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522378" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522379" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522380" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522381" version="1" comment="ghostscript is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522382" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530773" version="1" comment="kernel-default is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530774" version="1" comment="kernel-default-base is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530775" version="1" comment="kernel-default-devel is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530779" version="1" comment="kernel-syms is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522390" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522391" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522392" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522393" version="1" comment="cups is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522394" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522395" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522396" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522401" version="1" comment="clamav is &lt;0.100.3-33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530781" version="1" comment="mailman is &lt;2.1.17-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522404" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530782" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530783" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522405" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530784" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530785" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522421" version="1" comment="clamav is &lt;0.100.3-33.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530786" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522423" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552195" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522425" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522426" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530787" version="1" comment="git-core is &lt;2.12.3-27.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522433" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530789" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522434" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521605" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521606" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530790" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521607" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521608" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521609" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530791" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530792" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521610" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521611" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530793" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530794" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521612" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521613" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521614" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521615" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521616" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521617" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521618" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530795" version="1" comment="libblkid1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530796" version="1" comment="libblkid1-32bit is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530797" version="1" comment="libfdisk1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530798" version="1" comment="libmount1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530799" version="1" comment="libmount1-32bit is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530800" version="1" comment="libsmartcols1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530801" version="1" comment="libuuid1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530802" version="1" comment="libuuid1-32bit is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530803" version="1" comment="python-libmount is &lt;2.28-44.18.38 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530804" version="1" comment="util-linux is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530806" version="1" comment="util-linux-systemd is &lt;2.28-44.18.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530807" version="1" comment="uuidd is &lt;2.28-44.18.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521621" version="1" comment="libsystemd0 is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521622" version="1" comment="libsystemd0-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521623" version="1" comment="libudev1 is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521624" version="1" comment="libudev1-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521625" version="1" comment="systemd is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521626" version="1" comment="systemd-32bit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521628" version="1" comment="systemd-sysvinit is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521629" version="1" comment="udev is &lt;228-150.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530808" version="1" comment="kernel-default is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530809" version="1" comment="kernel-default-base is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530810" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530814" version="1" comment="kernel-syms is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521630" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521631" version="1" comment="procps is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520140" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521634" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521635" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521636" version="1" comment="python is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530816" version="1" comment="python-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521637" version="1" comment="python-base is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530817" version="1" comment="python-base-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521638" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530818" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530821" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530822" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521640" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521641" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530823" version="1" comment="qemu is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530824" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530826" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530827" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530829" version="1" comment="qemu-kvm is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530830" version="1" comment="qemu-lang is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530833" version="1" comment="qemu-tools is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521642" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530836" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530837" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521643" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521654" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521655" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521657" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521658" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530838" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521659" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530839" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530840" version="1" comment="libvirt is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530841" version="1" comment="libvirt-client is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530842" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530843" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530844" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530845" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530847" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530848" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530849" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530850" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530851" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530852" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530853" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530854" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530855" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530856" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530858" version="1" comment="libvirt-doc is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530859" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530860" version="1" comment="libvirt-nss is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521667" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530861" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530862" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521668" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521678" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521679" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521681" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521682" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521683" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530863" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530864" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530865" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530867" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530870" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530872" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521685" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521686" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521696" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521697" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521702" version="1" comment="ntp is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521703" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521711" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521712" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521713" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530874" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530875" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521714" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530877" version="1" comment="kernel-default is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530878" version="1" comment="kernel-default-base is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530879" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530883" version="1" comment="kernel-syms is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521744" version="1" comment="bash is &lt;4.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521747" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521748" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521754" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530885" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521755" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530886" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530888" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530889" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530890" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530891" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521756" version="1" comment="clamav is &lt;0.100.3-33.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530892" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530893" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530894" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530895" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521758" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521759" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521760" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521764" version="1" comment="wget is &lt;1.14-21.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521777" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521778" version="1" comment="python3 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521779" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521780" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521781" version="1" comment="curl is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521782" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521783" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530902" version="1" comment="cups is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530903" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530904" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530905" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530906" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530907" version="1" comment="pam_radius-32bit is &lt;1.3.16-239.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530908" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530909" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530911" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530912" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530913" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530914" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530915" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530916" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530917" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530918" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530919" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530920" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530921" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530922" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530923" version="1" comment="libicu52_1-32bit is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530924" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530925" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530926" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530927" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530928" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530929" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530932" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530933" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530935" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530936" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530937" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530938" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530939" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530940" version="1" comment="ghostscript is &lt;9.52-23.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530941" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530942" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530943" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530944" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530945" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530946" version="1" comment="squid is &lt;3.5.21-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530947" version="1" comment="kernel-default is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530948" version="1" comment="kernel-default-base is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530949" version="1" comment="kernel-default-devel is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530953" version="1" comment="kernel-syms is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530955" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530957" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530958" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530959" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530960" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530961" version="1" comment="git-core is &lt;2.26.2-27.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530963" version="1" comment="mailman is &lt;2.1.17-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530973" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530974" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530975" version="1" comment="python is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530976" version="1" comment="python-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530977" version="1" comment="python-base is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530978" version="1" comment="python-base-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530979" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530980" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530984" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530985" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530987" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530988" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530990" version="1" comment="qemu is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530991" version="1" comment="qemu-block-curl is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530993" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530994" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530996" version="1" comment="qemu-kvm is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530997" version="1" comment="qemu-lang is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531000" version="1" comment="qemu-tools is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531003" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531004" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531005" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531006" version="1" comment="libexif12-32bit is &lt;0.6.22-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531007" version="1" comment="gvim is &lt;7.4.326-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531008" version="1" comment="vim is &lt;7.4.326-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531010" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531011" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531012" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531013" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531014" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531015" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531016" version="1" comment="yast2-ruby-bindings is &lt;3.1.53-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531017" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531018" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531019" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531020" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531021" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531022" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531023" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531025" version="1" comment="kernel-default is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531026" version="1" comment="kernel-default-base is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531027" version="1" comment="kernel-default-devel is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531031" version="1" comment="kernel-syms is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522550" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531033" version="1" comment="libadns1 is &lt;1.4-103.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531034" version="1" comment="perl is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531035" version="1" comment="perl-32bit is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531036" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531038" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531040" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531041" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531043" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531045" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531047" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531048" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531049" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531050" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531051" version="1" comment="curl is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531052" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531053" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531064" version="1" comment="mutt is &lt;1.10.1-55.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531065" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531066" version="1" comment="ntp is &lt;4.2.8p15-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531067" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531068" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531069" version="1" comment="libfreebl3-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531070" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531071" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531072" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531073" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531074" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531075" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531076" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531077" version="1" comment="mozilla-nspr-32bit is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531078" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531079" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531080" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531081" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531082" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531083" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531084" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531085" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531086" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531087" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531088" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531089" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531092" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531093" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531094" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531095" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531096" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531097" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531099" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531100" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531101" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531102" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531103" version="1" comment="squid is &lt;3.5.21-26.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531104" version="1" comment="mailman is &lt;2.1.17-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531105" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531106" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531108" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531109" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531110" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531111" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531112" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531113" version="1" comment="grub2 is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531119" version="1" comment="ghostscript is &lt;9.52-23.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531120" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531121" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531122" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531123" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531124" version="1" comment="libX11-6 is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531125" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531127" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531128" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531129" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531130" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531131" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531132" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531133" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531134" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531135" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531136" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531137" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531138" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531139" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531140" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531141" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531142" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531143" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531144" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531145" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531146" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531147" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531148" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531149" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531150" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531151" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531152" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531153" version="1" comment="libxcb1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531154" version="1" comment="kernel-default is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531155" version="1" comment="kernel-default-base is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531156" version="1" comment="kernel-default-devel is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531160" version="1" comment="kernel-syms is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531163" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531164" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531165" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531166" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531168" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531169" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531170" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531171" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531172" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531173" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531175" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531176" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531177" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531178" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531179" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531186" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531187" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531188" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531189" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531190" version="1" comment="grub2 is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531196" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531197" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531198" version="1" comment="libdcerpc0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531199" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531200" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531201" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531202" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531203" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531204" version="1" comment="libndr-standard0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531205" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531206" version="1" comment="libndr0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531207" version="1" comment="libndr0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531208" version="1" comment="libnetapi0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531209" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531210" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531211" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531212" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531213" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531214" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531215" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531216" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531217" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531218" version="1" comment="libsamba-util0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531219" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531220" version="1" comment="libsamdb0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531221" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531222" version="1" comment="libsmbclient0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531223" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531224" version="1" comment="libsmbconf0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531225" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531226" version="1" comment="libsmbldap0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531227" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531228" version="1" comment="libtevent-util0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531229" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531230" version="1" comment="libwbclient0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531231" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531232" version="1" comment="samba is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531233" version="1" comment="samba-client is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531234" version="1" comment="samba-client-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531236" version="1" comment="samba-libs is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531237" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531238" version="1" comment="samba-winbind is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531239" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531240" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531241" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531242" version="1" comment="freeradius-server is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531243" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531244" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531245" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531246" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531247" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531248" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531249" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531250" version="1" comment="freeradius-server-python is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531251" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531252" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531253" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531255" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531257" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531258" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531259" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531261" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531262" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531263" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531264" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531265" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531267" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531269" version="1" comment="squid is &lt;3.5.21-26.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531270" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531271" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531273" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531274" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531275" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531277" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531278" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531280" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531281" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531282" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531283" version="1" comment="kernel-default is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531284" version="1" comment="kernel-default-base is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531285" version="1" comment="kernel-default-devel is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531289" version="1" comment="kernel-syms is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522598" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531291" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531292" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522599" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531302" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531303" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531304" version="1" comment="python3 is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531305" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531306" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531308" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531309" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531310" version="1" comment="libdcerpc0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531311" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531312" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531313" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531314" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531315" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531316" version="1" comment="libndr-standard0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531317" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531318" version="1" comment="libndr0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531319" version="1" comment="libndr0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531320" version="1" comment="libnetapi0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531321" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531322" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531323" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531324" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531325" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531326" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531327" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531328" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531329" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531330" version="1" comment="libsamba-util0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531331" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531332" version="1" comment="libsamdb0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531333" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531334" version="1" comment="libsmbclient0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531335" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531336" version="1" comment="libsmbconf0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531337" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531338" version="1" comment="libsmbldap0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531339" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531340" version="1" comment="libtevent-util0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531341" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531342" version="1" comment="libwbclient0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531343" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531344" version="1" comment="samba is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531345" version="1" comment="samba-client is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531346" version="1" comment="samba-client-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531348" version="1" comment="samba-libs is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531349" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531350" version="1" comment="samba-winbind is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531351" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531352" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531353" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531354" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531355" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531356" version="1" comment="libQt5Core5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531357" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531358" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531359" version="1" comment="libQt5Network5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531360" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531361" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531362" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531363" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531364" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531365" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531366" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531367" version="1" comment="libQt5Test5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531368" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531369" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531376" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531377" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531378" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531379" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531380" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531381" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531382" version="1" comment="tigervnc is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531383" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531384" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531385" version="1" comment="libproxy1-32bit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531386" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531387" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531388" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531389" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531390" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531391" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531392" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531393" version="1" comment="glibc is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531394" version="1" comment="glibc-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531395" version="1" comment="glibc-devel is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531396" version="1" comment="glibc-devel-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531400" version="1" comment="glibc-locale is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531401" version="1" comment="glibc-locale-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531402" version="1" comment="glibc-profile is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531403" version="1" comment="glibc-profile-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531404" version="1" comment="nscd is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531405" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531406" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531407" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531408" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531409" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531410" version="1" comment="libdcerpc0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531411" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531412" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531413" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531414" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531415" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531416" version="1" comment="libndr-standard0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531417" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531418" version="1" comment="libndr0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531419" version="1" comment="libndr0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531420" version="1" comment="libnetapi0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531421" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531422" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531423" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531424" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531425" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531426" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531427" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531428" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531429" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531430" version="1" comment="libsamba-util0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531431" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531432" version="1" comment="libsamdb0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531433" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531434" version="1" comment="libsmbclient0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531435" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531436" version="1" comment="libsmbconf0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531437" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531438" version="1" comment="libsmbldap0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531439" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531440" version="1" comment="libtevent-util0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531441" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531442" version="1" comment="libwbclient0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531443" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531444" version="1" comment="samba is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531445" version="1" comment="samba-client is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531446" version="1" comment="samba-client-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531448" version="1" comment="samba-libs is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531449" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531450" version="1" comment="samba-winbind is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531451" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531452" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531456" version="1" comment="libvirt is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531457" version="1" comment="libvirt-client is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531458" version="1" comment="libvirt-daemon is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531459" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531460" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531461" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531463" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531464" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531465" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531466" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531467" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531468" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531469" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531470" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531471" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531472" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531474" version="1" comment="libvirt-doc is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531475" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531476" version="1" comment="libvirt-nss is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531478" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531479" version="1" comment="libQt5Core5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531480" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531481" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531482" version="1" comment="libQt5Network5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531483" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531484" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531485" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531486" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531487" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531488" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531489" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531490" version="1" comment="libQt5Test5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531491" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531492" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531493" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531494" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531495" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531496" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531497" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531498" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531499" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531500" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531501" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531502" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531503" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531504" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531505" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531506" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531507" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531508" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531509" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531510" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531512" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531513" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531516" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531517" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531518" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531519" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531520" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531522" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531523" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522619" version="1" comment="libsystemd0 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522620" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522621" version="1" comment="libudev1 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522622" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522623" version="1" comment="systemd is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522624" version="1" comment="systemd-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522626" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522627" version="1" comment="udev is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531526" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531527" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531528" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531529" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531530" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531531" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531532" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531533" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531534" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531537" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531538" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531539" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531546" version="1" comment="libecpg6 is &lt;12.4-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531547" version="1" comment="libpq5 is &lt;12.4-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531548" version="1" comment="libpq5-32bit is &lt;12.4-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531556" version="1" comment="postgresql10 is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531557" version="1" comment="postgresql10-contrib is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531559" version="1" comment="postgresql10-plperl is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531560" version="1" comment="postgresql10-plpython is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531561" version="1" comment="postgresql10-pltcl is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531562" version="1" comment="postgresql10-server is &lt;10.14-4.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531563" version="1" comment="postgresql94 is &lt;9.4.26-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531564" version="1" comment="postgresql94-contrib is &lt;9.4.26-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531566" version="1" comment="postgresql94-plperl is &lt;9.4.26-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531567" version="1" comment="postgresql94-plpython is &lt;9.4.26-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531568" version="1" comment="postgresql94-pltcl is &lt;9.4.26-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531569" version="1" comment="postgresql94-server is &lt;9.4.26-24.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531570" version="1" comment="postgresql96 is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531571" version="1" comment="postgresql96-contrib is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531573" version="1" comment="postgresql96-plperl is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531574" version="1" comment="postgresql96-plpython is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531575" version="1" comment="postgresql96-pltcl is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531576" version="1" comment="postgresql96-server is &lt;9.6.19-6.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531577" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531580" version="1" comment="libzypp is &lt;16.21.2-27.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531581" version="1" comment="libzypp-devel is &lt;16.21.2-27.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531582" version="1" comment="zypper is &lt;1.13.57-18.46.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531584" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531585" version="1" comment="krb5-32bit is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531586" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531587" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531588" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531589" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531590" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531591" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531592" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531593" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531595" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531596" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531597" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531598" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531599" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531600" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531602" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531603" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531604" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531605" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531606" version="1" comment="kernel-default is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531607" version="1" comment="kernel-default-base is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531608" version="1" comment="kernel-default-devel is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531612" version="1" comment="kernel-syms is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531615" version="1" comment="bluez is &lt;5.13-5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531616" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531617" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531618" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531619" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531620" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531621" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531622" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531623" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531624" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531625" version="1" comment="python3 is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531626" version="1" comment="python3-base is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531627" version="1" comment="python3-curses is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531629" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531632" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531633" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531634" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531635" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531636" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531637" version="1" comment="libpq5 is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531638" version="1" comment="libpq5-32bit is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531639" version="1" comment="mutt is &lt;1.10.1-55.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531646" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531647" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531648" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531649" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531650" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531651" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531653" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531654" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531655" version="1" comment="python is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531656" version="1" comment="python-32bit is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531657" version="1" comment="python-base is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531658" version="1" comment="python-base-32bit is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531659" version="1" comment="python-curses is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531660" version="1" comment="python-demo is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531664" version="1" comment="python-gdbm is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531665" version="1" comment="python-idle is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531666" version="1" comment="python-tk is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531667" version="1" comment="python-xml is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522638" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531668" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522639" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531669" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531670" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531671" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531672" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531673" version="1" comment="libspice-controller0 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531674" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531675" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531677" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531678" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531679" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531686" version="1" comment="clamav is &lt;0.103.0-33.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531687" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531688" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531689" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531690" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531691" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531692" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531693" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531694" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531695" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531696" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531697" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531698" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531699" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531700" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531701" version="1" comment="libasan5-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531702" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531703" version="1" comment="libatomic1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531704" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531705" version="1" comment="libgcc_s1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531706" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531707" version="1" comment="libgfortran5-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531708" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531709" version="1" comment="libgo14-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531710" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531711" version="1" comment="libgomp1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531712" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531713" version="1" comment="libitm1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531717" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531718" version="1" comment="libstdc++6-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531719" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531721" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531722" version="1" comment="libubsan1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531723" version="1" comment="sudo is &lt;1.8.10p3-10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531724" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531726" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531727" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522649" version="1" comment="libexif12 is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522650" version="1" comment="libexif12-32bit is &lt;0.6.21-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531729" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531730" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531731" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531732" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531733" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531734" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522651" version="1" comment="ppp is &lt;2.4.7-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522652" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522653" version="1" comment="python3 is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522654" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522655" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531737" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531738" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531739" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531740" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531741" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531742" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531743" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531745" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531746" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552196" version="1" comment="rsyslog is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552197" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552198" version="1" comment="rsyslog-doc is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552199" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552200" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552201" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552202" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552203" version="1" comment="rsyslog-module-relp is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552204" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552205" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531748" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531750" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531753" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522656" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522657" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531754" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531755" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531757" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531758" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531759" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531760" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531761" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531762" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531763" version="1" comment="squid is &lt;3.5.21-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522668" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531764" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522669" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522670" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522671" version="1" comment="libpq5 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522672" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522673" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531765" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531767" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531768" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531769" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531770" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531771" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531772" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531773" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531783" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531784" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531785" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531786" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531787" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531788" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531789" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531790" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531791" version="1" comment="python3 is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531792" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531793" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522675" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522676" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531795" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531796" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522677" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522678" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531797" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531798" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522679" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522680" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522681" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522682" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522683" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522684" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522685" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522686" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522687" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531799" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531800" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531801" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531802" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531803" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531804" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531805" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531806" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531807" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531808" version="1" comment="git-core is &lt;2.26.0-27.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531810" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531811" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531812" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531813" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552206" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-44.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552207" version="1" comment="spamassassin is &lt;3.4.5-44.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552208" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552209" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552210" version="1" comment="clamav is &lt;0.103.2-33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552211" version="1" comment="sudo is &lt;1.8.10p3-10.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552212" version="1" comment="qemu is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552213" version="1" comment="qemu-block-curl is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552214" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552215" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552216" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552217" version="1" comment="qemu-ipxe is &lt;1.0.0-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552218" version="1" comment="qemu-kvm is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552219" version="1" comment="qemu-lang is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552220" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552221" version="1" comment="qemu-sgabios is &lt;8-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552222" version="1" comment="qemu-tools is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552223" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552224" version="1" comment="qemu-x86 is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552225" version="1" comment="MozillaFirefox is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552226" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552227" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552228" version="1" comment="libhogweed2 is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538876" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552229" version="1" comment="libnettle4 is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538878" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552230" version="1" comment="gdm is &lt;3.10.0.1-54.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538880" version="1" comment="gdm-lang is &lt;3.10.0.1-54.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538881" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552231" version="1" comment="libgdm1 is &lt;3.10.0.1-54.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552232" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538884" version="1" comment="tomcat is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538885" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538886" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538887" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538888" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538889" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538890" version="1" comment="tomcat-lib is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538891" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538892" version="1" comment="tomcat-webapps is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552233" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552234" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552235" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552236" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.291-43.47.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552237" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552238" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552239" version="1" comment="libdcerpc0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552240" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552241" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552242" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552243" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552244" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552245" version="1" comment="libndr-standard0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552246" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552247" version="1" comment="libndr0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552248" version="1" comment="libndr0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552249" version="1" comment="libnetapi0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552250" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552251" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552252" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552253" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552254" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552255" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552256" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552257" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552258" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552259" version="1" comment="libsamba-util0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552260" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552261" version="1" comment="libsamdb0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552262" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552263" version="1" comment="libsmbclient0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552264" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552265" version="1" comment="libsmbconf0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552266" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552267" version="1" comment="libsmbldap0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552268" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552269" version="1" comment="libtevent-util0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552270" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552271" version="1" comment="libwbclient0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552272" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552273" version="1" comment="samba is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552274" version="1" comment="samba-client is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552275" version="1" comment="samba-client-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552276" version="1" comment="samba-doc is &lt;4.4.2-38.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552277" version="1" comment="samba-libs is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552278" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552279" version="1" comment="samba-winbind is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552280" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552281" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552282" version="1" comment="cups is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552283" version="1" comment="cups-client is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552284" version="1" comment="cups-libs is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538900" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552285" version="1" comment="bind is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552286" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538903" version="1" comment="bind-doc is &lt;9.9.9P1-63.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552287" version="1" comment="bind-libs is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538905" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552288" version="1" comment="bind-utils is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552289" version="1" comment="avahi is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538952" version="1" comment="avahi-lang is &lt;0.6.32-32.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552290" version="1" comment="avahi-utils is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552291" version="1" comment="libavahi-client3 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538955" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552292" version="1" comment="libavahi-common3 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538957" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552293" version="1" comment="libavahi-core7 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552294" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538960" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552295" version="1" comment="libdns_sd is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538962" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552296" version="1" comment="kernel-default is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552297" version="1" comment="kernel-default-base is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552298" version="1" comment="kernel-default-devel is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552299" version="1" comment="kernel-devel is &lt;4.4.121-92.155.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552300" version="1" comment="kernel-macros is &lt;4.4.121-92.155.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552301" version="1" comment="kernel-source is &lt;4.4.121-92.155.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552302" version="1" comment="kernel-syms is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552303" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552304" version="1" comment="python3 is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552305" version="1" comment="python3-base is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552306" version="1" comment="python3-curses is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552307" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552308" version="1" comment="graphviz is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552309" version="1" comment="graphviz-gd is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552310" version="1" comment="graphviz-gnome is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552311" version="1" comment="graphviz-tcl is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552312" version="1" comment="libxml2-2 is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538983" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538984" version="1" comment="libxml2-doc is &lt;2.9.4-46.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552313" version="1" comment="libxml2-tools is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552314" version="1" comment="python-libxml2 is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531824" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531825" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531826" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531827" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531828" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531829" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531830" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531831" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552315" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552316" version="1" comment="dhcp is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552317" version="1" comment="dhcp-client is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552318" version="1" comment="dhcp-relay is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552319" version="1" comment="dhcp-server is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552320" version="1" comment="qemu is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552321" version="1" comment="qemu-block-curl is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552322" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552323" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552324" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552325" version="1" comment="qemu-ipxe is &lt;1.0.0-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552326" version="1" comment="qemu-kvm is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552327" version="1" comment="qemu-lang is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552328" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552329" version="1" comment="qemu-sgabios is &lt;8-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552330" version="1" comment="qemu-tools is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552331" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552332" version="1" comment="qemu-x86 is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552333" version="1" comment="libwebp5 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538993" version="1" comment="libwebp5-32bit is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552334" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552335" version="1" comment="libpolkit0 is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552336" version="1" comment="polkit is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552337" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552338" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552339" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539006" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552340" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552341" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552342" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552343" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552344" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552345" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552346" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552347" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552348" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552349" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552350" version="1" comment="MozillaFirefox is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552351" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552352" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552353" version="1" comment="libX11-6 is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539021" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539022" version="1" comment="libX11-data is &lt;1.6.2-12.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552354" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539024" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531832" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531834" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531835" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552355" version="1" comment="libspice-server1 is &lt;0.12.7-10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552356" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552357" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552358" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552359" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552360" version="1" comment="libspice-controller0 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552361" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552362" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539041" version="1" comment="ucode-intel is &lt;20210525-13.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552363" version="1" comment="caribou-common is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552364" version="1" comment="libcaribou0 is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552365" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552366" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552367" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552368" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552369" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531837" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531838" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531839" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531840" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552370" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552371" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539068" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.1-2.63.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552372" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552373" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552374" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552375" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552376" version="1" comment="webkit2gtk3-devel is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552377" version="1" comment="apache2 is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539074" version="1" comment="apache2-doc is &lt;2.4.23-29.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552378" version="1" comment="apache2-example-pages is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552379" version="1" comment="apache2-prefork is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552380" version="1" comment="apache2-utils is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552381" version="1" comment="apache2-worker is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552382" version="1" comment="xterm is &lt;308-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552383" version="1" comment="ovmf is &lt;2015+git1462940744.321151f-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552384" version="1" comment="ovmf-tools is &lt;2015+git1462940744.321151f-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552385" version="1" comment="qemu-ovmf-x86_64 is &lt;2015+git1462940744.321151f-19.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552386" version="1" comment="libhogweed2 is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539091" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552387" version="1" comment="libnettle4 is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539093" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552388" version="1" comment="libsolv-devel is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552389" version="1" comment="libsolv-tools is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552390" version="1" comment="libzypp is &lt;16.21.4-27.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552391" version="1" comment="libzypp-devel is &lt;16.21.4-27.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552392" version="1" comment="perl-solv is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552393" version="1" comment="python-solv is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552394" version="1" comment="libgcrypt20 is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539096" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552395" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539098" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552396" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552397" version="1" comment="openexr is &lt;2.1.0-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531841" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531842" version="1" comment="libpq5 is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531843" version="1" comment="libpq5-32bit is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615943" version="1" comment="arpwatch is &lt;2.1a15-159.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531851" version="1" comment="openssh is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531852" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531853" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531854" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531855" version="1" comment="sudo is &lt;1.8.10p3-10.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625232" version="1" comment="MozillaFirefox is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625233" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625234" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625783" version="1" comment="kernel-default is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625784" version="1" comment="kernel-default-base is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625785" version="1" comment="kernel-default-devel is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625786" version="1" comment="kernel-devel is &lt;4.4.121-92.158.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625787" version="1" comment="kernel-macros is &lt;4.4.121-92.158.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625788" version="1" comment="kernel-source is &lt;4.4.121-92.158.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625789" version="1" comment="kernel-syms is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531856" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531857" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531858" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625777" version="1" comment="libsystemd0 is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625743" version="1" comment="libsystemd0-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625778" version="1" comment="libudev1 is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625746" version="1" comment="libudev1-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625779" version="1" comment="systemd is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625748" version="1" comment="systemd-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625749" version="1" comment="systemd-bash-completion is &lt;228-150.98.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625780" version="1" comment="systemd-devel is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625781" version="1" comment="systemd-sysvinit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625782" version="1" comment="udev is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625003" version="1" comment="qemu is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625004" version="1" comment="qemu-block-curl is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625005" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625006" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625007" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625008" version="1" comment="qemu-ipxe is &lt;1.0.0-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625009" version="1" comment="qemu-kvm is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625010" version="1" comment="qemu-lang is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625011" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625012" version="1" comment="qemu-sgabios is &lt;8-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625013" version="1" comment="qemu-tools is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625014" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625015" version="1" comment="qemu-x86 is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626114" version="1" comment="linuxptp is &lt;1.4-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627312" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627313" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627305" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.3-2.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627314" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627315" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627316" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627317" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627318" version="1" comment="webkit2gtk3-devel is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626903" version="1" comment="libsndfile1 is &lt;1.0.25-36.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626901" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627946" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630615" version="1" comment="cpio is &lt;2.11-36.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630610" version="1" comment="cpio-lang is &lt;2.11-36.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630393" version="1" comment="libcares2 is &lt;1.9.1-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630616" version="1" comment="MozillaFirefox is &lt;78.13.0-112.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630617" version="1" comment="MozillaFirefox-devel is &lt;78.13.0-112.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630618" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-112.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630872" version="1" comment="fetchmail is &lt;6.3.26-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630873" version="1" comment="fetchmailconf is &lt;6.3.26-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627215" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627216" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627217" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627218" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631542" version="1" comment="cpio is &lt;2.11-36.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631541" version="1" comment="cpio-lang is &lt;2.11-36.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631696" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631697" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631678" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631698" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631680" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631699" version="1" comment="openssl is &lt;1.0.2j-60.69.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631682" version="1" comment="openssl-doc is &lt;1.0.2j-60.69.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631579" version="1" comment="unrar is &lt;5.6.1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627800" version="1" comment="aspell is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627801" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627802" version="1" comment="libaspell15 is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627791" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627796" version="1" comment="bind is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627797" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627784" version="1" comment="bind-doc is &lt;9.9.9P1-63.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627798" version="1" comment="bind-libs is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627786" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627799" version="1" comment="bind-utils is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627947" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627948" version="1" comment="openexr is &lt;2.1.0-6.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628213" version="1" comment="libesmtp is &lt;1.0.6-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628151" version="1" comment="file is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628152" version="1" comment="file-magic is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628153" version="1" comment="libmagic1 is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628154" version="1" comment="libmagic1-32bit is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531859" version="1" comment="openvswitch is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531862" version="1" comment="openvswitch-switch is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632681" version="1" comment="Mesa is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632682" version="1" comment="Mesa-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632683" version="1" comment="Mesa-libEGL1 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632684" version="1" comment="Mesa-libEGL1-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632685" version="1" comment="Mesa-libGL1 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632686" version="1" comment="Mesa-libGL1-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632687" version="1" comment="Mesa-libGLESv2-2 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632688" version="1" comment="Mesa-libglapi0 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632689" version="1" comment="Mesa-libglapi0-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632690" version="1" comment="libgbm1 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632691" version="1" comment="libgbm1-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632692" version="1" comment="libxatracker2 is &lt;1.0.0-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631268" version="1" comment="transfig is &lt;3.2.8a-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628130" version="1" comment="libgtk-vnc-1_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628131" version="1" comment="libgtk-vnc-2_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628132" version="1" comment="libgvnc-1_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628133" version="1" comment="python-gtk-vnc is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628134" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628135" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632419" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632420" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632401" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632421" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632403" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632422" version="1" comment="openssl is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632405" version="1" comment="openssl-doc is &lt;1.0.2j-60.72.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632780" version="1" comment="ghostscript is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632781" version="1" comment="ghostscript-devel is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632782" version="1" comment="ghostscript-x11 is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632783" version="1" comment="libspectre-devel is &lt;0.2.7-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632784" version="1" comment="libspectre1 is &lt;0.2.7-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633610" version="1" comment="MozillaFirefox is &lt;91.1.0-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633611" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-35.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633612" version="1" comment="MozillaFirefox-devel is &lt;91.1.0-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633613" version="1" comment="MozillaFirefox-translations-common is &lt;91.1.0-112.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531863" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531865" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633614" version="1" comment="libsqlite3-0 is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633604" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633615" version="1" comment="sqlite3 is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633616" version="1" comment="sqlite3-devel is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631062" version="1" comment="python3-urllib3 is &lt;1.25.10-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634372" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634373" version="1" comment="libQt5Core5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634374" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634375" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634376" version="1" comment="libQt5Network5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634377" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634378" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634379" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634380" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634381" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634382" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634383" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634384" version="1" comment="libQt5Test5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634385" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634386" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651126" version="1" comment="glibc is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651115" version="1" comment="glibc-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651127" version="1" comment="glibc-devel is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651117" version="1" comment="glibc-devel-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651118" version="1" comment="glibc-html is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651119" version="1" comment="glibc-i18ndata is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651120" version="1" comment="glibc-info is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651128" version="1" comment="glibc-locale is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651122" version="1" comment="glibc-locale-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651129" version="1" comment="glibc-profile is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651124" version="1" comment="glibc-profile-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651130" version="1" comment="nscd is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634387" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634388" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634365" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-2.71.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634389" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634390" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634391" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634392" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634393" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633904" version="1" comment="apache2 is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633898" version="1" comment="apache2-doc is &lt;2.4.23-29.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633905" version="1" comment="apache2-example-pages is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633906" version="1" comment="apache2-prefork is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633907" version="1" comment="apache2-utils is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633908" version="1" comment="apache2-worker is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634688" version="1" comment="xen is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634689" version="1" comment="xen-doc-html is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634690" version="1" comment="xen-libs is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634691" version="1" comment="xen-libs-32bit is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634692" version="1" comment="xen-tools is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634693" version="1" comment="xen-tools-domU is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531867" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531868" version="1" comment="python3 is &lt;3.4.10-25.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531869" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531870" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651862" version="1" comment="MozillaFirefox is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651863" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651864" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652805" version="1" comment="strongswan is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652801" version="1" comment="strongswan-doc is &lt;5.1.3-26.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652806" version="1" comment="strongswan-hmac is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652807" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652808" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652164" version="1" comment="postgresql10 is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652165" version="1" comment="postgresql10-contrib is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652158" version="1" comment="postgresql10-docs is &lt;10.18-4.19.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652166" version="1" comment="postgresql10-plperl is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652167" version="1" comment="postgresql10-plpython is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652168" version="1" comment="postgresql10-pltcl is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652169" version="1" comment="postgresql10-server is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653168" version="1" comment="qemu is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653169" version="1" comment="qemu-block-curl is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653170" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653171" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653172" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653173" version="1" comment="qemu-ipxe is &lt;1.0.0-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653174" version="1" comment="qemu-kvm is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653175" version="1" comment="qemu-lang is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653176" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653177" version="1" comment="qemu-sgabios is &lt;8-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653178" version="1" comment="qemu-tools is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653179" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653180" version="1" comment="qemu-x86 is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653628" version="1" comment="opensc is &lt;0.13.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653544" version="1" comment="transfig is &lt;3.2.8b-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653540" version="1" comment="binutils is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653541" version="1" comment="binutils-devel is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653542" version="1" comment="libctf-nobfd0 is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653543" version="1" comment="libctf0 is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654414" version="1" comment="binutils is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654415" version="1" comment="binutils-devel is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654416" version="1" comment="libctf-nobfd0 is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654417" version="1" comment="libctf0 is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653038" version="1" comment="libpcre1 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653016" version="1" comment="libpcre1-32bit is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653039" version="1" comment="libpcre16-0 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653349" version="1" comment="selinux-policy is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653350" version="1" comment="selinux-policy-devel is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653351" version="1" comment="selinux-policy-minimum is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655206" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655207" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655208" version="1" comment="libdcerpc0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655209" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655210" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655211" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655212" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655213" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655214" version="1" comment="libndr-standard0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655215" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655216" version="1" comment="libndr0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655217" version="1" comment="libndr0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655218" version="1" comment="libnetapi0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655219" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655220" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655221" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655222" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655223" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655224" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655225" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655226" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655227" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655228" version="1" comment="libsamba-util0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655229" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655230" version="1" comment="libsamdb0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655231" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655232" version="1" comment="libsmbclient0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655233" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655234" version="1" comment="libsmbconf0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655235" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655236" version="1" comment="libsmbldap0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655237" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655238" version="1" comment="libtevent-util0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655239" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655240" version="1" comment="libwbclient0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655241" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655242" version="1" comment="samba is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655243" version="1" comment="samba-client is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655244" version="1" comment="samba-client-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655245" version="1" comment="samba-doc is &lt;4.4.2-38.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655246" version="1" comment="samba-libs is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655247" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655248" version="1" comment="samba-winbind is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655249" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655637" version="1" comment="MozillaFirefox is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655638" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655639" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656243" version="1" comment="libecpg6 is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656244" version="1" comment="libpq5 is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656229" version="1" comment="libpq5-32bit is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656230" version="1" comment="postgresql is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656231" version="1" comment="postgresql-contrib is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656232" version="1" comment="postgresql-docs is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656233" version="1" comment="postgresql-plperl is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656234" version="1" comment="postgresql-plpython is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656235" version="1" comment="postgresql-pltcl is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656236" version="1" comment="postgresql-server is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656863" version="1" comment="postgresql96 is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656864" version="1" comment="postgresql96-contrib is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656857" version="1" comment="postgresql96-docs is &lt;9.6.24-6.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656865" version="1" comment="postgresql96-plperl is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656866" version="1" comment="postgresql96-plpython is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656867" version="1" comment="postgresql96-pltcl is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656868" version="1" comment="postgresql96-server is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656548" version="1" comment="postgresql10 is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656549" version="1" comment="postgresql10-contrib is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656534" version="1" comment="postgresql10-docs is &lt;10.19-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656550" version="1" comment="postgresql10-plperl is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656551" version="1" comment="postgresql10-plpython is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656552" version="1" comment="postgresql10-pltcl is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656553" version="1" comment="postgresql10-server is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657339" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657340" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657332" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-2.74.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657341" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657342" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657343" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657344" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657345" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657044" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657045" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657046" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657047" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656897" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656898" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656899" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656900" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658680" version="1" comment="xen is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658681" version="1" comment="xen-doc-html is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658682" version="1" comment="xen-libs is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658683" version="1" comment="xen-libs-32bit is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658684" version="1" comment="xen-tools is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658685" version="1" comment="xen-tools-domU is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657553" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657554" version="1" comment="ruby2.1 is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657555" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656968" version="1" comment="clamav is &lt;0.103.4-33.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658205" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658206" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658196" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.1-2.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658207" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658208" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658209" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658210" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658211" version="1" comment="webkit2gtk3-devel is &lt;2.34.1-2.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657863" version="1" comment="kernel-default is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657864" version="1" comment="kernel-default-base is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657865" version="1" comment="kernel-default-devel is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657866" version="1" comment="kernel-devel is &lt;4.4.121-92.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657867" version="1" comment="kernel-macros is &lt;4.4.121-92.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657868" version="1" comment="kernel-source is &lt;4.4.121-92.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657869" version="1" comment="kernel-syms is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659103" version="1" comment="libfreebl3 is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659086" version="1" comment="libfreebl3-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659104" version="1" comment="libfreebl3-hmac is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659088" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659105" version="1" comment="libsoftokn3 is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659090" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659106" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659092" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659107" version="1" comment="mozilla-nss is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659094" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659108" version="1" comment="mozilla-nss-certs is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659096" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659109" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659099" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659110" version="1" comment="mozilla-nss-tools is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658348" version="1" comment="openssh is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658349" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658350" version="1" comment="openssh-fips is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658351" version="1" comment="openssh-helpers is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659444" version="1" comment="MozillaFirefox is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659445" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659446" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659102" version="1" comment="glib-networking is &lt;2.48.2-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659084" version="1" comment="glib-networking-lang is &lt;2.48.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659889" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659890" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660148" version="1" comment="log4j is &lt;1.2.15-126.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660798" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660799" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659981" version="1" comment="chrony is &lt;4.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531872" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531873" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531874" version="1" comment="python is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531875" version="1" comment="python-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531876" version="1" comment="python-base is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531877" version="1" comment="python-base-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531878" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531879" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531883" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531884" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531885" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531886" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531887" version="1" comment="kernel-default is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531888" version="1" comment="kernel-default-base is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531889" version="1" comment="kernel-default-devel is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531893" version="1" comment="kernel-syms is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531895" version="1" comment="openvswitch is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531898" version="1" comment="openvswitch-switch is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531899" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531900" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531901" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531902" version="1" comment="screen is &lt;4.0.4-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531903" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531904" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531906" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531907" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531908" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531909" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531911" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531912" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531914" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531915" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531916" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531917" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531918" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531919" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531920" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531922" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531925" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531926" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531927" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531928" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531929" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531930" version="1" comment="grub2 is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531936" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531937" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531938" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531939" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531940" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531943" version="1" comment="kernel-default is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531944" version="1" comment="kernel-default-base is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531945" version="1" comment="kernel-default-devel is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531949" version="1" comment="kernel-syms is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531951" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531952" version="1" comment="git is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531953" version="1" comment="git-core is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531954" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531955" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531957" version="1" comment="git-email is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531958" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531959" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531960" version="1" comment="git-web is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531961" version="1" comment="gitk is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531962" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531963" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531964" version="1" comment="python is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531965" version="1" comment="python-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531966" version="1" comment="python-base is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531967" version="1" comment="python-base-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531968" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531969" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531973" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531974" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531975" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531976" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531977" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531978" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531979" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531981" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531982" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531983" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531984" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531985" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531986" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531987" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531988" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531989" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531990" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531991" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531993" version="1" comment="sudo is &lt;1.8.10p3-10.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531994" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531995" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531996" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531997" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531998" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531999" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532000" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532001" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532003" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532004" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532005" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676877" version="1" comment="openvpn is &lt;2.3.8-16.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676878" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674029" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674007" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674030" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674031" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674010" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674027" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674003" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674028" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674005" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677126" version="1" comment="libz1 is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677109" version="1" comment="libz1-32bit is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677127" version="1" comment="zlib-devel is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662502" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662492" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662503" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662494" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677611" version="1" comment="libblkid1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677612" version="1" comment="libblkid1-32bit is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677613" version="1" comment="libfdisk1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677614" version="1" comment="libmount1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677615" version="1" comment="libmount1-32bit is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677616" version="1" comment="libsmartcols1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677617" version="1" comment="libuuid1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677618" version="1" comment="libuuid1-32bit is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677619" version="1" comment="python-libmount is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677620" version="1" comment="util-linux is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677621" version="1" comment="util-linux-lang is &lt;2.28-44.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677622" version="1" comment="util-linux-systemd is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677623" version="1" comment="uuidd is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678285" version="1" comment="libfreebl3 is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678251" version="1" comment="libfreebl3-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678286" version="1" comment="libfreebl3-hmac is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678253" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678287" version="1" comment="libsoftokn3 is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678255" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678288" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678257" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678289" version="1" comment="mozilla-nss is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678259" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678290" version="1" comment="mozilla-nss-certs is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678261" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678291" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678264" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678292" version="1" comment="mozilla-nss-tools is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678497" version="1" comment="MozillaFirefox is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678498" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678499" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677624" version="1" comment="glibc is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677550" version="1" comment="glibc-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677625" version="1" comment="glibc-devel is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677552" version="1" comment="glibc-devel-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677553" version="1" comment="glibc-html is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677554" version="1" comment="glibc-i18ndata is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677555" version="1" comment="glibc-info is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677626" version="1" comment="glibc-locale is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677557" version="1" comment="glibc-locale-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677627" version="1" comment="glibc-profile is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677559" version="1" comment="glibc-profile-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677628" version="1" comment="nscd is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677629" version="1" comment="libsolv-devel is &lt;0.6.39-2.27.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677630" version="1" comment="libsolv-tools is &lt;0.6.39-2.27.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677631" version="1" comment="libzypp is &lt;16.22.4-27.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677632" version="1" comment="libzypp-devel is &lt;16.22.4-27.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677633" version="1" comment="perl-solv is &lt;0.6.39-2.27.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677634" version="1" comment="python-solv is &lt;0.6.39-2.27.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677943" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663799" version="1" comment="MozillaFirefox is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663800" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663801" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679302" version="1" comment="liblzma5 is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679278" version="1" comment="liblzma5-32bit is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679303" version="1" comment="xz is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679280" version="1" comment="xz-lang is &lt;5.0.5-6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677635" version="1" comment="libexif12 is &lt;0.6.22-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677562" version="1" comment="libexif12-32bit is &lt;0.6.22-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679548" version="1" comment="gzip is &lt;1.6-9.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679304" version="1" comment="kernel-default is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679305" version="1" comment="kernel-default-base is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679306" version="1" comment="kernel-default-devel is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679307" version="1" comment="kernel-devel is &lt;4.4.121-92.172.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679308" version="1" comment="kernel-macros is &lt;4.4.121-92.172.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679309" version="1" comment="kernel-source is &lt;4.4.121-92.172.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679310" version="1" comment="kernel-syms is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679550" version="1" comment="dnsmasq is &lt;2.78-18.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679547" version="1" comment="javapackages-filesystem is &lt;5.3.1-14.7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679528" version="1" comment="tomcat is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679529" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679530" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679531" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679532" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679533" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679534" version="1" comment="tomcat-lib is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679535" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679536" version="1" comment="tomcat-webapps is &lt;8.0.53-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680006" version="1" comment="git is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680007" version="1" comment="git-core is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680008" version="1" comment="git-cvs is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680009" version="1" comment="git-daemon is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679999" version="1" comment="git-doc is &lt;2.26.2-27.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680010" version="1" comment="git-email is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680011" version="1" comment="git-gui is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680012" version="1" comment="git-svn is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680013" version="1" comment="git-web is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680014" version="1" comment="gitk is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680015" version="1" comment="libxml2-2 is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679983" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679984" version="1" comment="libxml2-doc is &lt;2.9.4-46.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680016" version="1" comment="libxml2-tools is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680017" version="1" comment="python-libxml2 is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679549" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679539" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680614" version="1" comment="xen is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680615" version="1" comment="xen-doc-html is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680616" version="1" comment="xen-libs is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680617" version="1" comment="xen-libs-32bit is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680618" version="1" comment="xen-tools is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680619" version="1" comment="xen-tools-domU is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663980" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663981" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663972" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.3-2.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663982" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663983" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663984" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663985" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663986" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681235" version="1" comment="cifs-utils is &lt;6.9-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664239" version="1" comment="aide is &lt;0.16-20.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682635" version="1" comment="MozillaFirefox is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682636" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682637" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663987" version="1" comment="zsh is &lt;5.0.5-6.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682319" version="1" comment="e2fsprogs is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682320" version="1" comment="libcom_err2 is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682310" version="1" comment="libcom_err2-32bit is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682321" version="1" comment="libext2fs2 is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662499" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662487" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662500" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662501" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662490" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682642" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682621" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682643" version="1" comment="openldap2 is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682644" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682645" version="1" comment="openldap2-client is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682625" version="1" comment="openldap2-doc is &lt;2.4.41-18.89.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682638" version="1" comment="gzip is &lt;1.6-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681316" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681317" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681309" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.0-2.96.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681318" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681319" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681320" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681321" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681322" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684081" version="1" comment="curl is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684082" version="1" comment="libcurl4 is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684074" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683677" version="1" comment="ucode-intel is &lt;20220510-13.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684083" version="1" comment="MozillaFirefox is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684084" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684085" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664107" version="1" comment="expat is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664108" version="1" comment="libexpat1 is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664105" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664690" version="1" comment="libpolkit0 is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664691" version="1" comment="polkit is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664692" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664933" version="1" comment="strongswan is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664929" version="1" comment="strongswan-doc is &lt;5.1.3-26.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664934" version="1" comment="strongswan-hmac is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664935" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664936" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664687" version="1" comment="log4j is &lt;1.2.15-126.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683697" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.170.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683698" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.170.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683699" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.170.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683700" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.170.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666238" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666239" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666240" version="1" comment="libdcerpc0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666241" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666242" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666243" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666244" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666245" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666246" version="1" comment="libndr-standard0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666247" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666248" version="1" comment="libndr0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666249" version="1" comment="libndr0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666250" version="1" comment="libnetapi0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666251" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666252" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666253" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666254" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666255" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666256" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666257" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666258" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666259" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666260" version="1" comment="libsamba-util0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666261" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666262" version="1" comment="libsamdb0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666263" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666264" version="1" comment="libsmbclient0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666265" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666266" version="1" comment="libsmbconf0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666267" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666268" version="1" comment="libsmbldap0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666269" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666270" version="1" comment="libtevent-util0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666271" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666272" version="1" comment="libwbclient0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666273" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666274" version="1" comment="samba is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666275" version="1" comment="samba-client is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666276" version="1" comment="samba-client-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666277" version="1" comment="samba-doc is &lt;4.4.2-38.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666278" version="1" comment="samba-libs is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666279" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666280" version="1" comment="samba-winbind is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666281" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661606" version="1" comment="libsnmp30 is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661599" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661607" version="1" comment="net-snmp is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661608" version="1" comment="perl-SNMP is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661609" version="1" comment="snmp-mibs is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662498" version="1" comment="libsndfile1 is &lt;1.0.25-36.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662485" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666228" version="1" comment="xen is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666229" version="1" comment="xen-doc-html is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666230" version="1" comment="xen-libs is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666231" version="1" comment="xen-libs-32bit is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666232" version="1" comment="xen-tools is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666233" version="1" comment="xen-tools-domU is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664693" version="1" comment="clamav is &lt;0.103.5-33.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666910" version="1" comment="kernel-default is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666911" version="1" comment="kernel-default-base is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666912" version="1" comment="kernel-default-devel is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666913" version="1" comment="kernel-devel is &lt;4.4.121-92.164.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666914" version="1" comment="kernel-macros is &lt;4.4.121-92.164.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666915" version="1" comment="kernel-source is &lt;4.4.121-92.164.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666916" version="1" comment="kernel-syms is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667335" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666236" version="1" comment="expat is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666237" version="1" comment="libexpat1 is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666209" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666234" version="1" comment="libtiff5 is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666205" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666235" version="1" comment="tiff is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668119" version="1" comment="tcpdump is &lt;4.9.2-14.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667934" version="1" comment="xerces-j2 is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667935" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667936" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668887" version="1" comment="MozillaFirefox is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668888" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668889" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667937" version="1" comment="ucode-intel is &lt;20220207-13.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663078" version="1" comment="apache2 is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663071" version="1" comment="apache2-doc is &lt;2.4.23-29.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663079" version="1" comment="apache2-example-pages is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663080" version="1" comment="apache2-prefork is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663081" version="1" comment="apache2-utils is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663082" version="1" comment="apache2-worker is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669342" version="1" comment="cyrus-sasl is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669310" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669343" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669312" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669344" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669345" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669315" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669346" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669317" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669347" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669319" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669348" version="1" comment="libsasl2-3 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669321" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669696" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669697" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669688" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.5-2.85.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669698" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669699" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669700" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669701" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669702" version="1" comment="webkit2gtk3-devel is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669382" version="1" comment="expat is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669383" version="1" comment="libexpat1 is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669384" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670824" version="1" comment="zsh is &lt;5.0.5-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671786" version="1" comment="kernel-default is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671787" version="1" comment="kernel-default-base is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671788" version="1" comment="kernel-default-devel is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671789" version="1" comment="kernel-devel is &lt;4.4.121-92.169.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671790" version="1" comment="kernel-macros is &lt;4.4.121-92.169.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671791" version="1" comment="kernel-source is &lt;4.4.121-92.169.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671792" version="1" comment="kernel-syms is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671783" version="1" comment="MozillaFirefox is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671784" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671785" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670816" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670817" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670802" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.6-2.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670818" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670819" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670820" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670821" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670822" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670823" version="1" comment="libcaca0 is &lt;0.99.beta18-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672571" version="1" comment="MozillaFirefox is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672572" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672573" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671277" version="1" comment="expat is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671278" version="1" comment="libexpat1 is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671275" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673055" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673056" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673023" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673057" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673025" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673058" version="1" comment="openssl is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673027" version="1" comment="openssl-doc is &lt;1.0.2j-60.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672567" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672568" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672569" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672570" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673031" version="1" comment="glibc is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673010" version="1" comment="glibc-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673032" version="1" comment="glibc-devel is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673012" version="1" comment="glibc-devel-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673013" version="1" comment="glibc-html is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673014" version="1" comment="glibc-i18ndata is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673015" version="1" comment="glibc-info is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673033" version="1" comment="glibc-locale is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673017" version="1" comment="glibc-locale-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673034" version="1" comment="glibc-profile is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673019" version="1" comment="glibc-profile-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673035" version="1" comment="nscd is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673758" version="1" comment="apache2 is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673736" version="1" comment="apache2-doc is &lt;2.4.23-29.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673759" version="1" comment="apache2-example-pages is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673760" version="1" comment="apache2-prefork is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673761" version="1" comment="apache2-utils is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673762" version="1" comment="apache2-worker is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132242" version="1" comment="sles-release is ==2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552398" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520319" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520320" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530323" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520321" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530324" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520322" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520323" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530325" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530326" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520324" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520325" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530327" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530328" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520326" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520327" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520328" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520329" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520330" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520331" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520332" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520333" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520334" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552399" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530487" version="1" comment="libudev-devel is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552400" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521241" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552401" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552402" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552403" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552404" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552405" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552406" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552407" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552408" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552409" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552410" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552411" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552412" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522072" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552413" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552414" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552415" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552416" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552417" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552418" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552419" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552420" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552421" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530717" version="1" comment="binutils-devel is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552422" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552423" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552424" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552425" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552426" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552427" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552428" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552429" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552430" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552431" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552432" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552433" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552434" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552435" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552436" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552437" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552438" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552439" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552440" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530931" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552441" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552442" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552443" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552444" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552445" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552446" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530981" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552447" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552448" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552449" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552450" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552451" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531091" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552452" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552453" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552454" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552455" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552456" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552457" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552458" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552459" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552460" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552461" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552462" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552463" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531307" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552464" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552465" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552466" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552467" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552468" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531525" version="1" comment="libudev-devel is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531536" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552469" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552470" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552471" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552472" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552473" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531628" version="1" comment="python3-devel is &lt;3.4.10-25.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552474" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552475" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552476" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552477" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552478" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531661" version="1" comment="python-devel is &lt;2.7.17-28.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531736" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531794" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552479" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552480" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552481" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552482" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552483" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552484" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531871" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552485" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552486" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552487" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552488" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552489" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531880" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531942" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531970" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552490" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552491" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552492" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552493" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552494" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>res-signingkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tablib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-openstack-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-glare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-expirer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionmailer-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activejob-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monasca-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-nimbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-supervisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cells</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-consoleauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-placement-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-serialproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.middleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-polling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cfn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-plugin-heat_docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-share</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_85-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera-3-wsrep-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-mysql2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sprockets-2_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logstash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-designate-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-designate-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-os-vif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.concurrency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.messaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.serialization</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.versionedobjects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslotest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caasp-openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera-python-clustercheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyKMIP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-crowbar-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-dhcp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ha-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-l3-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-linuxbridge-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-macvtap-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metadata-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metering-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-openvswitch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-ppc64le</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-haml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard-theme-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-amqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-psql2mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shared-python-startup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ruby-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_135-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-natel-discrete-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-keystone-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-retry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-carbonara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-indexer-sqlalchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-metricd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-statsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpn-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vyatta-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gnocchi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-murano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_146-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jsonpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyparsing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jsonpointer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyparsing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xattr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-monasca-ui-drilldown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-monasca-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-log-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-monasca-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-log-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwup0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kibana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-session_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_149-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_152-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtQuick5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-92_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gtk-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy-minimum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4.221</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.498</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-14.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.238</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.3-15.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-7.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">7</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.11.1-11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-4.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4~a0~dev1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170912_10.45-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.10~dev13-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.10~dev13-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev20-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev20-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~a0~dev1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4~a0~dev2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev4-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.2~a0~dev2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.2~a0~dev2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev22-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~a0~dev27-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.6~a0~dev16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.6~a0~dev16-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180425-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_04-43.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.23-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.3-11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180703-13.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_02-43.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180807-13.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.121_92.92-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_04-43.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180608_12.47-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.6~dev4-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7~dev10-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2~dev1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3~dev9-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1528801103.f5708341-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1534246408.3ab19c567-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1533750802.5768e73-4.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1534254269.ce598a9fe-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.1533844061.4ac8e723-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.4-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.2-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.14-17.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.121_92.95-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_05-43.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.6-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-4.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-95.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-122.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190507-13.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190514-13.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1553079189.3bf8922-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1551088848.823bcaa3-7.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1556285635.ab602dd4d-9.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1556181005.47c643d-4.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1554887450.ff7c30c1c-9.51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0+git.1506329536.8f5878c-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1~dev4-4.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-7.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_05-43.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1570463621.40b11cd48-9.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1569429513.e7016b2b6-9.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-1.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3~dev9-7.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.2~dev11-4.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.1~a0~dev177-4.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-0.18.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112-13.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112a-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1560518045.ad7dc6d-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1573109906.0f62e9503-9.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1573038068.1e32b3205-9.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.1547500033.d0fb2bf2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.25-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.2-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1515995585.81ed236-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170124-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.11-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0+git.1539592188.13e5d0f-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~dev6-4.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2~dev1-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.2~dev11-4.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190312-13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200207.5feb6c1-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.53-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602-13.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.4.16-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_08-43.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_10-43.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1600767499.0615a418f-9.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1599037255.25b759234-9.74.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.9-1.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5~dev2-2.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5~dev2-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev9-2.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev9-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~dev6-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7~dev1-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7~dev10-5.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7~dev10-5.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.5~dev3-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2~dev7-14.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2~dev7-14.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev30-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev30-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1~dev4-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev21-7.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev21-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1~dev8-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1578392992.fabfd186c-9.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1579171175.d53ab6363-9.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2~dev5-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201027-13.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.26-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.26-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-27.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201118-13.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1604938545.30c10db18-9.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_12-43.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_14-43.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1574788924.e4a6aeb0c-9.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1574869671.9c7bade2d-9.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.5~dev3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~dev18-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3~dev3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.38-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_14-43.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1616146720.44daffca0-9.81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.6-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180608_12.47-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-11.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-11.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-22.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.36-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_06-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044.1-109.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.2-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_03-43.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.1-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_04-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_06-43.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4+git.1481215985.12b091b-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-29.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20160518_1.9.4-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_02-43.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_02-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.021-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_04-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.29.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-255.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.30-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_06-43.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180312-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.4.114_92.67-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.50-29.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.53-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64le|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.26-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-27.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-109.83.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-109.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.53-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.26-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.19-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-27.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-27.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-44.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-112.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.291-43.47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-112.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-13.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-27.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.37-2.27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.4-27.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-159.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-112.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-112.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-27.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.1-104.9.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-104.9.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.1.0-112.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-35.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_16-43.79.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140730-36.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-112.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-27.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.321-43.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_18-43.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-33.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-2.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-58.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-112.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-38.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-30.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-30.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-58.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-112.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.39-2.27.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.22.4-27.85.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-112.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-14.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_22-43.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-38.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220510-13.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.108.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_20-43.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-112.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-13.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-112.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-112.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-27.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
